Chosen-ciphertext secure proxy re-encryption without pairings RH Deng, J Weng, S Liu, K Chen Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008 | 363 | 2008 |
Attribute-based encryption with efficient verifiable outsourced decryption B Qin, RH Deng, S Liu, S Ma IEEE Transactions on Information Forensics and Security 10 (7), 1384-1393, 2015 | 243 | 2015 |
Insight of the protection for data security under selective opening attacks Z Huang, S Liu, X Mao, K Chen, J Li Information Sciences 412, 223-241, 2017 | 165 | 2017 |
ID-based one round authenticated tripartite key agreement protocol with pairings F Zhang, S Liu, K Kim Cryptology ePrint Archive, 2002 | 130 | 2002 |
ID-based restrictive partially blind signatures and applications X Chen, F Zhang, S Liu Journal of Systems and Software 80 (2), 164-171, 2007 | 96 | 2007 |
Identity-based conditional proxy re-encryption D Zhou, K Chen, S Liu, D Zheng Chinese Journal of Electronics 22 (1), 61-66, 2013 | 79 | 2013 |
Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter B Qin, S Liu Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 69 | 2013 |
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks S Liu, J Weng, Y Zhao Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013 | 68 | 2013 |
Server-aided revocable identity-based encryption B Qin, RH Deng, Y Li, S Liu Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 67 | 2015 |
A practical protocol for advantage distillation and information reconciliation S Liu, HCA Van Tilborg, M Van Dijk Designs, Codes and Cryptography 30, 39-62, 2003 | 66 | 2003 |
Efficient CCA-secure PKE from identity-based techniques J Lai, RH Deng, S Liu, W Kou Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010 | 57 | 2010 |
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings J Weng, RH Deng, S Liu, K Chen Information Sciences 180 (24), 5077-5089, 2010 | 52 | 2010 |
Identity-based key-insulated signature with secure key-updates J Weng, S Liu, K Chen, X Li Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006 …, 2006 | 52 | 2006 |
Robustly reusable fuzzy extractor from standard assumptions Y Wen, S Liu Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 50 | 2018 |
Identity-based threshold key-insulated encryption without random oracles J Weng, S Liu, K Chen, D Zheng, W Qiu Cryptographers’ Track at the RSA Conference, 203-220, 2008 | 47 | 2008 |
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption Y Wen, S Liu, S Han Designs, Codes and Cryptography 86, 2495-2512, 2018 | 46 | 2018 |
Single hop detection of node clone attacks in mobile wireless sensor networks Y Lou, Y Zhang, S Liu Procedia Engineering 29, 2798-2803, 2012 | 46 | 2012 |
Authenticated key exchange and signatures with tight security in the standard model S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge Annual International Cryptology Conference, 670-700, 2021 | 36 | 2021 |
Identity-based encryption secure against selective opening chosen-ciphertext attack J Lai, RH Deng, S Liu, J Weng, Y Zhao Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 36 | 2014 |
Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing B Qin, S Liu Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 36 | 2014 |