default search action
Zi-Yuan Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, Yi-Fan Tseng:
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems. Comput. Stand. Interfaces 89: 103817 (2024) - [j12]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives. Des. Codes Cryptogr. 92(6): 1477-1500 (2024) - [c18]Yi-Fan Tseng, Raylin Tso, Shi-Sheng Sun, Zi-Yuan Liu, You-Qian Chen:
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications. AsiaJCIS 2024: 33-39 - 2023
- [j11]Mingmei Zheng, Zi-Yuan Liu, Masahiro Mambo:
A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch. IEEE Access 11: 62510-62521 (2023) - [j10]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of a round optimal lattice-based multisignature scheme. Inf. Process. Lett. 182: 106364 (2023) - [i13]Zi-Yuan Liu, Raylin Tso:
Comments on "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption". CoRR abs/2311.08813 (2023) - 2022
- [j9]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation. Comput. J. 65(10): 2828-2844 (2022) - [j8]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant anonymous identity-based encryption with trable identities. IET Inf. Secur. 16(2): 111-126 (2022) - [j7]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Peter Shaojui Wang, Qin-Wen Su:
Extension of elliptic curve Qu-Vanstone certificates and their applications. J. Inf. Secur. Appl. 67: 103176 (2022) - [j6]Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng:
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT. J. Syst. Archit. 130: 102642 (2022) - [j5]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems. IEEE Syst. J. 16(3): 4629-4640 (2022) - [c17]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. AsiaCCS 2022: 423-436 - [c16]Yi-Fan Tseng, Hao-Yu Yang, Chieh-Han Wu, Tsung-Yu Chien, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu:
Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption. AsiaJCIS 2022: 29-32 - [c15]Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Public Key Encryption with Hierarchical Authorized Keyword Search. ICISC 2022: 147-170 - [c14]Yi-Hsiu Lee, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng:
Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuance. ISPEC 2022: 21-38 - [c13]Yu-Chen Liao, Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng:
Blockchain-Based Confidential Payment System with Controllable Regulation. ISPEC 2022: 39-56 - [c12]Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices. IWSEC 2022: 166-186 - 2021
- [j4]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Designated-ciphertext searchable encryption. J. Inf. Secur. Appl. 58: 102709 (2021) - [j3]Yi-Fan Tseng, Zi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso:
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function. Secur. Commun. Networks 2021: 6678194:1-6678194:12 (2021) - [c11]Chih-Chen Yang, Raylin Tso, Zi-Yuan Liu, Jen-Chieh Hsu, Yi-Fan Tseng:
Improved Proxy Re-encryption Scheme with Equality Test. AsiaJCIS 2021: 37-44 - [c10]Hongxun Huang, Zi-Yuan Liu, Raylin Tso:
Partially Blind ECDSA Scheme and Its Application to Bitcoin. DSC 2021: 1-8 - [c9]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'. ISPACS 2021: 1-2 - [i12]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Cheng-Yi Lee:
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search. IACR Cryptol. ePrint Arch. 2021: 7 (2021) - [i11]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant Anonymous IBE with Traceable Identities. IACR Cryptol. ePrint Arch. 2021: 33 (2021) - [i10]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System. IACR Cryptol. ePrint Arch. 2021: 337 (2021) - [i9]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'. IACR Cryptol. ePrint Arch. 2021: 359 (2021) - [i8]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. IACR Cryptol. ePrint Arch. 2021: 1008 (2021) - 2020
- [j2]Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso, Da-Yu Kao, Chien-Ming Chen:
PrivGRU: Privacy-preserving GRU inference using additive secret sharing. J. Intell. Fuzzy Syst. 38(5): 5627-5638 (2020) - [c8]Zi-Yuan Liu, Peter Shaojui Wang, Shou-Ching Hsiao, Raylin Tso:
Defense against N-pixel Attacks based on Image Reconstruction. SBC@AsiaCCS 2020: 3-7 - [c7]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism. AsiaJCIS 2020: 1-8 - [c6]Hsiang-Chen Hsu, Zi-Yuan Liu, Raylin Tso, Kung Chen:
Multi-value Private Information Retrieval using Homomorphic Encryption. AsiaJCIS 2020: 82-88 - [c5]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Practical Predicate Encryption for Inner Product. ICETE (2) 2020: 553-558 - [i7]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
Practical Predicate Encryption for Inner Product. IACR Cryptol. ePrint Arch. 2020: 270 (2020) - [i6]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things". IACR Cryptol. ePrint Arch. 2020: 651 (2020) - [i5]Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso:
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2020: 713 (2020) - [i4]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things. IACR Cryptol. ePrint Arch. 2020: 955 (2020) - [i3]Shou-Ching Hsiao, Zi-Yuan Liu, Raylin Tso:
A Study on Privacy-Preserving GRU Inference Framework. IACR Cryptol. ePrint Arch. 2020: 1013 (2020) - [i2]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Cryptanalysis of a round optimal lattice-based multisignature scheme. IACR Cryptol. ePrint Arch. 2020: 1172 (2020)
2010 – 2019
- 2019
- [j1]Raylin Tso, Zi-Yuan Liu, Yi-Fan Tseng:
Identity-Based Blind Multisignature From Lattices. IEEE Access 7: 182916-182923 (2019) - [c4]Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Signcryption from NTRU Lattices Without Random Oracles. AsiaJCIS 2019: 134-141 - [c3]Ya Che Tsai, Raylin Tso, Zi-Yuan Liu, Kung Chen:
An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications. DAPPCON 2019: 129-134 - [c2]Shou-Ching Hsiao, Da-Yu Kao, Zi-Yuan Liu, Raylin Tso:
Malware Image Classification Using One-Shot Learning with Siamese Networks. KES 2019: 1863-1871 - [i1]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso:
Quantum-resistant Designated-ciphertext Searchable Encryption. IACR Cryptol. ePrint Arch. 2019: 1418 (2019) - 2018
- [c1]Zi-Yuan Liu, Jen-Chieh Hsu, Raylin Tso, Tzong-Chen Wu:
Policy-Controlled Signature from NTRU Lattice. NTMS 2018: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint