default search action
Zhen Liu 0008
Person information
- affiliation: City University of Hong Kong, Department of Computer Science, Hong Kong
- affiliation: Shanghai Jiao Tong University, Department of Computer Science and Engineering, Shanghai, China
Other persons with the same name
- Zhen Liu — disambiguation page
- Zhen Liu 0001 — Nokia Research Center, Beijing, China (and 4 more)
- Zhen Liu 0002 — Ningbo University, Faculty of Information Science and Technology, Ningbo, China (and 2 more)
- Zhen Liu 0003 — University of Electronic Science and Technology of China, School of Automation Engineering, Chengdu, China (and 1 more)
- Zhen Liu 0004 — National University of Defense Technology, College of Electronic Science and Engineering, Changsha, China
- Zhen Liu 0005 — Chinese Academy of Sciences, Institute of Microelectronics, Beijing, China
- Zhen Liu 0006 — University of Electronic Science and Technology of China, School of Computer Science and Engineering, Web Sciences Center / Big Data Research Center, Chengdu, China
- Zhen Liu 0007 — California Institute of Technology, Jet Propulsion Laboratory, Pasadena, CA, USA (and 1 more)
- Zhen Liu 0009 — Armed Police Force Engineering University, College of Cryptography Engineering, Xi'an, China
- Zhen Liu 0010 — Shanghai Jiao Tong University, State Key Laboratory of Mechanical System and Vibration, Shanghai, China
- Zhen Liu 0011 — Sun Yat-sen University, School of Civil Engineering, Guangzhou, China
- Zhen Liu 0012 — Ningbo University, Faculty of Electrical Engineering and Computer Science, Ningbo, China
- Zhen Liu 0013 — Guangdong University of Technology, School of Materials and Energy, Guangzhou, China
- Zhen Liu 0014 — Harbin Institute of Technology, School of Mechatronics Engineering, State Key Laboratory of Robotics and System, Harbin, China
- Zhen Liu 0015 — Jiangnan University, School of Internet of Things Engineering, Wuxi, China
- Zhen Liu 0016 — Beihang University, School of Instrumentation Science and Opto-Electronics Engineering, Key Laboratory of Precision Opto-Mechatronics Technology, Beijing, China
- Zhen Liu 0017 — Guangdong Pharmaceutical University, School of Medical Information Engineering, Guangzhou, China (and 1 more)
- Zhen Liu 0018 — Dublin City University, School of Electronic Engineering, Dublin, Ireland (and 1 more)
- Zhen Liu 0019 — Mila - Quebec AI Institute, Montreal, QC, Canada (and 2 more)
- Zhen Liu 0020 — Chinese Academy of Sciences, Institute of Automation, Beijing, China
- Zhen Liu 0021 — Henan Institute of Science and Technology, Network Center, Xinxiang, China
- Zhen Liu 0022 — University of Electronic Science and Technology of China, Chengdu, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Mingxing Hu, Zhen Liu, Xiaojun Ren, Yunhong Zhou:
Linkable ring signature scheme with stronger security guarantees. Inf. Sci. 680: 121164 (2024) - 2023
- [j12]Mingxing Hu, Weijiong Zhang, Zhen Liu:
An Improved Lattice-Based Ring Signature With Unclaimable Anonymity in the Standard Model. Comput. J. 66(10): 2542-2553 (2023) - [j11]Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, Haojin Zhu:
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network. IEEE Trans. Veh. Technol. 72(8): 10682-10695 (2023) - [c32]Chunping Zhu, Xingkai Wang, Zhen Liu:
Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. Inscrypt (1) 2023: 44-64 - [c31]Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu:
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. NDSS 2023 - [i17]Tian Dong, Guoxing Chen, Shaofeng Li, Minhui Xue, Rayne Holland, Yan Meng, Zhen Liu, Haojin Zhu:
Unleashing Cheapfakes through Trojan Plugins of Large Language Models. CoRR abs/2312.00374 (2023) - 2022
- [j10]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu:
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. IEEE Trans. Dependable Secur. Comput. 19(5): 2934-2951 (2022) - [c30]Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu:
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding. ACISP 2022: 469-488 - [c29]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. ESORICS (1) 2022: 89-109 - [c28]Xingkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang:
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption. ESORICS (2) 2022: 105-125 - [c27]Yu Song, Guoshun Fan, Yu Long, Zhen Liu, Xian Xu, Dawu Gu:
Grape: Efficient Hybrid Consensus Protocol Using DAG. DPM/CBT@ESORICS 2022: 258-274 - [c26]Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu:
MixCT: Mixing Confidential Transactions from Homomorphic Commitment. ESORICS (3) 2022: 763-769 - [i16]Mingxing Hu, Weijiong Zhang, Zhen Liu:
An Improved Lattice-Based Ring Signature with Unclaimable Anonymity in the Standard Model. CoRR abs/2206.12093 (2022) - [i15]Rui Wang, Xingkai Wang, Huanhuan Chen, Stjepan Picek, Zhen Liu, Kaitai Liang:
BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering. CoRR abs/2208.10161 (2022) - [i14]Mingxing Hu, Zhen Liu:
Lattice-Based Linkable Ring Signature in the Standard Model. IACR Cryptol. ePrint Arch. 2022: 101 (2022) - [i13]Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu:
Secure Hierarchical Deterministic Wallet Supporting Stealth Address. IACR Cryptol. ePrint Arch. 2022: 627 (2022) - [i12]Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu:
MixCT: Mixing Confidential Transactions from Homomorphic Commitment. IACR Cryptol. ePrint Arch. 2022: 951 (2022) - 2021
- [j9]Zhen Liu, Qiong Huang, Duncan S. Wong:
On Enabling Attribute-Based Encryption to Be Traceable Against Traitors. Comput. J. 64(4): 575-598 (2021) - [c25]Geng Wang, Ming Wan, Zhen Liu, Dawu Gu:
Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption. Inscrypt 2021: 421-441 - [c24]Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu, Yu Yu:
