What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Qiang Tang
Google Scholar
45
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Turritopsis: Practical Dynamic Asynchronous BFT.
Yingzi Gao
Yuan Lu
Zhenliang Lu
Qiang Tang
Yuyi Wang
Jing Xu
2025
journals/tifs
What Makes a Good Exchange? Privacy-Preserving and Fair Contract Agreement in Data Trading.
Xinyu He
Yuan Zhang
Yaqing Song
Weidong Qiu
Hongwei Li
Qiang Tang
2025
journals/popets
EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics.
Shiyu Li
Yuan Zhang
Yaqing Song
Fan Wu
Feng Lyu
Kan Yang
Qiang Tang
2025
conf/sp
Constant Latency and Finality for Dynamically Available DAG.
Hans Schmiedel
Runchao Han
Qiang Tang
Ron Steinfeld
Jiangshan Yu
2025
conf/dsn
Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement.
Hanwen Feng
Zhenliang Lu
Tiancheng Mai
Qiang Tang
2025
conf/crypto
Asymptotically Optimal Adaptive Asynchronous Common Coin and DKG with Silent Setup.
Hanwen Feng
Qiang Tang
2025
conf/uss
Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience.
Yuan Su
Yuan Lu
Jiliang Li
Yuyi Wang
Chengyi Dong
Qiang Tang
2024
conf/ccs
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing.
Hanwen Feng
Tiancheng Mai
Qiang Tang
2024
conf/esorics
Resilience to Chain-Quality Attacks in Fair Separability.
Vincent Gramoli
Zhenliang Lu
Qiang Tang
Pouriya Zarbafian
2024
conf/ndss
Pisces: Private and Compliable Cryptocurrency Exchange.
Ya-Nan Li
Tian Qiu
Qiang Tang
2024
conf/dsn
AOAB: Optimal and Fair Ordering of Financial Transactions.
Vincent Gramoli
Zhenliang Lu
Qiang Tang
Pouriya Zarbafian
2024
conf/asiacrypt
Crooked Indifferentiability of the Feistel Construction.
Alexander Russell
Qiang Tang
Jiadong Zhu
2023
conf/pkc
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Giuseppe Ateniese
Long Chen
Danilo Francati
Dimitrios Papadopoulos
Qiang Tang
2023
conf/asiacrypt
Efficient Secure Storage with Version Control and Key Rotation.
Long Chen
Hui Guo
Ya-Nan Li
Qiang Tang
2023
conf/asiacrypt
Predicate Aggregate Signatures and Applications.
Tian Qiu
Qiang Tang
2022
conf/ccs
Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency.
Yingzi Gao
Yuan Lu
Zhenliang Lu
Qiang Tang
Jing Xu
Zhenfeng Zhang
2022
conf/ccs
Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT.
Yuan Lu
Zhenliang Lu
Qiang Tang
2022
conf/uss
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
Long Chen
Ya-Nan Li
Qiang Tang
Moti Yung
2022
conf/provsec
Secure Collaboration Between Consortiums in Permissioned Blockchains.
Juzheng Huang
Qiang Tang
Chunhua Su
Na Ruan
2022
conf/esorics
Anonymous Traceback for End-to-End Encryption.
Erin Kenney
Qiang Tang
Chase Wu
2022
conf/ndss
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice.
Bingyong Guo
Yuan Lu
Zhenliang Lu
Qiang Tang
Jing Xu
Zhenfeng Zhang
2021
conf/crypto
Witness Authenticating NIZKs and Applications.
Hanwen Feng
Qiang Tang
2021
conf/esorics
Fair Peer-to-Peer Content Delivery via Blockchain.
Songlin He
Yuan Lu
Qiang Tang
Guiling Wang
Chase Qishi Wu
2021
conf/asiacrypt
Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds).
Yu Chen
Qiang Tang
Yuyu Wang
2021
conf/tcc
Computational Robust (Fuzzy) Extractors for CRS-Dependent Sources with Minimal Min-entropy.
Hanwen Feng
Qiang Tang
2020
conf/ccs
Dumbo: Faster Asynchronous BFT Protocols.
Bingyong Guo
Zhenliang Lu
Qiang Tang
Jing Xu
Zhenfeng Zhang
2020
conf/acisp
Multi-input Laconic Function Evaluation.
Bo Pang
Long Chen
Xiong Fan
Qiang Tang
2020
conf/esorics
Generic Superlight Client for Permissionless Blockchains.
Yuan Lu
Qiang Tang
Guiling Wang
2020
conf/ndss
Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
Giuseppe Ateniese
Long Chen
Mohammad Etemad
Qiang Tang
2020
conf/asiacrypt
CCA Updatable Encryption Against Malicious Re-encryption Attacks.
Long Chen
Yanan Li
Qiang Tang
2019
conf/pkc
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Sherman S. M. Chow
Alexander Russell
Qiang Tang
Moti Yung
Yongjun Zhao
Hong-Sheng Zhou
2018
conf/crypto
Correcting Subverted Random Oracles.
Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
2018
conf/esorics
Making Any Attribute-Based Encryption Accountable, Efficiently.
Junzuo Lai
Qiang Tang
2018
conf/pkc
Making Public Key Functional Encryption Function Private, Distributively.
Xiong Fan
Qiang Tang
2017
conf/ccs
Generic Semantic Security against a Kleptographic Adversary.
Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
2017
conf/ccs
Cliptography: Post-Snowden Cryptography.
Qiang Tang
Moti Yung
2016
journals/tifs
On the Security of Key Extraction From Measuring Physical Quantities.
Matthew Edman
Aggelos Kiayias
Qiang Tang
Bülent Yener
2016
conf/esorics
Efficient Encrypted Keyword Search for Multi-user Data Sharing.
Aggelos Kiayias
Ozgur Oksuz
Alexander Russell
Qiang Tang
Bing Wang
2016
conf/eurocrypt
Honey Encryption Beyond Message Recovery Security.
Joseph Jaeger
Thomas Ristenpart
Qiang Tang
2016
conf/asiacrypt
Cliptography: Clipping the Power of Kleptographic Attacks.
Alexander Russell
Qiang Tang
Moti Yung
Hong-Sheng Zhou
2015
journals/popets
Optimal Rate Private Information Retrieval from Homomorphic Encryption.
Aggelos Kiayias
Nikos Leonardos
Helger Lipmaa
Kateryna Pavlyk
Qiang Tang
2015
conf/ccs
Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content.
Aggelos Kiayias
Qiang Tang
2015
conf/esorics
Making Any Identity-Based Encryption Accountable, Efficiently.
Aggelos Kiayias
Qiang Tang
2015
conf/ctrsa
Communication Optimal Tardos-Based Asymmetric Fingerprinting.
Aggelos Kiayias
Nikos Leonardos
Helger Lipmaa
Kateryna Pavlyk
Qiang Tang
2013
conf/ccs
How to keep a secret: leakage deterring public-key cryptosystems.
Aggelos Kiayias
Qiang Tang
Coauthors
Aggelos Kiayias
(7)
Alexander Russell
(6)
Bing Wang
(1)
Bingyong Guo
(2)
Bo Pang
(1)
Bülent Yener
(1)
Chase Qishi Wu
(1)
Chase Wu
(1)
Chengyi Dong
(1)
Chunhua Su
(1)
Danilo Francati
(1)
Dimitrios Papadopoulos
(1)
Erin Kenney
(1)
Fan Wu
(1)
Feng Lyu
(1)
Giuseppe Ateniese
(2)
Guiling Wang
(2)
Hans Schmiedel
(1)
Hanwen Feng
(5)
Helger Lipmaa
(2)
Hong-Sheng Zhou
(4)
Hongwei Li
(1)
Hui Guo
(1)
Jiadong Zhu
(1)
Jiangshan Yu
(1)
Jiliang Li
(1)
Jing Xu
(4)
Joseph Jaeger
(1)
Junzuo Lai
(1)
Juzheng Huang
(1)
Kan Yang
(1)
Kateryna Pavlyk
(2)
Long Chen
(6)
Matthew Edman
(1)
Mohammad Etemad
(1)
Moti Yung
(6)
Na Ruan
(1)
Nikos Leonardos
(2)
Ozgur Oksuz
(1)
Pouriya Zarbafian
(2)
Qiang Tang
(45)
Ron Steinfeld
(1)
Runchao Han
(1)
Sherman S. M. Chow
(1)
Shiyu Li
(1)
Songlin He
(1)
Thomas Ristenpart
(1)
Tian Qiu
(2)
Tiancheng Mai
(2)
Vincent Gramoli
(2)
Weidong Qiu
(1)
Xinyu He
(1)
Xiong Fan
(2)
Ya-Nan Li
(3)
Yanan Li
(1)
Yaqing Song
(2)
Yingzi Gao
(2)
Yongjun Zhao
(1)
Yu Chen
(1)
Yuan Lu
(7)
Yuan Su
(1)
Yuan Zhang
(2)
Yuyi Wang
(2)
Yuyu Wang
(1)
Zhenfeng Zhang
(3)
Zhenliang Lu
(8)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to