Follow
Zi-Yuan Liu
Zi-Yuan Liu
National Chengchi University & Kanazawa University
Verified email at nccu.edu.tw - Homepage
Title
Cited by
Cited by
Year
Distributed E-voting and E-bidding systems based on smart contract
R Tso, ZY Liu, JH Hsiao
Electronics 8 (4), 422, 2019
642019
Malware image classification using one-shot learning with siamese networks
SC Hsiao, DY Kao, ZY Liu, R Tso
Procedia Computer Science 159, 1863-1871, 2019
582019
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
402022
An improved non-interactive zero-knowledge range proof for decentralized applications
YC Tsai, R Tso, ZY Liu, K Chen
2019 IEEE International Conference on Decentralized Applications and …, 2019
232019
Public-key authenticated encryption with keyword search: A generic construction and its quantum-resistant instantiation
ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen
The Computer Journal 65 (10), 2828-2844, 2022
222022
Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems
ZY Liu, YF Tseng, R Tso, YC Chen, M Mambo
IEEE Systems Journal 16 (3), 4629-4640, 2022
212022
Cryptanalysis of a round optimal lattice-based multisignature scheme
ZY Liu, YF Tseng, R Tso
Information Processing Letters 182, 106364, 2023
132023
Designated-ciphertext Searchable Encryption
ZY Liu, YF Tseng, R Tso, M Mambo
Journal of Information Security and Applications 58, 102709, 2021
102021
Partially Blind ECDSA Scheme and Its Application to Bitcoin
H Huang, ZY Liu, R Tso
2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021
82021
Identity-based blind multisignature from lattices
R Tso, ZY Liu, YF Tseng
IEEE Access 7, 182916-182923, 2019
82019
Quantum‐resistant anonymous identity‐based encryption with traceable identities
ZY Liu, YF Tseng, R Tso, M Mambo, YC Chen
IET Information Security 16 (2), 111-126, 2022
6*2022
Defense against N-pixel Attacks based on Image Reconstruction
ZY Liu, PS Wang, SC Hsiao, R Tso
Proceedings of the 8th International Workshop on Security in Blockchain and …, 2020
62020
Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things"
ZY Liu, YF Tseng, R Tso
IACR Cryptol. ePrint Arch. 2020, 651, 2020
62020
Practical inner product encryption with constant private key
YF Tseng, ZY Liu, R Tso
Applied Sciences 10 (23), 8669, 2020
52020
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT
CY Lee, ZY Liu, R Tso, YF Tseng
Journal of Systems Architecture 130, 102642, 2022
42022
Extension of elliptic curve qu–vanstone certificates and their applications
ZY Liu, YF Tseng, R Tso, PS Wang, QW Su
Journal of Information Security and Applications 67, 103176, 2022
42022
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search
ZY Liu, YF Tseng, R Tso, CY Lee
42021
Improved proxy re-encryption scheme with equality test
CC Yang, R Tso, ZY Liu, JC Hsu, YF Tseng
2021 16th Asia Joint Conference on Information Security (AsiaJCIS), 37-44, 2021
32021
PrivGRU: Privacy-preserving GRU inference using additive secret sharing
SC Hsiao, ZY Liu, R Tso, DY Kao, CM Chen
Journal of Intelligent & Fuzzy Systems 38 (5), 5627-5638, 2020
32020
Signcryption from NTRU lattices without random oracles
ZY Liu, R Tso, YF Tseng, M Mambo
2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 134-141, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20