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK). ESORICS (2) 2021: 332-351 - 2020
- [c23]Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang, Yu Yu:
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. ESORICS (2) 2020: 357-377
2010 – 2019
- 2019
- [j8]Nanyuan Cao, Zhenfu Cao, Zhen Liu, Xiaolei Dong, Xiaopeng Zhao:
All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application. Comput. J. 62(8): 1148-1157 (2019) - [j7]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and efficient scheme in Zerocash. Comput. Secur. 86: 112-131 (2019) - [j6]Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long:
Fork-free hybrid consensus with flexible Proof-of-Activity. Future Gener. Comput. Syst. 96: 515-524 (2019) - [j5]Erdong Deng, Huajun Zhang, Peilin Wu, Fei Guo, Zhen Liu, Haojin Zhu, Zhenfu Cao:
Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing. Inf. Sci. 504: 354-371 (2019) - [c22]Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, Duncan S. Wong:
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses. ESORICS (1) 2019: 726-746 - [c21]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. EuroS&P 2019: 215-230 - [c20]Geng Wang, Zhen Liu, Dawu Gu:
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption. ICICS 2019: 378-396 - [c19]Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu, Ning Liu:
A Practical Dynamic Enhanced BFT Protocol. NSS 2019: 288-304 - [c18]Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu:
Gnocchi: Multiplexed Payment Channels for Cryptocurrencies. NSS 2019: 488-503 - [c17]Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia:
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility. ProvSec 2019: 339-346 - [c16]Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu, Zhen Liu, Yu Long:
Towards a Multi-chain Future of Proof-of-Space. SecureComm (1) 2019: 23-38 - [c15]Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu:
Making Monero Hard-to-Trace and More Efficient. TrustCom/BigDataSE 2019: 514-521 - [c14]Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu:
A Secure and Practical Blockchain Scheme for IoT. TrustCom/BigDataSE 2019: 538-545 - 2018
- [c13]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. ACISP 2018: 687-705 - [c12]Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu:
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol. Inscrypt 2018: 49-69 - [c11]Hao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, Dawu Gu:
Dynamic Practical Byzantine Fault Tolerance. CNS 2018: 1-8 - [c10]Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Ning Ding:
Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain. NSS 2018: 1-15 - [i11]Cencen Wan, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu, Shuyang Tang:
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol. IACR Cryptol. ePrint Arch. 2018: 407 (2018) - [i10]Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang:
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. IACR Cryptol. ePrint Arch. 2018: 956 (2018) - [i9]Zhen Liu, Duncan S. Wong:
On Enabling Attribute-Based Encryption to Be Traceable against Traitors. IACR Cryptol. ePrint Arch. 2018: 963 (2018) - 2017
- [c9]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. CLOSER 2017: 281-292 - [i8]Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, Yu Long:
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity. IACR Cryptol. ePrint Arch. 2017: 367 (2017) - [i7]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. IACR Cryptol. ePrint Arch. 2017: 684 (2017) - 2016
- [j4]Zhen Liu, Duncan S. Wong:
Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe. Comput. J. 59(7): 983-1004 (2016) - [j3]Hao Wang, Zhen Liu, Zhe Liu, Duncan S. Wong:
Identity-based aggregate signcryption in the standard model from multilinear maps. Frontiers Comput. Sci. 10(4): 741-754 (2016) - [c8]Zhen Liu, Duncan S. Wong, Jack Poon:
Dealerless Corporate Key Generation for Identity-Based Encryption Schemes. AsiaCCS 2016: 211-222 - [i6]Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. IACR Cryptol. ePrint Arch. 2016: 1140 (2016) - 2015
- [j2]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. IEEE Trans. Inf. Forensics Secur. 10(1): 55-68 (2015) - [c7]Zhen Liu, Duncan S. Wong:
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe. ACNS 2015: 127-146 - [c6]Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable. ICICS 2015: 109-124 - [i5]Zhen Liu, Duncan S. Wong:
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable. IACR Cryptol. ePrint Arch. 2015: 850 (2015) - 2014
- [c5]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. Inscrypt 2014: 403-423 - [c4]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS (1) 2014: 326-343 - [i4]Zhen Liu, Duncan S. Wong:
Practical Attribute Based Encryption: Traitor Tracing, Revocation, and Large Universe. IACR Cryptol. ePrint Arch. 2014: 616 (2014) - [i3]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts. IACR Cryptol. ePrint Arch. 2014: 676 (2014) - 2013
- [j1]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. IEEE Trans. Inf. Forensics Secur. 8(1): 76-88 (2013) - [c3]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. CCS 2013: 475-486 - 2012
- [c2]Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang:
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. ICISC 2012: 231-246 - [i2]Zhen Liu, Zhenfu Cao, Duncan S. Wong:
Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2012: 669 (2012) - 2011
- [c1]Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen:
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. ESORICS 2011: 278-297 - 2010
- [i1]Zhen Liu, Zhenfu Cao:
On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2010: 374 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-16 23:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint