default search action
Shengli Liu 0001
Person information
- affiliation: Shanghai Jiao Tong University, Department of Computer Science and Engineering, Westone Cryptologic Research Center, China
- affiliation (PhD 2000): Xidian University, China
Other persons with the same name
- Shengli Liu — disambiguation page
- Shengli Liu 0002 — Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China (and 1 more)
- Shengli Liu 0003 — State Key Laboratory of Mathematical Engineering and Advanced Computing, China (and 1 more)
- Shengli Liu 0004 — PLA Strategic Support Force Information Engineering University, School of Cyberspace Security, Zhengzhou
- Shengli Liu 0005 — Wuhan University of Science and Technology, Key Laboratory of Metallurgical Equipment and Control Technology, China
- Shengli Liu 0006 — Air Force Engineering University, College of Air and Missile Defense, Xi'an, China
- Shengli Liu 0007 — Hebei Normal University, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Biometric-based two-factor authentication scheme under database leakage. Theor. Comput. Sci. 1000: 114552 (2024) - [c64]You Lyu, Shengli Liu, Shuai Han:
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World. EUROCRYPT (6) 2024: 120-150 - [c63]Shuai Han, Shengli Liu, Dawu Gu:
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. Public Key Cryptography (4) 2024: 3-34 - [c62]Yunxiao Zhou, Shengli Liu, Shuai Han:
Multi-hop Fine-Grained Proxy Re-encryption. Public Key Cryptography (4) 2024: 161-192 - [c61]Yiming Li, Shengli Liu:
Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain. Public Key Cryptography (3) 2024: 288-320 - [i40]Yunxiao Zhou, Shengli Liu, Shuai Han:
Multi-Hop Fine-Grained Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2024: 55 (2024) - [i39]You Lyu, Shengli Liu, Shuai Han:
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World. IACR Cryptol. ePrint Arch. 2024: 374 (2024) - [i38]You Lyu, Shengli Liu, Shuai Han:
Efficient Asymmetric PAKE Compiler from KEM and AE. IACR Cryptol. ePrint Arch. 2024: 1400 (2024) - 2023
- [j51]Yu Zhou, Shengli Liu, Nan Cui:
Computational fuzzy extractor from LWE. Theor. Comput. Sci. 945: 113681 (2023) - [j50]Yiming Li, Shengli Liu, Shuai Han, Dawu Gu, Jian Weng:
Simulatable verifiable random function from the LWE assumption. Theor. Comput. Sci. 957: 113826 (2023) - [j49]Mingming Jiang, Shengli Liu, You Lyu, Yu Zhou:
Face-Based Authentication Using Computational Secure Sketch. IEEE Trans. Mob. Comput. 22(12): 7172-7187 (2023) - [c60]Yunxiao Zhou, Shengli Liu, Shuai Han, Haibin Zhang:
Fine-Grained Proxy Re-encryption: Definitions and Constructions from LWE. ASIACRYPT (6) 2023: 199-231 - [c59]Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu:
Almost Tight Multi-user Security Under Adaptive Corruptions from LWE in the Standard Model. CRYPTO (5) 2023: 682-715 - [c58]Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. DSN 2023: 568-581 - [c57]You Lyu, Shengli Liu:
Two-Message Authenticated Key Exchange from Public-Key Encryption. ESORICS (1) 2023: 414-434 - [c56]Shuai Han, Shengli Liu, Dawu Gu:
Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model. EUROCRYPT (3) 2023: 132-162 - [c55]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
Fine-Grained Verifier NIZK and Its Applications. Public Key Cryptography (2) 2023: 482-511 - [c54]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. Public Key Cryptography (1) 2023: 685-713 - [i37]Shuai Han, Shengli Liu, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model. IACR Cryptol. ePrint Arch. 2023: 153 (2023) - [i36]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. IACR Cryptol. ePrint Arch. 2023: 170 (2023) - [i35]You Lyu, Shengli Liu:
Two-Message Authenticated Key Exchange from Public-Key Encryption. IACR Cryptol. ePrint Arch. 2023: 706 (2023) - [i34]Yiming Li, Shengli Liu:
Tagged Chameleon Hash from Lattice and Application to Redactable Blockchain. IACR Cryptol. ePrint Arch. 2023: 774 (2023) - [i33]Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model. IACR Cryptol. ePrint Arch. 2023: 1230 (2023) - [i32]Yunxiao Zhou, Shengli Liu, Shuai Han, Haibin Zhang:
Fine-Grained Proxy Re-Encryption: Definitions & Constructions from LWE. IACR Cryptol. ePrint Arch. 2023: 1324 (2023) - [i31]Shuai Han, Shengli Liu, Dawu Gu:
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. IACR Cryptol. ePrint Arch. 2023: 1965 (2023) - 2022
- [j48]Yu Zhou, Shengli Liu, Shuai Han:
Generic Construction of 1-out-of-n Oblivious Signatures. IEICE Trans. Inf. Syst. 105-D(11): 1836-1844 (2022) - [j47]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly CCA-secure inner product functional encryption scheme. Theor. Comput. Sci. 898: 1-19 (2022) - [c53]You Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Privacy-Preserving Authenticated Key Exchange in the Standard Model. ASIACRYPT (3) 2022: 210-240 - [c52]Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Fuzzy Authenticated Key Exchange with Tight Security. ESORICS (2) 2022: 337-360 - [i30]You Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Privacy-Preserving Authenticated Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2022: 1217 (2022) - [i29]Xiangyu Liu, Shengli Liu, Dawu Gu:
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications. IACR Cryptol. ePrint Arch. 2022: 1258 (2022) - [i28]Haibin Zhang, Sisi Duan, Chao Liu, Boxin Zhao, Xuanji Meng, Shengli Liu, Yong Yu, Fangguo Zhang, Liehuang Zhu:
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model. IACR Cryptol. ePrint Arch. 2022: 1678 (2022) - 2021
- [j46]Nan Cui, Shengli Liu, Dawu Gu, Jian Weng:
Robustly reusable fuzzy extractor with imperfect randomness. Des. Codes Cryptogr. 89(5): 1017-1059 (2021) - [j45]Yiming Li, Shengli Liu, Shuai Han, Dawu Gu:
Pseudorandom functions in NC class from the standard LWE assumption. Des. Codes Cryptogr. 89(12): 2807-2839 (2021) - [c51]Shuai Han, Shengli Liu, Dawu Gu:
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Result and Optimal Tightness. ASIACRYPT (2) 2021: 483-513 - [c50]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. CRYPTO (4) 2021: 670-700 - [c49]Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Authentication System Based on Fuzzy Extractors. WASA (3) 2021: 479-490 - [i27]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. IACR Cryptol. ePrint Arch. 2021: 863 (2021) - [i26]Shuai Han, Shengli Liu, Dawu Gu:
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness. IACR Cryptol. ePrint Arch. 2021: 1146 (2021) - 2020
- [j44]Yiming Li, Shengli Liu, Dawu Gu, Kefei Chen:
Reusable Fuzzy Extractor Based on the LPN Assumption. Comput. J. 63(12): 1826-1834 (2020) - [j43]Ziyuan Hu, Shengli Liu, Kefei Chen:
Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks. IEEE Trans. Dependable Secur. Comput. 17(5): 972-983 (2020) - [c48]Xiangyu Liu, Shengli Liu, Dawu Gu:
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications. ACISP 2020: 664-673 - [c47]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. ASIACRYPT (2) 2020: 785-814 - [i25]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. IACR Cryptol. ePrint Arch. 2020: 1088 (2020)
2010 – 2019
- 2019
- [j42]Shuyang Tang, Shengli Liu, Xinyi Huang, Zhiqiang Liu:
Privacy-preserving location-based service protocols with flexible access. Int. J. Comput. Sci. Eng. 20(3): 412-423 (2019) - [j41]Xiao Zhang, Shengli Liu, Shuai Han:
Proofs of retrievability from linearly homomorphic structure-preserving signatures. Int. J. Inf. Comput. Secur. 11(2): 178-202 (2019) - [j40]Xiao Zhang, Shengli Liu, Dawu Gu, Joseph K. Liu:
A generic construction of tightly secure signatures in the multi-user setting. Theor. Comput. Sci. 775: 32-52 (2019) - [j39]Shuai Han, Shengli Liu, Lin Lyu:
QANIZK for adversary-dependent languages and their applications. Theor. Comput. Sci. 779: 47-71 (2019) - [j38]Lin Lyu, Shengli Liu, Dawu Gu:
Structure-preserving public-key encryption with leakage-resilient CCA security. Theor. Comput. Sci. 795: 57-80 (2019) - [j37]Xiao Zhang, Shengli Liu, Jiaxin Pan, Dawu Gu:
Tightly secure signature schemes from the LWE and subset sum assumptions. Theor. Comput. Sci. 795: 326-344 (2019) - [c46]Nan Cui, Shengli Liu, Yunhua Wen, Dawu Gu:
Pseudorandom Functions from LWE: RKA Security and Application. ACISP 2019: 229-250 - [c45]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. CRYPTO (2) 2019: 417-447 - [c44]Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. Public Key Cryptography (2) 2019: 349-378 - [c43]Fangguo Zhang, Shengli Liu:
Solving ECDLP via List Decoding. ProvSec 2019: 222-244 - [i24]Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. IACR Cryptol. ePrint Arch. 2019: 18 (2019) - [i23]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. IACR Cryptol. ePrint Arch. 2019: 512 (2019) - 2018
- [j36]Lin Lyu, Shengli Liu, Shuai Han:
Public-Key Encryption with Tight Simulation-Based Selective-Opening Security. Comput. J. 61(2): 288-318 (2018) - [j35]Yunhua Wen, Shengli Liu, Ziyuan Hu, Shuai Han:
Computational Robust Fuzzy Extractor. Comput. J. 61(12): 1794-1805 (2018) - [j34]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tightly Secure Encryption Schemes against Related-Key Attacks. Comput. J. 61(12): 1825-1844 (2018) - [j33]Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption. Cryptogr. 2(4): 33 (2018) - [j32]Shuai Han, Shengli Liu, Baodong Qin, Dawu Gu:
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Des. Codes Cryptogr. 86(3): 517-554 (2018) - [j31]Shuai Han, Shengli Liu, Lin Lyu:
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. Des. Codes Cryptogr. 86(7): 1411-1449 (2018) - [j30]Yunhua Wen, Shengli Liu, Shuai Han:
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. Des. Codes Cryptogr. 86(11): 2495-2512 (2018) - [c42]Yunhua Wen, Shengli Liu:
Reusable Fuzzy Extractor from LWE. ACISP 2018: 13-27 - [c41]Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. ACISP 2018: 265-283 - [c40]Yunhua Wen, Shengli Liu:
Robustly Reusable Fuzzy Extractor from Standard Assumptions. ASIACRYPT (3) 2018: 459-489 - [c39]Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. Public Key Cryptography (1) 2018: 62-92 - [i22]Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 30 (2018) - [i21]Fangguo Zhang, Shengli Liu:
Solving ECDLP via List Decoding. IACR Cryptol. ePrint Arch. 2018: 795 (2018) - [i20]Yunhua Wen, Shengli Liu:
Robustly Reusable Fuzzy Extractor from Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 818 (2018) - 2017
- [j29]Baodong Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu:
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman. Inf. Sci. 406: 1-11 (2017) - [j28]Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen, Jin Li:
Insight of the protection for data security under selective opening attacks. Inf. Sci. 412: 223-241 (2017) - [j27]Shuai Han, Shengli Liu, Lin Lyu:
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption. Secur. Commun. Networks 2017: 2148534:1-2148534:27 (2017) - [c38]Shuai Han, Shengli Liu:
KDM-Secure Public-Key Encryption from Constant-Noise LPN. ACISP (1) 2017: 44-64 - [c37]Xiao Zhang, Shengli Liu, Dawu Gu:
Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption. ACISP (1) 2017: 453-468 - [i19]Shuai Han, Shengli Liu:
KDM-Secure Public-Key Encryption from Constant-Noise LPN. IACR Cryptol. ePrint Arch. 2017: 310 (2017) - 2016
- [j26]Shifeng Sun, Shuai Han, Dawu Gu, Shengli Liu:
Public key cryptosystems secure against memory leakage attacks. IET Inf. Secur. 10(6): 403-412 (2016) - [j25]Shifeng Sun, Dawu Gu, Shengli Liu:
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks. Secur. Commun. Networks 9(11): 1417-1434 (2016) - [c36]Shuai Han, Shengli Liu, Lin Lyu:
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions. ASIACRYPT (2) 2016: 307-338 - [c35]Shuai Han, Shengli Liu, Fangguo Zhang, Kefei Chen:
Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes. AsiaCCS 2016: 487-498 - [c34]Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei:
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks. Inscrypt 2016: 150-165 - [i18]Shuai Han, Shengli Liu, Lin Lyu:
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions. IACR Cryptol. ePrint Arch. 2016: 829 (2016) - [i17]Shuai Han, Shengli Liu, Lin Lyu:
Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System. IACR Cryptol. ePrint Arch. 2016: 1051 (2016) - 2015
- [j24]Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen:
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. Int. J. Appl. Math. Comput. Sci. 25(2): 415-430 (2015) - [j23]Baodong Qin, Shengli Liu, Kefei Chen:
Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience. IET Inf. Secur. 9(1): 32-42 (2015) - [j22]Zhengan Huang, Shengli Liu, Kefei Chen:
n-Evasive all-but-many lossy trapdoor function and its constructions. Secur. Commun. Networks 8(4): 550-564 (2015) - [j21]Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - [j20]Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma:
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 10(7): 1384-1393 (2015) - [c33]Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:
Non-malleability Under Selective Opening Attacks: Implication and Separation. ACNS 2015: 87-104 - [c32]Baodong Qin, Robert H. Deng, Yingjiu Li, Shengli Liu:
Server-Aided Revocable Identity-Based Encryption. ESORICS (1) 2015: 286-304 - [c31]Shengli Liu, Kenneth G. Paterson:
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. Public Key Cryptography 2015: 3-26 - [c30]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 - [i16]Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. IACR Cryptol. ePrint Arch. 2015: 3 (2015) - [i15]Shengli Liu, Kenneth G. Paterson:
Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2015: 10 (2015) - [i14]Baodong Qin, Shengli Liu:
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. IACR Cryptol. ePrint Arch. 2015: 272 (2015) - [i13]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. IACR Cryptol. ePrint Arch. 2015: 297 (2015) - [i12]Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:
Non-malleability under Selective Opening Attacks: Implication and Separation. IACR Cryptol. ePrint Arch. 2015: 316 (2015) - 2014
- [j19]Shengli Liu, Fangguo Zhang, Kefei Chen:
Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption. Concurr. Comput. Pract. Exp. 26(8): 1506-1519 (2014) - [j18]Fangguo Zhang, Xu Ma, Shengli Liu:
Efficient computation outsourcing for inverting a class of homomorphic functions. Inf. Sci. 286: 19-28 (2014) - [c29]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. EUROCRYPT 2014: 77-92 - [c28]Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu:
Proofs of Retrievability Based on MRD Codes. ISPEC 2014: 330-345 - [c27]Baodong Qin, Shengli Liu:
Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. Public Key Cryptography 2014: 19-36 - 2013
- [j17]Baodong Qin, Shengli Liu:
Efficient chosen ciphertext secure public-key encryption under factoring assumption. Secur. Commun. Networks 6(3): 351-360 (2013) - [c26]Baodong Qin, Shengli Liu, Zhengan Huang:
Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem. ACISP 2013: 136-151 - [c25]Baodong Qin, Shengli Liu:
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter. ASIACRYPT (2) 2013: 381-400 - [c24]Baodong Qin, Shengli Liu, Kefei Chen, Manuel Charlemagne:
Leakage-resilient lossy trapdoor functions and public-key encryption. AsiaPKC@AsiaCCS 2013: 3-12 - [c23]Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao:
Security Model and Analysis of FHMQV, Revisited. Inscrypt 2013: 255-269 - [c22]Shengli Liu, Jian Weng, Yunlei Zhao:
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks. CT-RSA 2013: 84-100 - [c21]Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen:
Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010. INCoS 2013: 366-372 - [c20]Shifeng Sun, Dawu Gu, Shengli Liu:
Efficient Leakage-Resilient Identity-Based Encryption with CCA Security. Pairing 2013: 149-167 - [c19]Zhengan Huang, Shengli Liu, Baodong Qin:
Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. Public Key Cryptography 2013: 369-385 - [i11]Fangguo Zhang, Xu Ma, Shengli Liu:
Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions. IACR Cryptol. ePrint Arch. 2013: 44 (2013) - [i10]Baodong Qin, Shengli Liu:
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter. IACR Cryptol. ePrint Arch. 2013: 654 (2013) - [i9]Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu:
Proofs of Data Possession and Retrievability Based on MRD Codes. IACR Cryptol. ePrint Arch. 2013: 789 (2013) - 2012
- [c18]Fangguo Zhang, Qiping Lin, Shengli Liu:
Zero-Value Point Attacks on Kummer-Based Cryptosystem. ACNS 2012: 293-310 - [c17]Shengli Liu, Fangguo Zhang, Kefei Chen:
Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption. NSS 2012: 100-112 - [i8]Zhengan Huang, Shengli Liu, Baodong Qin:
Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited. IACR Cryptol. ePrint Arch. 2012: 473 (2012) - 2011
- [j16]Shengli Liu, Yu Long, Kefei Chen:
Key updating technique in identity-based encryption. Inf. Sci. 181(11): 2436-2440 (2011) - [j15]Zhong-Mei Wan, Jian Weng, Xuejia Lai, Shengli Liu, Jiguo Li:
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption. J. Inf. Sci. Eng. 27(1): 243-259 (2011) - [j14]Shengli Liu, Junzuo Lai, Robert H. Deng:
General Construction of Chameleon All-But-One Trapdoor Functions. J. Internet Serv. Inf. Secur. 1(2/3): 74-88 (2011) - [c16]Shengli Liu, Kefei Chen:
Homomorphic Linear Authentication Schemes for Proofs of Retrievability. INCoS 2011: 258-262 - [c15]Junzuo Lai, Robert H. Deng, Shengli Liu:
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. Public Key Cryptography 2011: 228-245 - [c14]Shengli Liu, Junzuo Lai, Robert H. Deng:
General Construction of Chameleon All-But-One Trapdoor Functions. ProvSec 2011: 257-265 - 2010
- [j13]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen:
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Inf. Sci. 180(24): 5077-5089 (2010) - [j12]Junzuo Lai, Wen Tao Zhu, Robert H. Deng, Shengli Liu, Weidong Kou:
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption. J. Comput. Sci. Technol. 25(4): 793-806 (2010) - [c13]Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou:
Efficient CCA-Secure PKE from Identity-Based Techniques. CT-RSA 2010: 132-147
2000 – 2009
- 2009
- [j11]Yu Long, Zheng Gong, Kefei Chen, Shengli Liu:
Provably Secure Identity-based Threshold Key Escrow from Pairing. Int. J. Netw. Secur. 8(3): 227-234 (2009) - [c12]Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou:
RSA-Based Certificateless Public Key Encryption. ISPEC 2009: 24-34 - [c11]Chaonian Guo, Xiangxue Li, Dong Zheng, Shengli Liu, Jianhua Li:
AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. NCM 2009: 479-483 - 2008
- [j10]Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Parallel Key-Insulated Signature: Framework and Construction. J. Res. Pract. Inf. Technol. 40(1): 55-68 (2008) - [j9]Shengli Liu, Xiaofeng Chen, Fangguo Zhang:
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme. J. Comput. Sci. Technol. 23(2): 265-269 (2008) - [j8]Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu:
Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J. Inf. Sci. Eng. 24(4): 1143-1157 (2008) - [c10]Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen:
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17 - [c9]Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. CT-RSA 2008: 203-220 - [i7]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xu An Wang:
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. IACR Cryptol. ePrint Arch. 2008: 509 (2008) - 2007
- [j7]Yu Long, Kefei Chen, Shengli Liu:
ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Comput. Electr. Eng. 33(3): 166-176 (2007) - [j6]Jian Weng, Shengli Liu, Kefei Chen:
Pirate decoder for the broadcast encryption schemes from Crypto 2005. Sci. China Ser. F Inf. Sci. 50(3): 318-323 (2007) - [j5]Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-based restrictive partially blind signatures and applications. J. Syst. Softw. 80(2): 164-171 (2007) - [c8]Shengli Liu, Kefei Chen, Weidong Qiu:
Identity-Based Threshold Decryption Revisited. ISPEC 2007: 329-343 - [i6]Shengli Liu, Xiaofeng Chen, Fangguo Zhang:
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature. IACR Cryptol. ePrint Arch. 2007: 225 (2007) - 2006
- [j4]Changshe Ma, Shiqun Li, Kefei Chen, Shengli Liu:
Analysis and improvement of fair certified e-mail delivery protocol. Comput. Stand. Interfaces 28(4): 467-474 (2006) - [j3]Yu Long, Kefei Chen, Shengli Liu:
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. Informatica 17(4): 519-534 (2006) - [c7]Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Key-Insulated Signature Without Random Oracles. CIS 2006: 470-480 - [c6]Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Key-Insulated Signature with Secure Key-Updates. Inscrypt 2006: 13-26 - [c5]Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. INDOCRYPT 2006: 409-423 - [i5]Shengli Liu, Fangguo Zhang:
Cryptanalysis of REESSE1+ Public Key Cryptosystem. IACR Cryptol. ePrint Arch. 2006: 480 (2006) - 2005
- [c4]Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-Based Restrictive Partially Blind Signatures. CIS (2) 2005: 117-124 - [c3]Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu:
Efficient and Proactive Threshold Signcryption. ISC 2005: 233-243 - [c2]Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng:
Transitive Signatures Based on Bilinear Maps. WOSIS 2005: 48-56 - [i4]Xiaofeng Chen, Fangguo Zhang, Shengli Liu:
ID-based Restrictive Partially Blind Signatures and Applications. IACR Cryptol. ePrint Arch. 2005: 319 (2005) - 2004
- [j2]Shengli Liu, Fangguo Zhang, Kefei Chen:
Authenticating Tripartite Key Agreement Protocol with Pairings. J. Comput. Sci. Technol. 19(2): 169-176 (2004) - 2003
- [j1]Shengli Liu, Henk C. A. van Tilborg, Marten van Dijk:
A Practical Protocol for Advantage Distillation and Information Reconciliation. Des. Codes Cryptogr. 30(1): 39-62 (2003) - [i3]Zheng Dong, Shengli Liu, Kefei Chen:
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature. IACR Cryptol. ePrint Arch. 2003: 200 (2003) - 2002
- [c1]Fangguo Zhang, Shengli Liu, Kwangjo Kim:
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. ACISP 2002: 203-213 - [i2]Fangguo Zhang, Shengli Liu, Kwangjo Kim:
ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings. IACR Cryptol. ePrint Arch. 2002: 122 (2002) - [i1]Fangguo Zhang, Shengli Liu, Kwangjo Kim:
Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433). IACR Cryptol. ePrint Arch. 2002: 178 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint