Publication

Patent:

·         Singapore Patent:

    Title: A Method Of Signing A Message

            Patent number (granted) : 167062, granted on 15/12/2011

·         Australia Patent

Title: Transaction Protocol

Patent application number (filed) : 2019903694, filed on 01/10/2019

 

Contribution to International Standard:

·         ISO/IEC 29192-4:2013 Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques

Keynote Speech:

·         The 15th International Conference on Information Security and Cryptology (Inscrypt 2019), Nanjing, China, 6-8 December, 2019

Title: Ring Confidential Transaction Protocol for Blockchain

·         The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2019), Rotorua, New Zealand, 5-8 August, 2019

Title: A Blockchain-enabled Society

·         2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2019), Auckland, New Zealand, 8 July, 2019

Title: A Blockchain-enabled Society

·         The 24th Australasian Conference on Information Security and Privacy (ACISP 2019), Christchurch, New Zealand, 3-5 July, 2019

Title: Advanced Forward and Backward Searchable Symmetric Encryption

·         The 11th International Conference on Provable Security (ProvSec 2017), Xian, 23-25 October, 2017

Title: (Linkable) Ring Signature and its Applications to Blockchain

·         IEEE International Symposium on Security and Privacy in Social Networks and Big Data (IEEE SocialSec 2016), Fiji, 7-10 December, 2016

Title: Advanced Techniques on Searchable Encryption


Best Paper Award:

·          Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph Liu, “TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing”, Information Security Practice and Experience (ISPEC) 2014. - Best Student Paper Award.

·         Tsz Hon Yuen, Ye Zhang, S. M. Yiu, Joseph K. Liu, “Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks”, European Symposium on Research in Computer Security (ESORICS) 2014. - Best Paper Award.

·         Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Raymond Choo and Jianying Zhou, “Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data Encryption”, European Symposium on Research in Computer Security (ESORICS) 2015. - Best Paper Award.

·         Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld, “Multi-user Cloud-Based Secure Keyword Search”, Australasian Conference on Information Security and Privacy (ACISP) 2017. - Best Paper Award.

Selected Recent Publications:

·         Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding, “DualRing: Generic Construction of Ring Signatures with Efficient Instantiations”, CRYPTO 2021.

·         Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Nepal Surya, “OblivSketch: Oblivious Network Measurement as a Cloud Service”, NDSS 2021.

·         Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu, “Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy”, NDSS 2021.

·         Haoran Yuan, Xiaofeng Chen, Guowen Xu, Jianting Ning, Joseph K. Liu, Robert Deng, “Efficient and Verifiable Proof of Replication with Fast Fault Localization”, IEEE INFOCOM 2021.

·         Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu, “MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol”, ACM CCS 2019.

·         Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu, “Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications”, CRYPTO 2019.

·         Yevhen Zolotavkin, Julian Garcia, Joseph K. Liu, “Time-dependent Decision-making and Decentralization in Proof-of-Work Cryptocurrencies”, IEEE Computer Security Foundations Symposium (CSF) 2019.

·         Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu*, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo, “Result Pattern Hiding Searchable Encryption for Conjunctive Queries”. ACM CCS. 2018.

·         Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal, “Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption”. ACM CCS. 2018.

·         Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu*, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng, “Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)”, ACISP 2018.

·         Shabnam Kasra Kermanshahi, Joseph K. Liu and Ron Steinfeld, “Multi-user Cloud-based Secure Keyword Search”, ACISP 2017. [Best Student Paper]

·         Shi-feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, “RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero”, ESORICS 2017.

·         Shi-Feng Sun, Joseph K. Liu*, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, “An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries”, ESORICS 2016.

·         Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Raymond Choo and Jianying Zhou, “Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data Encryption”, ESORICS 2015. [Best Paper]

·         Tsz Hon Yuen, Ye Zhang, S. M. Yiu, Joseph K. Liu, “Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks”, ESORICS, 2014. [Best Paper]

 Journal Publication:

My Google Citation Profile: http://scholar.google.com/citations?user=GGe9ON8AAAAJ&hl

 (* - corresponding author)  [2021 impact factor] (with The Computing Research and Education Association of Australasia – CORE 2020 Journal Ranking)

2022

1.    Xiaofeng Chen, Yunling Wang, Jianfeng Wang, Shi-Feng Sun, Joseph K. Liu, “Achieving Searchable Encryption Scheme with Search Pattern Hidden”, IEEE Transactions on Services Computing. Accepted for publication. (Acceptance Date: 06/02/2020) [impact factor: 8.216] [CORE Rank A*]

2.    Jianting Ning, Jiageng Chen, Kaitai Liang, Joseph K. Liu, Chunhua Su, Qianhong Wu, “Efficient Encrypted Data Search with Expressive Queries and Flexible Update”, IEEE Transactions on Services Computing. Accepted for publication. (Acceptance Date: 22/06/2020) [impact factor: 8.216] [CORE Rank A*]

3.    Shangqi Lai, Shifeng Sun, Joseph K. Liu, Xingliang Yuan, Ron Steinfeld, Amin Sakzad, Dongxi Liu “Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes”, IEEE Transactions on Dependable and Secure Computing. Accepted for publication. (Acceptance Date: 04/03/2021) [impact factor: 7.329] [CORE Rank A]

4.    Viet Vo, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Surya Nepal, Cong Wang, “ShieldDB: An Encrypted Document Database with Padding Countermeasures”, IEEE Transactions on Knowledge and Data Engineering. Accepted for publication. (Acceptance Date: 27/10/2021) [impact factor: 6.977] [CORE Rank A*]

5.    Shi-Feng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu, “Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation”, IEEE Transactions on Dependable and Secure Computing. 19(1): 452-467 (2022) [impact factor: 7.329] [CORE Rank A]

6.    Shabnam Kasra, Shi-Feng Sun, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Franky Lau, Man Ho Au, “Geometric range search on encrypted data  with Forward/Backward security”, IEEE Transactions on Dependable and Secure Computing. 19(1) 698-716 (2022) [impact factor: 7.329] [CORE Rank A]

7.    Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Chun Shao, Josef Pieprzyk, Lei Xu, “Forward and Backward Private DSSE for Range Queries”, IEEE Transactions on Dependable and Secure Computing. 19(1): 328-338 (2022) [impact factor: 7.329] [CORE Rank A]

8.    Yanxue Jia, Shifeng Sun, Yuncong Zhang, Qingzhao Zhang, Ning Ding, Zhiqiang Liu, Joseph K. Liu, Dawu Gu, “PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions”, IEEE Transactions on Dependable and Secure Computing. 19(1): 647-662 (2022) [impact factor: 7.329] [CORE Rank A]

 

2021

9.    Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Xinyi Huang, Joseph K. Liu, “Efficient and Adaptive Procurement Protocol with Purchasing Privacy”, IEEE Transactions on Services Computing. 14(3): 683-694 (2021) [impact factor: 8.216] [CORE Rank A*]

10. Shabnam Kasra, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Shanghai Lai, Randolph Loh, Cong Zuo, “Multi-client Cloud-based Symmetric Searchable Encryption”, IEEE Transactions on Dependable and Secure Computing. 18(5): 2419-2437 (2021) [impact factor: 7.329] [CORE Rank A]

11. Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, “Lattice-based zero-knowledge arguments for additive and multiplicative relations”, Designs, Codes and Cryptography. 89(5): 925-963 (2021) [impact factor: 1.492]

12. Fan Zhang, Ziyuan Liang, Cong Zuo, Jun Shao, Jianting Ning, Jun Sun, Joseph K. Liu, Yibao Bao, “hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 40(6): 1144-1157 (2021) [impact factor: 2.807]

13. Lei Xu, Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Cong Zuo, Chungen Xu, “Enabling Authorized Encrypted Search for Multi-Authority Medical Databases”, IEEE Transactions on Emerging Topics in Computing 9(1): 534-546 (2021) [impact factor: 7.691]

 

2020

14. Lei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang, “Building a dynamic searchable encrypted medical database for multi-client”, Information Sciences 527: 394-405 (2020) [impact factor: 6.795] [CORE Rank A]

15.  Xiaoqiang Sun, Peng Zhang, Joseph K. Liu, Jianping Yu, Weixin Xie, “Private machine learning classification based on fully homomorphic encryption”, IEEE Transactions on Emerging Topics in Computing 8(2): 352-364 (2020) [impact factor: 7.691]

16. Kai He, Jun Guo, Jian Weng, Jiasi Weng, Joseph K. Liu, Xun Yi, “Attribute-based Hybrid Boolean Keyword Search over Outsourced Encrypted Data”, IEEE Transactions on Dependable and Secure Computing 17(6): 1207-1217 (2020) [impact factor: 7.329] [CORE Rank A]

17. Xiaoyu Zhang, Xiaofeng Chen, Joseph K. Liu, Yang Xiang, “DeepPAR and DeepDPA: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT”, IEEE Transactions on Industrial Informatics 16(3): 2081-2090 (2020) [impact factor: 10.215]

18. Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu, “Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets”, IEEE Internet of Things Journal 7(4): 2651-2662 (2020) [impact factor: 9.471]

19.  Xiao Yang, Wang Fat Lau, Qingqing Ye, Man Ho Au, Joseph K. Liu, Jacob Cheng, “Practical Escrow Protocol for Bitcoin”, IEEE Transactions on Information Forensics and Security 15: 3023-3034 (2020) [impact factor: 7.178] [CORE Rank A]

 

 

2019

20. Xiao Zhang, Shengli Liu, Dawu Gu, Joseph K. Liu, “A generic construction of tightly secure signatures in the multi-user setting”, Theoretical Computer Science 775: 32-52 (2019) [impact factor: 0.827] [CORE Rank A]

21. Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya, “Efficient threshold password-authenticated secret sharing protocols for cloud computing”, Journal of Parallel and Distributed Computing 128: 57-70 (2019) [impact factor: 3.734] [CORE Rank A]

22. Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen, “Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption”, Journal of Universal Computer Science 25 (3): 222-244 (2019)

23. Bin Yu, Joseph K. Liu, Surya Nepal, Jiangshan Yu, Paul Rimba, “Proof-of-QoS: QoS based blockchain consensus protocol”, Computers & Security 87 (2019) [impact factor: 4.438]

 

 

2018

24. Bin Yu, Jarod Wright, Surya Nepal, Liming Zhu, Joseph K. Liu, Rajiv Ranjan, “IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain”, IEEE Cloud Computing 5(4): 12-23 (2018) [impact factor: 4.393]

25.  Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu, “An Efficient Access Control Scheme with Outsourcing Capability and Attribute Update for Fog Computing”, Future Generation Computer Systems 78: 753-762 (2018) [impact factor: 7.187] [CORE Rank A]

26. Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu, “Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption”, Cryptography 2(4): 33 (2018)

27.  Zehong Chen, Fangguo Zhang, Peng Zhang, Joseph K. Liu, Jiwu Huang, Hanbang Zhao, Jian Shen, “Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control”, Future Generation Computer Systems 87: 712-724 (2018) [impact factor: 7.187] [CORE Rank A]

28. Jinguang Han, Ye Yang, Joseph K. Liu, Jiguo Li, Kaitai Liang, Jian Shen, “Expressive attribute-based keyword search with constant-size ciphertext”, Soft Computing, 22(15): 5163-5177 (2018) [impact factor: 3.643]

29.  Peng Zhang, Joseph K. Liu*, F. Richard Yu, Mehdi Sookhak, Man Ho Au and Xiapu Luo, “A Survey on Access Control in Fog Computing”, IEEE Communications Magazine  15(2): 144-149 (2018). [impact factor: 9.619]

30. Man Ho Au, Kaitai Liang, Joseph K. Liu*, Rongxing Lu, Jianting Ning, “Privacy-Preserving Personal Data Operation on Mobile Cloud - Chances and Challenges over Advanced Persistent Threat”, Future Generation Computer Systems 79: 337-349 (2018). [impact factor: 7.187] [CORE Rank A]

31. Yang Li, Xiaoling Tao, Wei Wu, Joseph K. Liu, “GO-CP-ABE: group-oriented ciphertext attribute-based encryption”, International Journal of Embedded Systems 10(1): 62-70 (2018).

32. Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu, Yu Long, “Access control encryption with efficient verifiable sanitized decryption”, Information Sciences 465: 72-85 (2018) [impact factor: 6.795] [CORE Rank A]

33. Cong Zuo, Jun Shao, Joseph K. Liu, Guiyi Wei and Yun Ling, “Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage”, IEEE Transactions on Information Forensics and Security 13(1): 186-196 (2018). [impact factor: 7.178] [CORE Rank A]

34. Hui Cui, Robert H. Deng, Joseph K. Liu, Xun Yi, Yingjiu Li, “Server-Aided Attribute-Based Signature with Revocation for Resource-Constrained Industrial Internet of Things Devices”, IEEE Transactions on Industrial Informatics. 14(8): 3724-3732 (2018) [impact factor: 10.215]

35. Ding Wang, Jian Shen, Joseph K. Liu, Kim-Kwang Raymond Choo, “Rethinking Authentication on Smart Mobile Devices”, Wireless Communications and Mobile Computing 2018: 7079037:1-7079037:4 (2018) [impact factor: 2.336]

                                                                                

 

2017

36. Wei Wu, Shun Hu, Xu Yang, Joseph K. Liu, Man Ho Au, “Towards secure and cost-effective fuzzy access control in mobile cloud computing”, Soft Computing, 21(10): 2643-2649 (2017) [impact factor: 3.643]

37. Man Ho Au, Joseph K. Liu*, Zhenfei Zhang, Willy Susilo, Jin Li, Jianyiing Zhou, “Anonymous Announcement System (AAS) for Electric Vehicle in VANETs”, Computer Journal, 60(4): 588-599 (2017) [impact factor: 1.494]

38. Man Ho Au, Tsz Hon Yuen, Joseph K. Liu*, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe L. Jiang, “A General Framework for Secure Sharing of Personal Health Records in Cloud System”, Journal of Computer and System Sciences 90: 46-62 (2017) [impact factor: 1.023] [CORE Rank A*]

39. Yiteng Feng, Guomin Yang, Joseph K. Liu, “A New Public Remote Integrity Checking Scheme with User and Data Privacy”, International Journal of Applied Cryptography 3(3): 196-209 (2017)

 

2016

40. Shi-feng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu, “RKA-Secure Public Key Encryptions against Efficiently Invertible Functions”, Computer Journal 59(11): 1637-1658 (2016). [impact factor: 1.494]

41. Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian, Zheming Dong, “Privacy-Preserving Public Auditing Protocol for Low Performance End Devices in Cloud”, IEEE Transactions on Information Forensics and Security 11(11): 2572-2583 (2016). [impact factor: 7.178] [CORE Rank A]

42. Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu, “Privacy-Preserving and Regular Language Search over Encrypted Cloud Data”, IEEE Transactions on Information Forensics and Security 11(10): 2365-2376 (2016).  [impact factor: 7.178] [CORE Rank A]

43. Shulan Wang, Junwei Zhou, Jianping Yu, Joseph K. Liu, Jianyong Chen, “An Efficient File hierarchy Attribute-Based Encryption Scheme in Cloud Computing”, IEEE Transactions on Information Forensics and Security 11(6): 1265 - 1277 (2016).  [impact factor: 7.178] [CORE Rank A]

44. Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie, “Attribute-Based Data Sharing Scheme Revisited in Cloud Computing”, IEEE Transactions on Information Forensics and Security 11(8): 1661-1673 (2016).  [impact factor: 7.178] [CORE Rank A]

45. Xu Yang, Xinyi Huang, Joseph K. Liu, “Efficient Handover Authentication with User Anonymity and Untraceability for Mobile Cloud Computing”, Future Generation Computer Systems 62: 190-195 (2016). [impact factor: 7.187] [CORE Rank A]

46. Kai He, Jiang Weng, Robert H. Deng, Joseph K. Liu, “On the security of two identity-based conditional proxy re-encryption schemes”, Theoretical Computer Science 652: 18-27 (2016). [impact factor: 0.827] [CORE Rank A]

47. Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, Jin Li, “Fine-grained Two-factor Access Control for Web-based Cloud Computing Services”, IEEE Transactions on Information Forensics and Security 11(3): 484-497 (2016). [impact factor: 7.178] [CORE Rank A]

48. Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang, “Two-Factor Data Security Protection Mechanism for Cloud Storage System”, Computing”, IEEE Transactions on Computers 65(6): 1992-2004 (2016). [impact factor: 2.663] [CORE Rank A*]

49. Joseph K. Liu, Sze Ling Yeo, Wue-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo, “Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol”, Computer Journal 59(7): 945-954 (2016). [impact factor: 1.494]

50. Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Junbin Fang, Zoe L. Jiang, Willy Susilo, Jianying Zhou “Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles”, Computer Journal 59(7): 1040-1053 (2016). [impact factor: 1.494]

 

2015

51. Joseph K. Liu, Cheng-Kang Chu, Sherman S.M. Chow, Xinyi Huang, Man Ho Au, and Jianying Zhou, Time-Bound Anonymous Authentication for Roaming Networks”, IEEE Transactions on Information Forensics and Security 10(1):178-189 (2015). [impact factor: 7.178] [CORE Rank A]

52. Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan, “Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud”, IEEE Network 29(2):46-50 (2015). [impact factor: 10.693]

53. Kaitai Liang, Joseph K. Liu*, Rongxin Lu, Duncan S. Wong, “Privacy Concerns for Photo-Sharing in Online Social Networks”, IEEE Internet Computing 19(2): 58-63 (2015). [impact factor: 2.341]

54. Xinyi Huang, Joseph K. Liu*, Shaohua Tang, Yang Xiang, Li Xu, Kaitai Liang, Jianying Zhou, “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security”, IEEE Transactions on Computers 64(4): 971-983 (2015). [impact factor: 2.663] [CORE Rank A*]

55. Xiaoding Wang,Li Xu, Shuming Zhou, Joseph K. Liu, “A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks”, Journal of Universal Computer Science 21(3):384-405 (2015). [impact factor: 0.91]

56. Kaitai Liang, Willy Susilo, Joseph K. Liu*, “Privacy-Preserving Ciphertext Sharing Mechanism for Big Data Storage”, IEEE Transactions on Information Forensics and Security 10(8): 1578-1589 (2015). [impact factor: 7.178] [CORE Rank A]

57. Tsz Hon Yuen, Joseph K. Liu*, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou,K-times Attribute-Based Anonymous Access Control for Cloud Computing”, IEEE Transactions on Computers 64(9): 2595-2608 (2015). [impact factor: 2.663] [CORE Rank A*]

58. Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang, Yang Xiang, “A secure cloud computing based framework for big data information management of smart grid”, IEEE Transactions on Cloud Computing 3(2): 233-244 (2015). [impact factor: 5.938]

59. Ying-Kai Tang, Sherman S. M. Chow, Joseph K. Liu, “Comments on “Efficient Revocable Certificateless Encryption Secure in the Standard Model””, Computer Journal 58(4): 779-781 (2015). [impact factor: 1.494]

60. Shuquan Hou, Xinyi Huang, Joseph K. Liu, Jin Li, Li Xu, “Universal Designated Verifier Signatures for Graph-based Big Data”, Information Sciences 318: 144-156 (2015). [impact factor: 6.795] [CORE Rank A]

61. Jianghua Liu, Xinyi Huang, Joseph K. Liu, “Secure Sharing of Personal Health Records in Cloud Computing: Ciphertext-Policy Attribute Based Signcryption”, Future Generation Computer Systems 52: 67-76 (2015). [impact factor: 7.187] [CORE Rank A]

62. Kaitai Liang, Man Ho Au, Joseph K. Liu*, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang, “A Secure and Expressive Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing”, Future Generation Computer Systems 52:95-108 (2015). [impact factor: 7.187] [CORE Rank A]

63. Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S Wong, Jianfeng Ma, Joseph K. Liu, “Towards secure and reliable cloud storage against data re-outsourcing”, Future Generation Computer Systems 52:86-94 (2015). [impact factor: 7.187] [CORE Rank A]

64. Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong, “Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption”, Computer Journal 58(10): 2778-2792 (2015). [impact factor: 1.494]

65. Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan, Bok-Min Goi, “On the security of a lightweight authentication and encryption scheme for MANET”, Security and Communication Networks 8(17): 3094-3098 (2015). [impact factor: 1.791]

66. Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu, “Cooperative attribute-based access control for enterprise computing system”, International Journal of Embedded Systems 7(3/4): 191 – 202 (2015).

 

2014

67. Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Willy Susilo, “Improvements on an Authentication Scheme for Vehicular Sensor Network”, Expert Systems With Applications 41(5): 2559-2564 (2014). [impact factor: 6.954] 

68. Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou, “Linkable Ring Signature with Unconditional Anonymity”, IEEE Transactions on Knowledge and Data Engineering 26(1) 157-165 (2014). [impact factor: 6.977] [CORE Rank A*]

69. Man Ho Au, Joseph K. Liu*, Jun-bin Fang, Zoe L. Jiang, Willy Susilo, Jianying Zhou, “A New Payment System for Enhancing Location Privacy of Electric Vehicles”, IEEE Transactions on Vehicular Technology 63(1): 3-18 (2014). [impact factor: 5.978]

70. Rongxing Lu, Hui Zhu, Ximeng Liu, Joseph K. Liu, Jun Shao,Towards Efficient and Privacy-Preserving Computing in Big Data Era”, IEEE Network 28(4): 46-50 (2014). [impact factor: 10.693]

71. Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Jin Li, Paul Krause, “An Efficient PHR Service System Supporting Fuzzy Keyword Search and Fine-grained Access Control”, Soft Computing 18(9): 1795-1802 (2014). [impact factor 2.472]

72. Kaitai Liang, Man Ho Au, Joseph K. Liu*, Xie Qi, Willy Susilo, Xuan Phoung Tran, Duncan S. Wong, Guomin Yang, “A DFA-based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing,” IEEE Transactions on Information Forensics and Security 9(10): 1667-1680 (2014). [impact factor: 7.178] [CORE Rank A]

73. Chuan Yao, Li Xu, Xinyi Huang, Joseph K. Liu, “A secure remote data integrity checking cloud storage system from threshold encryption”, Journal of Ambient Intelligence and Humanized Computing, 5:857-865 (2014). [impact factor: 1.910]

 

2013

74. Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou, “Efficient Linkable and/or Threshold Ring Signature without Random Oracles”, Computer Journal 56(4): 407-421 (2013). [impact factor: 1.494]

75. Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, “Secure ID-Based Linkable and Revocable-iff-Linked Ring Signature with Constant-Size Construction ”, Theoretical Computer Science 469: 1-14 (2013). [impact factor: 0.827] [CORE Rank A]

76. Cheng-Kang Chu, Wen Tao Zhu, Jin Han, Joseph K. Liu, Jia Xu, Jianying Zhou, “Security Concerns in Popular Cloud Storage Services”, IEEE Pervasive Computing 12(4): 50-57 (2013). [impact factor: 3.175] [CORE Rank A]

77. Man Ho Au, Joseph K. Liu*, Willy Susilo, Jianying Zhou, “Realizing Fully Secure Unrestricted ID-based Ring Signature in the standard model from HIBE”, IEEE Transactions on Information Forensics and Security 8(12): 1909-1922 (2013). [impact factor: 7.178] [CORE Rank A]

78. Sze Ling Yeo, Wun-She Yap, Joseph K. Liu*, Matt Henricksen, “Comments on “Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions””, IEEE Communications Letters 17(8): 1521-1523 (2013). [impact factor: 3.436]

 

2010

79. Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong, “Efficient online/offline identity-based signature for wireless sensor network”, International Journal of Information Security. 9(4): 287-296 (2010) [impact factor: 1.822]

 

2008

80. Joseph K. Liu, Duncan S. Wong, “Solutions to Key Exposure Problem in Ring Signature”, International Journal of Network Security, 6(2): 170-180 (2008)

81. Yong Ho Hwang, Joseph K. Liu, Sherman S.M. Chow, “Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model”, Journal of Universal Computer Science, 14(3), pages 463-480. 2008 [impact factor: 0. 696]

 

2007

82. Joseph K. Liu, Duncan S. Wong, “A More Efficient Instantiation of Witness-Indistinguishable Signature”, International Journal of Network Security, 5(2): 199-204 (2007) 

83. Dennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong, “Revocable Ring Signature”, Journal of Computer Science and Technology, 22(6): 785-794 (2007) [impact factor: 0.878]

 

2006

84. Joseph K. Liu, Duncan S. Wong, “Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature”, International Journal of Foundation Computer Science, 17(6): 1403-1422 (2006)

 

Refereed Articles in Conference Proceedings: (with The Computing Research and Education Association of Australasia - CORE Ranking)

 

2021

85. Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph K. Liu, Shiping Chen, “Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains”, ACM Asia Conference on Computer and Communications Security (AsiaCCS), pages 817-831, ACM 2021. [CORE Rank A]

86. Haoran Yuan, Xiaofeng Chen, Guowen Xu, Jianting Ning, Joseph K. Liu, Robert Deng, “Efficient and Verifiable Proof of Replication with Fast Fault Localization”, IEEE INFOCOM, pages 1-10. 2021. [CORE Rank A*]

87. Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Nepal Surya, “OblivSketch: Oblivious Network Measurement as a Cloud Service”, Network and Distributed System Security Symposium (NDSS) 2021. [CORE Rank A*]

88. Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu, “Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy”, Network and Distributed System Security Symposium (NDSS) 2021. [CORE Rank A*]

89. Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding, “DualRing: Generic Construction of Ring Signatures with Efficient Instantiations”, CRYPTO – Part I. Lecture Notes in Computer Science 12825, pages 251-281, Springer 2021. [CORE Rank A*]

90. Shabnam Kasra Kermanshahi, Rafael Dowsley, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Surya Nepal, Xun Yi, “Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy”, European Symposium on Research in Computer Security (ESORICS (2)), Lecture Notes in Computer Science 12973, pages 24-43, Springer 2021. [CORE Rank A]

91. Viet Vo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu and Surya Nepal, “Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves”, International Conference on Applied Cryptography and Network Security (ACNS) – Part I. Lecture Notes in Computer Science 12726, pages 50-75, Springer 2021.  [CORE Rank B]

92. Viet Vo, Shangqi Lai, Xingliang Yuan, Joseph K. Liu and Surya Nepal, “Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves”, International Conference on Applied Cryptography and Network Security (ACNS) – Part I. Lecture Notes in Computer Science 12726, pages 50-75, Springer 2021.  [CORE Rank B]

93. Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, “Transparency or Anonymity Leak: Monero Mining Pools Data Publication”, Australasian Conference on Information Security and Privacy (ACISP). Lecture Notes in Computer Science 13083, pages 433-450, Springer 2021. [CORE Rank B]

94. Yanjun Shen, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal, “OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control”, Information Security Practice and Experience Conference (ISPEC), Lecture Notes in Computer Science 13107, pages 126-144, Springer 2021. [CORE Rank B]

95. Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo, “Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach”, Information Security Practice and Experience Conference (ISPEC), Lecture Notes in Computer Science 13107, pages 327-344, Springer 2021. [CORE Rank B]

 

2020

96. Viet Vo, Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Surya Nepal, Joseph K. Liu, “Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution”, International Conference on Applied Cryptography and Network Security (ACNS) – Part II. Lecture Notes in Computer Science 12124, pages 83-103, Springer 2020. [CORE Rank B]

97. Tsz Hon Yuen, Shi-Feng Sun, Joseph K. Liu, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu, “RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security”, Financial Cryptography and Data Security (FC), Lecture Notes in Computer Science 12059, pages 464-483, Springer 2020. [CORE Rank A]

98. Shi-Feng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu, "Public-Key Puncturable Encryption: Modular and Compact Constructions", International Conference on Practice and Theory of Public-Key Cryptography (PKC), Lecture Notes in Computer Science 12110, pages 309-338, Springer 2020. [CORE Rank B]

 

2019

99. Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, Dongxi Liu, “MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol”, ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 567-584, ACM 2019. [CORE Rank A*]

100.         Shabnam Kasra Kermanshahi, Joseph K. Liu*, Ron Steinfeld and Surya Nepal, “Generic Multi-keyword Ranked Search on Encrypted Cloud Data”, European Symposium on Research in Computer Security (ESORICS (2)), Lecture Notes in Computer Science 11735, pages 322-343, Springer 2019.  [CORE Rank A]

101.         Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao and Josef Pieprzyk, “Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy”, European Symposium on Research in Computer Security (ESORICS (2)), Lecture Notes in Computer Science 11735, pages 283-303, Springer 2019.  [CORE Rank A]

102.         Maxime Buser, Joseph K. Liu*, Ron Steinfeld, Amin Sakzad and Shi-Feng Sun, “A Dynamic & Revocable Group Merkle Signature”, European Symposium on Research in Computer Security (ESORICS (1)), Lecture Notes in Computer Science 11735, pages 194-214, Springer 2019. [CORE Rank A]

103.         Yevhen Zolotavkin, Julian Garcia, Joseph K. Liu, “Time-dependent Decision-making and Decentralization in Proof-of-Work Cryptocurrencies”, IEEE Computer Security Foundations Symposium. DOI: 10.1109/CSF.2019.00015. [CORE Rank A]

104.         Muhammed F. Esgin, Ron Steinfeld, Joseph K. Liu, Dongxi Liu, “Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications”, CRYPTO, Lecture Notes in Computer Science 11692, pages 115-146, Springer 2019. [CORE Rank A*]

105.         Muhammed F. Esgin, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Dongxi Liu, “Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures”, Applied Cryptography and Network Security (ACNS), Lecture Notes in Computer Science 11464, pages 67-88, Springer 2019. [CORE Rank B]

106.         Shi-Feng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu, “Strong Leakage and tamper-resilient Public Key Encryption from Refined Hash Proof Systems”, Applied Cryptography and Network Security (ACNS), Lecture Notes in Computer Science 11464, pages 486-506, Springer 2019. [CORE Rank B]

107.         Wilson Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng, “Lattice RingCT v2.0 with Multiple Input and Output Wallets”, Australasian Conference on Information Security and Privacy (ACISP), Lecture Notes in Computer Science 11547, pages 156-175, Springer 2019.

108.         Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph K. Liu, “Fast-to-Finalize Nakamoto-Like Consensus Protocol”, Australasian Conference on Information Security and Privacy (ACISP), Lecture Notes in Computer Science 11547, pages 271-288, Springer 2019.

109.         Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, “Risk of Asynchronous Protocol Update: Attacks to Monero Protocols”, Australasian Conference on Information Security and Privacy (ACISP), Lecture Notes in Computer Science 11547, pages 307-321, Springer 2019.

110.         Lin Zhong, Qianhong Wu, Jan Xie, Bo Qin, Joseph K. Liu, Huili Wang, “A Flexible Instant Payment System Based on Blockchain”, Australasian Conference on Information Security and Privacy (ACISP), Lecture Notes in Computer Science 11547, pages 289-306, Springer 2019.

111.         Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu, “GraphSE^2: An Encrypted Graph Database for Privacy-Preserving Social Search”, ACM Asia Conference on Computer and Communications Security (AsiaCCS), pages 41-45, ACM 2019. [CORE Rank A]

112.         Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu, “On The Unforkability of Monero”, ACM Asia Conference on Computer and Communications Security (AsiaCCS), pages 621-632, ACM 2019. [CORE Rank A]

 

2018

113.         Dimaz Ankaa Wijaya, Joseph K. Liu*, Ron Steinfeld, Dongxi Liu, “Monero Ring Attack: Recreating Zero Mixin Transaction Effect”, TrustCom, pages 1196-1201, IEEE 2018. [CORE Rank A]

114.         Xiaoning Liu, Xingliang Yuan, Joseph K. Liu, “Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data”, TrustCom, pages 1664-1668, IEEE 2018. [CORE Rank A]

115.         Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk, “Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security”. European Symposium on Research in Computer Security (ESORICS (2)), Lecture Notes in Computer Science 11099, pages 228-246, Springer 2018. [CORE Rank A]

116.         Jianfeng Wang, Xiaofeng Chen, Shi-Feng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan, “Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database”. European Symposium on Research in Computer Security (ESORICS (2)), Lecture Notes in Computer Science 11099, pages 83-100, Springer 2018. [CORE Rank A]

117.         Shangqi Lai, Sikhar Patranabis, Amin Sakzad, Joseph K. Liu*, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo, “Result Pattern Hiding Searchable Encryption for Conjunctive Queries”. ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 745-762, 2018. [CORE Rank A*]

118.         Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Viet Vo, Surya Nepal, “Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption”. ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 763-780, 2018.  [CORE Rank A*]

119.         Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu, “Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem”, Australasian Conference on Information Security and Privacy (ACISP) 2018, Lecture Notes in Computer Science 10946, pages 265-283, Springer 2018.

120.         Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu*, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng, “Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)”, Australasian Conference on Information Security and Privacy (ACISP) 2018, Lecture Notes in Computer Science 10946, pages 558-576, Springer 2018.

121.         Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang, “Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List”, Applied Cryptography & Network Security (ACNS) 2018, Lecture Notes in Computer Science 10892, pages 516-534, Springer 2018. [CORE Rank B]

122.         Siyi Lv, Yanyu Huang, Bo Li, Yu Wei, Zheli Liu, Joseph K. Liu, Dong Hoon Lee, “Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique”, International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP) 2018, Lecture Notes in Computer Science 11337, pages 85-97, Springer 2018. [CORE Rank B]

123.         Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen, “Compact Ring Signature in the Standard Model for Blockchain”, Information Security Practice and Experience Conference (ISPEC) 2018, Lecture Notes in Computer Science 11125, pages 50-65, Springer 2018. [CORE Rank B]

124.         Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu, “Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits”, Information Security Practice and Experience Conference (ISPEC) 2018, Lecture Notes in Computer Science 11125, pages 119-140, Springer 2018. [CORE Rank B]

125.         Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au, “Platform-Independent Secure Blockchain-Based Voting System”, Information Security Conference (ISC) 2018, Lecture Notes in Computer Science 11060, pages 369-386, Springer 2018. [CORE Rank B]

126.         Peter Ince, Joseph K. Liu, Peng Zhang, “Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs”, International Conference on network and System Security (NSS) 2018, Lecture Notes in Computer Science 11058, pages 32-45, Springer 2018. [CORE Rank B]

127.         Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow, “Position Paper on Blockchain Technology: Smart Contract and Applications”, International Conference on network and System Security (NSS) 2018, Lecture Notes in Computer Science 11058, pages 474-483, Springer 2018. [CORE Rank B]

128.         Runchao Han, Jiangshan Yu, Joseph K. Liu, Peng Zhang, “Evaluating CryptoNote-Style Blockchains”, Inscrypt 2018, Lecture Notes in Computer Science 11449, pages 29-48, Springer 2018. [CORE Rank B]

129.         Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Tsz Hon Yuen, “Anonymity Reduction Attacks to Monero”, Inscrypt 2018, Lecture Notes in Computer Science 11449, pages 86-100, Springer 2018. [CORE Rank B]

130.         Zhimei Sui, Shangqi Lai, Cong Zuo, Xingliang Yuan, Joseph K. Liu, Haifeng Qian, “An Encrypted Database with Enforced Access Control and Blockchain Validation”, Inscrypt 2018, Lecture Notes in Computer Science 11449, pages 260-273, Springer 2018. [CORE Rank B]

131.         Randolph Loh, Cong Zuo, Joseph K. Liu, Shifeng Sun, “A Multi-client DSSE Scheme Supporting Range Queries”, Inscrypt 2018, Lecture Notes in Computer Science 11449, pages 289-307, Springer 2018. [CORE Rank B]

132.         Mark H. Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang, “Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications”, Inscrypt 2018, Lecture Notes in Computer Science 11449, pages 349-369, Springer 2018. [CORE Rank B]

 

2017

133.         Shabnam Kasra Kermanshahi, Joseph K. Liu and Ron Steinfeld, “Multi-user Cloud-based Secure Keyword Search”, Australasian Conference on Information Security and Privacy (ACISP) 2017, Lecture Notes in Computer Science 10342, pages 227-274, Springer 2017.

134.         Hui Cui, Robert H. Deng, Joseph K. Liu and Yingjiu Li, “Attribute-Based Encryption with Expressive and Authorized Keyword Search”, Australasian Conference on Information Security and Privacy (ACISP) 2017, Lecture Notes in Computer Science 10342, pages 106-126, Springer 2017.

135.         Yanjiang Yang, Joseph K. Liu, Zhuo Wei and Xinyi Huang, “Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud”, Australasian Conference on Information Security and Privacy (ACISP) 2017, Lecture Notes in Computer Science 10342, pages 127-144, Springer 2017.

136.         Peng Zhang, Xiafei Zhang, Xiaoqiang Sun, Joseph K. Liu, Jianping Yu and Zoe Jiang, “Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics”, TrustCom, pages 668-674, IEEE 2017. [CORE Rank A]

137.         Shi-feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, “RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero”, European Symposium on Research in Computer Security (ESORICS (2)), Lecture Notes in Computer Science 10493, pages 456-474, Springer 2017. [CORE Rank A]

138.         Yunling Wang, Jianfeng Wang, Shi-Feng Sun, Joseph K. Liu, Willy Susilo and Xiaofeng Chen, “Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption”, International Conference on Provable Security (ProvSec), Lecture Notes in Computer Science 10592, pages 24-38, Springer 2017. [CORE Rank B]

139.         Dimaz Ankaa Wijaya, Joseph K. Liu, Dony Suwarsono and Peng Zhang, “A New Blockchain-based Value-Added Tax System”, International Conference on Provable Security (ProvSec), Lecture Notes in Computer Science 10592, pages 471-486, Springer 2017. [CORE Rank B]

 

2016

140.         Yili Ren, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang, “Towards Certificate-Based Group Encryption”, International Conference on Provable Security (ProvSec), Lecture Notes in Computer Science 10005, pages 296-305, Springer 2016. [CORE Rank B]

141.         Dimaz Ankaa Wijaya, Ron Steinfeld, Joseph K. Liu, Shi-Feng Sun and Xinyi Huang, “Anonymizing Bitcoin Transaction”, Information Security Practice and Experience (ISPEC), Lecture Notes in Computer Science 10060, pages 271-283, Springer 2016. [CORE Rank B]

142.         Shi-Feng Sun, Joseph K. Liu*, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, “An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries”, European Symposium on Research in Computer Security (ESORICS (1)), Lecture Notes in Computer Science 9878, pages 154-172, Springer 2016. [CORE Rank A]

143.         Kaitai Liang, Joseph K. Liu, Rongxing Lu, Man Ho Au, “While Mobile Encounters with Clouds”, Network and System Security (NSS), Lecture Notes in Computer Science 9955, pages 3-18, Springer 2016. [CORE Rank B]

144.         Kai He, Jian Weng, Joseph K. Liu, Wanlie Zhou, Jia-Nan Liu, “Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing”, Network and System Security (NSS), Lecture Notes in Computer Science 9955, pages 65-79, Springer 2016. [CORE Rank B]

145.         Xu Yang, Ting-Ting Lee, Joseph K. Liu, Xinyi Huang, “Trust Enhancement over Range Search for Encrypted Data”, IEEE TrustCom 2016, pg. 66-73. IEEE. 2016. [CORE Rank A]

146.         Cong Zuo, James Macindoe, Siyin Yang, Ron Steinfeld, Joseph K. Liu*, “Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption”, IEEE TrustCom 2016, pg. 113-120. IEEE. 2016. [CORE Rank A]

147.         Xu Yang, Yuexin Zhang, Joseph K. Liu, Yali Zeng, “A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks”, IEEE TrustCom 2016, pg. 138-143. IEEE. 2016. [CORE Rank A]

148.         Shi-Feng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen, “Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption”, ASIACCS 2016, pg. 901-906. ACM 2016. [CORE Rank A]

149.         Kaitai Liang, Chunhua Su, Jiageng Chen and Joseph K. Liu, “Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Big Data”, ASIACCS 2016, pg. 83-94. ACM 2016. [CORE Rank A]

150.         Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang and Jianying Zhou, “Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication”, ASIACCS 2016, pg. 141-152. ACM 2016. [CORE Rank A]

151.         Kai He, Jian Weng, Jia'Nan Liu, Joseph K. Liu, Robert Deng and Wei Liu, “Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security”, ASIACCS 2016, pg. 247-256. ACM 2016. [CORE Rank A]

 

2015

152.         Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi, “Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data”, ASIACCS, pg. 393-404. ACM 2015. [CORE Rank A]

153.         Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Raymond Choo and Jianying Zhou, “Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Cloud Data Encryption”, European Symposium on Research in Computer Security (ESORICS (2)), Lecture Notes in Computer Science 9327, pages 146-166, Springer 2015. [CORE Rank A]

154.         Xun Yi, Feng Hao, Liqun Chen, Joseph K. Liu, “Practical Threshold Password-Authenticated Secret Sharing Protocol”, European Symposium on Research in Computer Security (ESORICS (1)), Lecture Notes in Computer Science 9326, pages 347-365, Springer 2015. [CORE Rank A]

155.         Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen, “Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach”, ProvSec 2015, Lecture Notes in Computer Science 9451, pages 215-226, Springer 2015. [CORE Rank B]

156.         Xu Yang, Joseph K. Liu, Wei Wu, Man Ho Allen Au, Willy Susilo, “PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme”, IEEE International
Conference on Parallel and Distributed Systems (ICPADS), pages 282-289, IEEE, 2015. [CORE Rank B]

157.         Yanjiang Yang, Jiqiang Lu, Kim-Kwang Raymond Choo, Joseph K. Liu, “On Lightweight Security Enforcement in Cyber-Physical Systems”, LightSec 2015, Lecture Notes in Computer Science 9542, pages 97-112, Springer 2015.

158.         Shangqi Lai, Joseph K. Liu, Raymond Choo and Kaitai Liang, “Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN”, International Conference on Information and Communications Security (ICICS) 2015, Lecture Notes in Computer Science 9543, pages 467-477, Springer 2015. [CORE Rank B]

159.         Yiteng Feng, Yi Mu, Guomin Yang, Joseph K. Liu, “A New Public Remote Integrity Checking Scheme with User Privacy”, Australasian Conference on Information Security and Privacy (ACISP) 2015, Lecture Notes in Computer Science 9144, pages 377-394, Springer 2015.

 

2014

160.         Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu, “TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing”, Information Security Practice and Experience (ISPEC), Lecture Notes in Computer Science 8434, pages 346-358, Springer 2014. [CORE Rank B]

161.         Haixin Nie, Xiaofeng Chen, Jin Li, Joseph K. Liu, Wenjing Lou, “Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming”, 28th IEEE International Conference on Advanced Information Networking and Applications (AINA) pages 591-596, IEEE 2014. [CORE Rank B]

162.         Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, Yong Yu, “New Insight to Preserve Accuracy and Privacy in Online Survey and Other Systems with Big Data”, European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science 8713, pages 182-199, Springer 2014. [CORE Rank A]

163.         Tsz Hon Yuen, Ye Zhang, S. M. Yiu, Joseph K. Liu, “Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks”, European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science 8712, pages 130-147, Springer 2014. [CORE Rank A]

164.         Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo, “An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing”, European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science 8712, pages 257-272, Springer 2014. [CORE Rank A]

165.         Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, “GO-ABE: Group-Oriented Attribute-Based Encryption”, Network and System Security (NSS), Lecture Notes in Computer Science 8792, pages 260-270. Springer 2014. [CORE Rank B]

 

2013

166.         Cheng-Kang-Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou, “Privacy-preserving Smart Metering with Regional Statistics and Personal Enquiry Services”, ASIACCS, pages 368-380, ACM 2013. [CORE Rank A]

167.         Yang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo, “Threshold-Oriented Optimistic Fair Exchange”, The 7th International Conference on Network and System Security (NSS), Lecture Notes in Computer Science 7873, pages 424-438, Springer 2013. [CORE Rank B]

168.         Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu, “Towards Anonymous Ciphertext Indistinguishability with Identity Leakage”, ProvSec 2013, Lecture Notes in Computer Science 8209, pages 139-153, Springer 2013. [CORE Rank B]

 

2012

169.         Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou, “Enhancing Location Privacy for Electric Vehicles (at the right time)”, ESORICS 2012, Lecture Notes in Computer Science 7459, pages 397-414, Springer 2012. [CORE Rank A]

170.         Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou, “Forward Secure Attribute-Based Signatures”, ICICS 2012, Lecture Notes in Computer Science 7618, pages 167-177, Springer 2012. [CORE Rank B]

171.         Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, “Efficient Escrow-Free Identity-Based Signature”, ProvSec 2012, Lecture Notes in Computer Science 7496, pages 161-174, Springer 2012. [CORE Rank B]

172.         Cheng-Kang Chu, Joseph K. Liu, Xinyi Huang, Jianying Zhou, “Verifier-Local Revocation Group Signatures with Time-Bound Keys”, ASIACCS 2012, pages 26-27. ACM 2012. [CORE Rank A]

 

2011

173.         Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou, “Identity-Based Online/Offline Key Encapsulation and Encryption”, ASIACCS 2011, pages 52-60. ACM 2011. [CORE Rank A]

174.         Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou, “Threshold  Ring Signature without Random Oracles”, ASIACCS 2011, pages 261-267. ACM 2011. [CORE Rank A]

175.         Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou, “Identity-Based Server-Aided Decryption”, ACISP 2011, Lecture Notes in Computer Science 6812, pages 337-352. Springer 2011.

176.         Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou, “Forward Secure Ring Signature without Random Oracles”, ICICS 2011, Lecture Notes in Computer Science 7043, pages 1-14. Springer 2011. [CORE Rank B]

177.         Joseph K. Liu, Feng Bao, Jianying Zhou, “Short and Efficient Certificate-Based Signature”, Networking Workshops 2011, Lecture Notes in Computer Science 6827, pages 167-178. Springer 2011.

 

2010

178.         Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng, “Practical ID-based encryption for wireless sensor network”, ASIACCS 2010: pages 337-340, ACM, 2010. [CORE Rank A]

179.         Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou, “Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model”, ESORICS 2010, Lecture Notes in Computer Science 6345, pages 168-181, Springer 2010. [CORE Rank A]

180.         Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, “A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract)”, ProvSec 2010, Lecture Notes in Computer Science 6402, pages 166-183, Springer 2010. [CORE Rank B]

181.         Joseph K. Liu, Joonsang Baek, Jianying Zhou, “Online/Offline Identity-Based Signcryption Revisited”, Inscrypt 2010, Lecture Notes in Computer Science 6584, pages 36-51. Springer 2010. [CORE Rank B]

 

2009

182.         Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou, “A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack”, ACNS 2009. Lecture Notes in Computer Science 5536, pages 143-155, Springer 2009. [CORE Rank B]

183.         Joseph K. Liu, Jianying Zhou, “An Efficient Identity-Based Online/Offline Encryption Scheme”, ACNS 2009. Lecture Notes in Computer Science 5536, pages 156-167, Springer 2009. [CORE Rank B]

184.         Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou, “Online/Offline Ring Signature Scheme”, ICICS. Lecture Notes in Computer Science 5927, pages 80-90, Springer 2009. [CORE Rank B]

185.         Joseph K. Liu, Joonsang Baek, Jianying Zhou, “Certificate-based sequential aggregate signature”, WISEC 2009, pages 21-28, ACM, 2009.

 

2008

186.         Sherman. S. Chow, Joseph K. Liu, Duncan S. Wong, “Robust Receipt-Free Election System with Ballot Secrecy and Verifiability”, NDSS 2008, pages 81-94, Internet Society, 2008. [CORE Rank A*]

187.         Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Traceable and Retrievable Identity-Based Encryption”, ACNS 2008, Lecture Notes in Computer Science 5037, pages 94-110, Springer, 2008. [CORE Rank B]

188.         Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu, “Sanitizable Signatures Revisited”, CANS 2008, Lecture Notes in Computer Science 5339, pages 80-97, Springer, 2008. [CORE Rank B]

189.         Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou, Certificate-Based Signature Schemes without Pairings or Random Oracles”, ISC 2008, Lecture Notes in Computer Science 5222, pages 285-297, Springer, 2008. [CORE Rank B]

190.         Joseph K. Liu, Jianying Zhou, Efficient Certificate-Based Encryption in the Standard Model”, SCN 2008, Lecture Notes in Computer Science 5229, pages 144-155, Springer, 2008. [CORE Rank B]

 

2007

191.         Man Ho Au, Joseph K. Liu, Willy Susilo, Tze Hon Yuen, “Certificate Based (Linkable) Ring Signature”, ISPEC 2007, Lecture Notes in Computer Science 4464, page 79-92. Springer, 2007. [CORE Rank B]

192.         Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo, “(Convertible) Undeniable Signatures Without Random Oracles.” ICICS 2007, Lecture Notes in Computer Science 4861, pages 83-97. Springer, 2007. [CORE Rank B]

193.         Joseph K. Liu, Man Ho Au, Willy Susilo, “Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract”, ASIACCS 2007, pages 273-283, ACM, 2007. [CORE Rank A]

194.         Man Ho Au, Yi Mu, Jing Chen, Duncan S. Wong, Joseph K. Liu, Guomin Yang, “Malicious KGC attacks in certificateless cryptography”, ASIACCS 2007, pages 302-311, ACM, 2007. [CORE Rank A]

 

2006

195.         Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen, “Ring signatures without random oracles”, ASIACCS 2006, pages 297-302, ACM, 2006. [CORE Rank A]

196.         Yuen-Yan Chan, Sebastian Fleissner, Joseph K. Liu, Jin Li, Single Sign-On and Key Establishment for Ubiquitous Smart Environments”, ICCSA(4) 2006,  Lecture Notes in Computer Science 3983, pages 406-415, Springer, 2006

197.         Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature”, INDOCRYPT 2006, Lecture Notes in Computer Science 4329, pages 364-378, Springer, 2006. [CORE Rank B]

198.         Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong, “ID-Based Ring Signature Scheme Secure in the Standard Model”, IWSEC 2006, Lecture Notes in Computer Science 4266, pages 1-16, Springer, 2006. [CORE Rank B]

199.         Joseph K. Liu, Willy Susilo, Duncan S. Wong, “Ring Signature with Designated Linkability”, IWSEC 2006, Lecture Notes in Computer Science 4266, pages 104-119, Springer, 2006. [CORE Rank B]

 

2005

200.         Sherman S.M. Chow, Zhengjun Cao, Joseph K. Liu, “Security Analysis of Three Cryptographic Schemes”, CISC 2005 (later known as Inscrypt), Lecture Notes in Computer Science 3822, pages 290-301. Springer, 2005

201.         Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, “Efficient Verifiable Ring Encryption for Ad Hoc Groups”, ESAS 2005, Lecture Notes in Computer Science 3813, pages 1-13. Springer, 2005

202.         Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, “Recoverable and Untraceable E-Cash”, EuroPKI 2005, Lecture Notes in Computer Science 3545, pages 206-214. Springer, 2005

203.         Joseph K. Liu, Duncan S. Wong, “Linkable Ring Signatures: Security Models and New Schemes” ICCSA 2005, Lecture Notes in Computer Science 3481, pages 614-623. Springer, 2005

204.         Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu, “Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms”, ICISC 2005, Lecture Notes in Computer Science 3935, pages 389-409. Springer 2005. [CORE Rank B]

205.         Joseph K. Liu, Duncan S. Wong, “A Restricted Multi-show Credential System and Its Application on E-voting”, ISPEC 2005, Lecture Notes in Computer Science 3439, pages 268-279. Springer 2005. [CORE Rank B]

206.         Joseph K. Liu, Sandy H. Wong, Duncan S. Wong, “Transferable E-Cash Revisit”, SEC 2005, pages 171-188, Springer 2005. [CORE Rank B]

 

2004

207.         Joseph K. Liu, Victor K. Wei, Duncan S. Wong, “Linkable and Anonymous Signature for Ad Hoc Groups”, ACISP 2004, Lecture Notes in Computer Science 3108, pages 325-335. Springer 2004

208.         Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei, “Blinded Spontaneous Anonymous Signature for Ad Hoc Group”, ESAS 2004, Lecture Notes in Computer Science 3313, pages 82-94. Springer 2004

209.         Joseph K. Liu, Duncan S. Wong, “On the Security Model of (Threshold) Ring Signature”, ICISC 2004, Lecture Notes in Computer Science 3506, pages 204-217. Springer 2004. [CORE Rank B]

210.         Patrick P. Tsang, Allen Au, Tony K. Chan, Joseph K. Liu, Victor K. Wei, Duncan S. Wong, “Event-Oriented Linkable Threshold Ring Signatures”, IndoCrypt 2004, Lecture Notes in Computer Science 3348, pages 384-398. Springer 2004. [CORE Rank B]

211.         Joseph K. Liu, Victor K. Wei, Duncan S. Wong, “Custodian-Hiding Verifiable Encryption”, WISA 2004, Lecture Notes in Computer Science 3325, pages 54-67. Springer 2004. [CORE Rank B]

 

2003

212.         Yuen-Yan Chan, Chi-Hong Leung, Joseph K. Liu, Evaluation on Security and Privacy of Web-Based Learning Systems”, ICALT 2003, pages 308-309. IEEE Computer Society 2003

213.         Duncan S. Wong, K. Fung, Joseph K. Liu, Victor K. Wei, “On the RS-Code construction of ring signature schemes and a threshold setting of RST”, ICICS 2003, Lecture Notes in Computer Science 2836, pages 34-46. Springer 2003. [CORE Rank B]

214.         Joseph K. Liu, Victor K. Wei, Duncan S. Wong, “A separable threshold ring signature scheme”, ICISC 2003, Lecture Notes in Computer Science 2971, pages 12-26. Springer 2003. [CORE Rank B]