Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Qiang Tang - MaRDI portal

Qiang Tang

From MaRDI portal
Person:476850

Available identifiers

zbMath Open tang.qiangMaRDI QIDQ476850

List of research outcomes

PublicationDate of PublicationType
Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting)2023-11-16Paper
Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)2023-05-12Paper
Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy2023-04-13Paper
CCA updatable encryption against malicious re-encryption attacks2023-03-29Paper
Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment2022-12-01Paper
Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service2022-10-14Paper
Making \textit{any} attribute-based encryption accountable, efficiently2022-08-25Paper
Making Any Identity-Based Encryption Accountable, Efficiently2022-08-19Paper
Witness authenticating NIZKs and applications2022-05-18Paper
Multi-input laconic function evaluation2021-06-08Paper
Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited2021-03-15Paper
A survey on true random number generators based on chaos2020-02-18Paper
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog2020-01-28Paper
Graded signatures2018-10-18Paper
Key recovery attacks against NTRU-based somewhat homomorphic encryption schemes2018-10-18Paper
Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications2018-10-18Paper
Correcting subverted random oracles2018-09-26Paper
Making public key functional encryption function private, distributively2018-05-29Paper
Updatable functional encryption2017-10-23Paper
A Homotopy Method for Locating All the Poles of a Parallel Plate Waveguide With the PML2017-09-20Paper
Cliptography: Clipping the Power of Kleptographic Attacks2017-01-06Paper
Honey Encryption Beyond Message Recovery Security2016-09-09Paper
Communication Optimal Tardos-Based Asymmetric Fingerprinting2016-03-02Paper
Towards Forward Security Properties for PEKS and IBE2015-10-20Paper
On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes2015-09-17Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
New Algorithms for Secure Outsourcing of Modular Exponentiations2013-10-23Paper
Extended KCI attack against two-party key establishment protocols2013-04-04Paper
Public key encryption schemes supporting equality test with authorisation of different granularity2012-11-16Paper
Towards a security model for computational puzzle schemes2011-11-29Paper
KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks2011-07-29Paper
https://portal.mardi4nfdi.de/entity/Q30167182011-07-19Paper
Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization2011-07-07Paper
COMPARISON OF DIFFERENT DAILY STREAMFLOW SERIES IN US AND CHINA, UNDER A VIEWPOINT OF COMPLEX NETWORKS2010-09-23Paper
TF/TA<sup>2</sup> trajectory tracking using nonlinear predictive control approach2009-11-06Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security2009-09-29Paper
Inter-domain Identity-Based Proxy Re-encryption2009-04-29Paper
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication2009-03-06Paper
Type-Based Proxy Re-encryption and Its Construction2009-01-22Paper
SCALING BEHAVIOR OF DIFFUSION LIMITED AGGREGATION IN PERCOLATION CLUSTER2008-11-03Paper
https://portal.mardi4nfdi.de/entity/Q35184162008-08-07Paper
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability2008-06-24Paper
Extended Private Information Retrieval and Its Application in Biometrics Authentications2008-04-15Paper
Applied Cryptography and Network Security2007-05-02Paper
Information and Communications Security2006-10-24Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Qiang Tang