default search action
Bei Liang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Dongyu Wu, Bei Liang, Zijie Lu, Jintai Ding:
Efficient Secure Multi-party Computation for Multi-dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification. CANS (1) 2024: 3-25 - 2023
- [i8]Dongyu Wu, Bei Liang, Zijie Lu, Jintai Ding:
Efficient Secure Multiparty Computation for Multidimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification. IACR Cryptol. ePrint Arch. 2023: 1863 (2023) - 2021
- [j6]Shimin Li, Bei Liang, Aikaterini Mitrokotsa, Rui Xue:
Homomorphic signcryption with public plaintext-result checkability. IET Inf. Secur. 15(5): 333-350 (2021) - [c25]Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. ACISP 2021: 510-528 - [c24]Georgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas, Aikaterini Mitrokotsa:
sf DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning. ISC 2021: 296-319 - [c23]Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka:
Turn-Based Communication Channels. ProvSec 2021: 376-392 - [i7]Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. IACR Cryptol. ePrint Arch. 2021: 654 (2021) - [i6]Carlo Brunetta, Mario Larangeira, Bei Liang, Aikaterini Mitrokotsa, Keisuke Tanaka:
Turn-Based Communication Channels. IACR Cryptol. ePrint Arch. 2021: 1126 (2021) - 2020
- [j5]Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Statically Aggregate Verifiable Random Functions and Application to E-Lottery. Cryptogr. 4(4): 37 (2020) - [i5]Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang:
Compact Authenticated Key Exchange in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2020: 1282 (2020)
2010 – 2019
- 2019
- [j4]Xueqing Wang, Biao Wang, Bei Liang, Rui Xue:
A more compact multi-id identity-based FHE scheme in the standard model and its applications. Sci. China Inf. Sci. 62(3): 39101:1-39101:3 (2019) - [j3]Bei Liang, Aikaterini Mitrokotsa:
Decentralised Functional Signatures. Mob. Networks Appl. 24(3): 934-946 (2019) - [c22]Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni:
Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications. ACISP 2019: 609-619 - [c21]Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni:
Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications. INDOCRYPT 2019: 297-317 - [c20]Bei Liang, Aikaterini Mitrokotsa:
Robust Distributed Pseudorandom Functions for mNP Access Structures. ISC 2019: 107-126 - [c19]Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa:
Code-Based Zero Knowledge PRF Arguments. ISC 2019: 171-189 - [c18]Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni:
Hierarchical Functional Signcryption: Notion and Construction. ProvSec 2019: 167-185 - 2018
- [j2]Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa:
Lattice-Based Simulatable VRFs: Challenges and Future Directions. J. Internet Serv. Inf. Secur. 8(4): 57-69 (2018) - [c17]Shimin Li, Bei Liang, Rui Xue:
Private Functional Signatures: Definition and Construction. ACISP 2018: 284-303 - [c16]Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He:
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism. ASIACRYPT (2) 2018: 158-189 - [c15]Xin Wang, Bei Liang, Shimin Li, Rui Xue:
On Constructing Pairing-Free Identity-Based Encryptions. ISC 2018: 308-327 - [c14]Georgia Tsaloli, Bei Liang, Aikaterini Mitrokotsa:
Verifiable Homomorphic Secret Sharing. ProvSec 2018: 40-55 - [i4]Xiu Xu, Haiyang Xue, Kunpeng Wang, Song Tian, Bei Liang, Wei Yu:
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny. IACR Cryptol. ePrint Arch. 2018: 760 (2018) - [i3]Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He:
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2018: 817 (2018) - 2017
- [c13]Bei Liang, Aikaterini Mitrokotsa:
Distributed Pseudorandom Functions for General Access Structures in NP. ICICS 2017: 81-87 - [c12]Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang:
Compact Hierarchical IBE from Lattices in the Standard Model. ICICS 2017: 210-221 - [c11]Bei Liang, Aikaterini Mitrokotsa:
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper). ISPEC 2017: 422-431 - [c10]Carlo Brunetta, Christos Dimitrakakis, Bei Liang, Aikaterini Mitrokotsa:
A Differentially Private Encryption Scheme. ISC 2017: 309-326 - [i2]Bei Liang, Aikaterini Mitrokotsa:
Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2017: 969 (2017) - 2015
- [j1]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Secure Mobile Agent from Leakage-Resilient Proxy Signatures. Mob. Inf. Syst. 2015: 901418:1-901418:12 (2015) - [c9]Bei Liang, Hongda Li, Jinyong Chang:
Verifiable Random Functions from (Leveled) Multilinear Maps. CANS 2015: 129-143 - [c8]Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, Fei Tang:
One-Round Witness Indistinguishability from Indistinguishability Obfuscation. ISPEC 2015: 559-574 - [c7]Bei Liang, Hongda Li, Jinyong Chang:
The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. ISC 2015: 21-41 - [c6]Bei Liang, Hongda Li, Jinyong Chang:
Constrained Verifiable Random Functions from Indistinguishability Obfuscation. ProvSec 2015: 43-60 - 2014
- [c5]Bei Liang, Rui Zhang, Hongda Li:
Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions. Inscrypt 2014: 193-206 - [c4]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. ISPEC 2014: 418-432 - [c3]Fei Tang, Hongda Li, Bei Liang:
Attribute-Based Signatures for Circuits from Multilinear Maps. ISC 2014: 54-71 - 2013
- [c2]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Leakage-Resilient Proxy Signatures. INCoS 2013: 495-502 - [c1]Hongda Li, Qihua Niu, Bei Liang:
Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP. NSS 2013: 365-380 - [i1]Fei Tang, Hongda Li, Qihua Niu, Bei Liang:
Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. IACR Cryptol. ePrint Arch. 2013: 785 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint