BibTeX records: Haibo Tian

download as .bib file

@article{DBLP:journals/csi/TianWZSL24,
  author       = {Haibo Tian and
                  Yanchuan Wen and
                  Fangguo Zhang and
                  Yunfeng Shao and
                  Bingshuai Li},
  title        = {Lattice based distributed threshold additive homomorphic encryption
                  with application in federated learning},
  journal      = {Comput. Stand. Interfaces},
  volume       = {87},
  pages        = {103765},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csi.2023.103765},
  doi          = {10.1016/J.CSI.2023.103765},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/TianWZSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/ZuoTZ23,
  author       = {Ruozhou Zuo and
                  Haibo Tian and
                  Fangguo Zhang},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {Post-quantum Dropout-Resilient Aggregation for Federated Learning
                  via Lattice-Based {PRF}},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14509},
  pages        = {382--399},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9785-5\_27},
  doi          = {10.1007/978-981-99-9785-5\_27},
  timestamp    = {Sun, 03 Mar 2024 19:07:53 +0100},
  biburl       = {https://dblp.org/rec/conf/aisp/ZuoTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiTZ23,
  author       = {Chen Li and
                  Haibo Tian and
                  Fangguo Zhang},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {{TVES:} Threshold Verifiably Encrypted Signature and Its Applications},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_1},
  doi          = {10.1007/978-981-97-0942-7\_1},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LiTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AnTCZ23,
  author       = {Zhiyuan An and
                  Haibo Tian and
                  Chao Chen and
                  Fangguo Zhang},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Deniable Cryptosystems: Simpler Constructions and Achieving Leakage
                  Resilience},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_2},
  doi          = {10.1007/978-3-031-50594-2\_2},
  timestamp    = {Thu, 18 Jan 2024 08:27:15 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AnTCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnTCZ23,
  author       = {Zhiyuan An and
                  Haibo Tian and
                  Chao Chen and
                  Fangguo Zhang},
  title        = {Deniable Cryptosystems: Simpler Constructions and Achieving Leakage
                  Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/705},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnTCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuangZLT22,
  author       = {Yan Huang and
                  Fangguo Zhang and
                  Zhijie Liu and
                  Haibo Tian},
  title        = {Pseudorandom number generator based on supersingular elliptic curve
                  isogenies},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {5},
  pages        = {1--3},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-019-2669-6},
  doi          = {10.1007/S11432-019-2669-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuangZLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/TianWZSL22,
  author       = {Haibo Tian and
                  Yanchuan Wen and
                  Fangguo Zhang and
                  Yunfeng Shao and
                  Bingshuai Li},
  editor       = {Xiaofeng Chen and
                  Jian Shen and
                  Willy Susilo},
  title        = {A Distributed Threshold Additive Homomorphic Encryption for Federated
                  Learning with Dropout Resiliency Based on Lattice},
  booktitle    = {Cyberspace Safety and Security - 14th International Symposium, {CSS}
                  2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13547},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18067-5\_20},
  doi          = {10.1007/978-3-031-18067-5\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/TianWZSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ZuoTAZ22,
  author       = {Ruozhou Zuo and
                  Haibo Tian and
                  Zhiyuan An and
                  Fangguo Zhang},
  editor       = {Xiaofeng Chen and
                  Jian Shen and
                  Willy Susilo},
  title        = {Post-quantum Privacy-Preserving Aggregation in Federated Learning
                  Based on Lattice},
  booktitle    = {Cyberspace Safety and Security - 14th International Symposium, {CSS}
                  2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13547},
  pages        = {314--326},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18067-5\_23},
  doi          = {10.1007/978-3-031-18067-5\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/ZuoTAZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenTZ22,
  author       = {Jianzhang Chen and
                  Haibo Tian and
                  Fangguo Zhang},
  editor       = {Willy Susilo and
                  Xiaofeng Chen and
                  Fuchun Guo and
                  Yudi Zhang and
                  Rolly Intan},
  title        = {Searching for Encrypted Data on Blockchain: An Efficient, Secure and
                  Fair Realization},
  booktitle    = {Information Security - 25th International Conference, {ISC} 2022,
                  Bali, Indonesia, December 18-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13640},
  pages        = {194--213},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22390-7\_13},
  doi          = {10.1007/978-3-031-22390-7\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChenTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/ZhangTZ22,
  author       = {Zhuoran Zhang and
                  Haibo Tian and
                  Fangguo Zhang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Miroslaw Kutylowski},
  title        = {Improved {WAVE} Signature and Apply to Post-quantum Blockchain},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 8th International
                  Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1663},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-7242-3\_20},
  doi          = {10.1007/978-981-19-7242-3\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/ZhangTZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/XuBHTW21,
  author       = {Jieyu Xu and
                  Wen Bai and
                  Miao Hu and
                  Haibo Tian and
                  Di Wu},
  title        = {Bitcoin miners: Exploring a covert community in the Bitcoin ecosystem},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {2},
  pages        = {644--654},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-020-01021-1},
  doi          = {10.1007/S12083-020-01021-1},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/XuBHTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-10753,
  author       = {Haibo Tian and
                  Fangguo Zhang and
                  Yunfeng Shao and
                  Bingshuai Li},
  title        = {Secure Linear Aggregation Using Decentralized Threshold Additive Homomorphic
                  Encryption For Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2111.10753},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.10753},
  eprinttype    = {arXiv},
  eprint       = {2111.10753},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-10753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangYBLTKY20,
  author       = {Yilei Wang and
                  Guoyu Yang and
                  Andrea Bracciali and
                  Ho{-}fung Leung and
                  Haibo Tian and
                  Lishan Ke and
                  Xiaomei Yu},
  title        = {Incentive compatible and anti-compounding of wealth in proof-of-stake},
  journal      = {Inf. Sci.},
  volume       = {530},
  pages        = {85--94},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.03.098},
  doi          = {10.1016/J.INS.2020.03.098},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangYBLTKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangZT20,
  author       = {Zhuoran Zhang and
                  Fangguo Zhang and
                  Haibo Tian},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {{CSH:} {A} Post-quantum Secret Handshake Scheme from Coding Theory},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {317--335},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_16},
  doi          = {10.1007/978-3-030-59013-0\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/TianLZ20,
  author       = {Haibo Tian and
                  Huizhi Lin and
                  Fangguo Zhang},
  editor       = {Guangquan Xu and
                  Kaitai Liang and
                  Chunhua Su},
  title        = {Design a Proof of Stake Based Directed Acyclic Graph Chain},
  booktitle    = {Frontiers in Cyber Security - Third International Conference, {FCS}
                  2020, Tianjin, China, November 15-17, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1286},
  pages        = {150--165},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-9739-8\_13},
  doi          = {10.1007/978-981-15-9739-8\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/TianLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/XieWHT20,
  author       = {Zixuan Xie and
                  Run Wu and
                  Miao Hu and
                  Haibo Tian},
  title        = {Blockchain-Enabled Computing Resource Trading: {A} Deep Reinforcement
                  Learning Approach},
  booktitle    = {2020 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2020, Seoul, Korea (South), May 25-28, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/WCNC45663.2020.9120521},
  doi          = {10.1109/WCNC45663.2020.9120521},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/XieWHT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiTZH19,
  author       = {Huige Li and
                  Haibo Tian and
                  Fangguo Zhang and
                  Jiejie He},
  title        = {Blockchain-based searchable symmetric encryption scheme},
  journal      = {Comput. Electr. Eng.},
  volume       = {73},
  pages        = {32--45},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compeleceng.2018.10.015},
  doi          = {10.1016/J.COMPELECENG.2018.10.015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/LiTZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LiZLTH19,
  author       = {Huige Li and
                  Fangguo Zhang and
                  Peiran Luo and
                  Haibo Tian and
                  Jiejie He},
  title        = {How to retrieve the encrypted data on the blockchain},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {13},
  number       = {11},
  pages        = {5560--5579},
  year         = {2019},
  url          = {https://doi.org/10.3837/tiis.2019.11.016},
  doi          = {10.3837/TIIS.2019.11.016},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LiZLTH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/TianHD19,
  author       = {Haibo Tian and
                  Jiejie He and
                  Yong Ding},
  title        = {Medical Data Management on Blockchain with Privacy},
  journal      = {J. Medical Syst.},
  volume       = {43},
  number       = {2},
  pages        = {26:1--26:6},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10916-018-1144-x},
  doi          = {10.1007/S10916-018-1144-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/TianHD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZhangZCT19,
  author       = {Huang Zhang and
                  Fangguo Zhang and
                  Rong Cheng and
                  Haibo Tian},
  title        = {Efficient obfuscation for {CNF} circuits and applications in cloud
                  computing},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {6},
  pages        = {2061--2072},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-017-2921-z},
  doi          = {10.1007/S00500-017-2921-Z},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/ZhangZCT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blocksys/TianLS19,
  author       = {Haibo Tian and
                  Peiran Luo and
                  Yinxue Su},
  editor       = {Zibin Zheng and
                  Hong{-}Ning Dai and
                  Mingdong Tang and
                  Xiangping Chen},
  title        = {A Group Signature Based Digital Currency System},
  booktitle    = {Blockchain and Trustworthy Systems - First International Conference,
                  BlockSys 2019, Guangzhou, China, December 7-8, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1156},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-2777-7\_1},
  doi          = {10.1007/978-981-15-2777-7\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blocksys/TianLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangLWT19,
  author       = {Fangguo Zhang and
                  Zhijie Liu and
                  Ping Wang and
                  Haibo Tian},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Improving {ECDLP} Computation in Characteristic 2},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {535--550},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_32},
  doi          = {10.1007/978-3-030-42921-8\_32},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangLWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/TianSL19,
  author       = {Haibo Tian and
                  Yinxue Su and
                  Zhenquan Liang},
  title        = {A Provable Secure Server Friendly Two-Party {SM2} Singing Protocol
                  for Blockchain IoT},
  booktitle    = {2019 {IEEE} Globecom Workshops, Waikoloa, HI, USA, December 9-13,
                  2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GCWkshps45667.2019.9024589},
  doi          = {10.1109/GCWKSHPS45667.2019.9024589},
  timestamp    = {Thu, 12 Mar 2020 12:42:23 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/TianSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paap/TianLS19,
  author       = {Haibo Tian and
                  Peiran Luo and
                  Yinxue Su},
  editor       = {Hong Shen and
                  Yingpeng Sang},
  title        = {An Efficient Group Signature Based Digital Currency System},
  booktitle    = {Parallel Architectures, Algorithms and Programming - 10th International
                  Symposium, {PAAP} 2019, Guangzhou, China, December 12-14, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1163},
  pages        = {380--392},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-2767-8\_34},
  doi          = {10.1007/978-981-15-2767-8\_34},
  timestamp    = {Mon, 27 Jan 2020 13:38:42 +0100},
  biburl       = {https://dblp.org/rec/conf/paap/TianLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TianLS19,
  author       = {Haibo Tian and
                  Peiran Luo and
                  Yinxue Su},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {A Centralized Digital Currency System with Rich Functions},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {288--302},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_17},
  doi          = {10.1007/978-3-030-31919-9\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/TianLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Tian0DZZ18,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Yong Ding and
                  Xiaoyan Zhu and
                  Fangguo Zhang},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {AFCoin: {A} Framework for Digital Fiat Currency of Central Banks Based
                  on Account Model},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {70--85},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_4},
  doi          = {10.1007/978-3-030-14234-6\_4},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/Tian0DZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZhangZTA18,
  author       = {Huang Zhang and
                  Fangguo Zhang and
                  Haibo Tian and
                  Man Ho Au},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Anonymous Post-Quantum Cryptocash},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {461--479},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_25},
  doi          = {10.1007/978-3-662-58387-6\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ZhangZTA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/TianMW17,
  author       = {Haibo Tian and
                  Yu{-}Feng Ma and
                  Baodian Wei},
  title        = {Proxy re-designated verifier signature and its applications},
  journal      = {Int. J. Embed. Syst.},
  volume       = {9},
  number       = {6},
  pages        = {535--547},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJES.2017.10008946},
  doi          = {10.1504/IJES.2017.10008946},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/TianMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TianFH17,
  author       = {Haibo Tian and
                  Liqing Fu and
                  Jiejie He},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {A Simpler Bitcoin Voting Protocol},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {81--98},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_7},
  doi          = {10.1007/978-3-319-75160-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TianFH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gski/WuWTDM17,
  author       = {Xijuan Wu and
                  Baodian Wei and
                  Haibo Tian and
                  Yusong Du and
                  Xiao Ma},
  editor       = {Hanning Yuan and
                  Jing Geng and
                  Chuanlu Liu and
                  Fuling Bian and
                  Tisinee Surapunt},
  title        = {Fair Electronic Voting via Bitcoin Deposits},
  booktitle    = {Geo-Spatial Knowledge and Intelligence - 5th International Conference,
                  {GSKI} 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected
                  Papers, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {849},
  pages        = {650--661},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-13-0896-3\_64},
  doi          = {10.1007/978-981-13-0896-3\_64},
  timestamp    = {Mon, 13 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gski/WuWTDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/TianHF17,
  author       = {Haibo Tian and
                  Jiejie He and
                  Liqing Fu},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Contract Coin: Toward Practical Contract Signing on Blockchain},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {43--61},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_3},
  doi          = {10.1007/978-3-319-72359-4\_3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/TianHF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-01030,
  author       = {Huige Li and
                  Fangguo Zhang and
                  Jiejie He and
                  Haibo Tian},
  title        = {A Searchable Symmetric Encryption Scheme using BlockChain},
  journal      = {CoRR},
  volume       = {abs/1711.01030},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.01030},
  eprinttype    = {arXiv},
  eprint       = {1711.01030},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-01030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiTZ17,
  author       = {Huige Li and
                  Haibo Tian and
                  Fangguo Zhang},
  title        = {Block Chain based Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZTA17,
  author       = {Huang Zhang and
                  Fangguo Zhang and
                  Haibo Tian and
                  Man Ho Au},
  title        = {Anonymous Post-Quantum Cryptocash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {716},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/716},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZTA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/MaTW16,
  author       = {Yu{-}Feng Ma and
                  Haibo Tian and
                  Baodian Wei},
  title        = {Secure Modular Exponentiation Outsource With Two Untrusted Programs
                  and Improved Checkability},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {32},
  number       = {5},
  pages        = {1205--1218},
  year         = {2016},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2016/201609\_05.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/MaTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TianZW16,
  author       = {Haibo Tian and
                  Fangguo Zhang and
                  Baodian Wei},
  title        = {A lattice-based partially blind signature},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1820--1828},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1439},
  doi          = {10.1002/SEC.1439},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TianZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/ZhangLTT15,
  author       = {Yongqiang Zhang and
                  Qiang Liu and
                  Chengpei Tang and
                  Haibo Tian},
  title        = {A lattice-based designated verifier signature for cloud computing},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {8},
  number       = {2},
  pages        = {135--143},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJHPCN.2015.070013},
  doi          = {10.1504/IJHPCN.2015.070013},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/ZhangLTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TianZR15,
  author       = {Haibo Tian and
                  Fangguo Zhang and
                  Kui Ren},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {417--426},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714615},
  doi          = {10.1145/2714576.2714615},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TianZR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/Tian014,
  author       = {Haibo Tian and
                  Jin Li},
  title        = {A short non-delegatable strong designated verifier signature},
  journal      = {Frontiers Comput. Sci.},
  volume       = {8},
  number       = {3},
  pages        = {490--502},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11704-013-3120-4},
  doi          = {10.1007/S11704-013-3120-4},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/Tian014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/SunTW14,
  author       = {Xi Sun and
                  Haibo Tian and
                  Yumin Wang},
  title        = {Toward quantum-resistant strong designated verifier signature},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {5},
  number       = {2},
  pages        = {80--86},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJGUC.2014.060187},
  doi          = {10.1504/IJGUC.2014.060187},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/SunTW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/0001ZSTLK14,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo and
                  Haibo Tian and
                  Jin Li and
                  Kwangjo Kim},
  title        = {Identity-based chameleon hashing and signatures without key exposure},
  journal      = {Inf. Sci.},
  volume       = {265},
  pages        = {198--210},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.12.020},
  doi          = {10.1016/J.INS.2013.12.020},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/0001ZSTLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/Tian0S14,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Willy Susilo},
  title        = {Deniability and forward secrecy of one-round authenticated key exchange},
  journal      = {J. Supercomput.},
  volume       = {67},
  number       = {3},
  pages        = {671--690},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11227-013-0968-x},
  doi          = {10.1007/S11227-013-0968-X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/Tian0S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WeiDZZTG14,
  author       = {Baodian Wei and
                  Yusong Du and
                  Huang Zhang and
                  Fangguo Zhang and
                  Haibo Tian and
                  Chong{-}zhi Gao},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {Identity Based Threshold Ring Signature from Lattices},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {233--245},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_18},
  doi          = {10.1007/978-3-319-11698-3\_18},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WeiDZZTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/TianZ0W13,
  author       = {Haibo Tian and
                  Fangguo Zhang and
                  Xiaofeng Chen and
                  Baodian Wei},
  title        = {Selectively unforgeable but existentially forgeable signature schemes
                  and applications},
  journal      = {Sci. China Inf. Sci.},
  volume       = {56},
  number       = {1},
  pages        = {1--14},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11432-012-4718-0},
  doi          = {10.1007/S11432-012-4718-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/TianZ0W13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/TianJLW13,
  author       = {Haibo Tian and
                  Zhengtao Jiang and
                  Yi Liu and
                  Baodian Wei},
  title        = {A systematic method to design strong designated verifier signature
                  without random oracles},
  journal      = {Clust. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {817--827},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10586-013-0255-x},
  doi          = {10.1007/S10586-013-0255-X},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/TianJLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Tian0WL13,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Baodian Wei and
                  Yi Liu},
  title        = {Security Analysis of a Suite of Deniable Authentication Protocols},
  journal      = {Int. J. Netw. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {384--389},
  year         = {2013},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n5/ijns-2013-v15-n5-p384-389.pdf},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Tian0WL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/Tian0ZWJL13,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Baodian Wei and
                  Zhengtao Jiang and
                  Yi Liu},
  title        = {A non-delegatable strong designated verifier signature in ID-based
                  setting for mobile environment},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {5-6},
  pages        = {1289--1300},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2013.01.010},
  doi          = {10.1016/J.MCM.2013.01.010},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/Tian0ZWJL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/Tian13,
  author       = {Haibo Tian},
  title        = {On Security Model of One-Round Authenticated Key Exchange},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {319--322},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.59},
  doi          = {10.1109/INCOS.2013.59},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/Tian13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/Tian13a,
  author       = {Haibo Tian},
  title        = {General Certificateless Strong Designated Verifier Signature Schemes},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {392--397},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.74},
  doi          = {10.1109/INCOS.2013.74},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/Tian13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/ZhangLT13,
  author       = {Yongqiang Zhang and
                  Qiang Liu and
                  Haibo Tian},
  title        = {A Hybrid System for Authentication Service},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {821--826},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.156},
  doi          = {10.1109/INCOS.2013.156},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/ZhangLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Tian12,
  author       = {Haibo Tian},
  title        = {Deniable message transmission authenticator based on weak signature
                  schemes},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {258--263},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0139},
  doi          = {10.1049/IET-IFS.2011.0139},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Tian12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/Tian12,
  author       = {Haibo Tian},
  title        = {A new strong multiple designated verifiers signature},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {1--11},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJGUC.2012.045694},
  doi          = {10.1504/IJGUC.2012.045694},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/Tian12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TianCL12,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Jin Li},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {A Short Non-delegatable Strong Designated Verifier Signature},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {261--279},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_20},
  doi          = {10.1007/978-3-642-31448-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TianCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/TianCZWJL12,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Baodian Wei and
                  Zhengtao Jiang and
                  Yi Liu},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Antonio Gentile and
                  Hae{-}Duck Joshua Jeong and
                  Marek R. Ogiela and
                  Fatos Xhafa},
  title        = {An Efficient Identity-Based Strong Designated Verifier Signature without
                  Delegatability},
  booktitle    = {Sixth International Conference on Innovative Mobile and Internet Services
                  in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012},
  pages        = {81--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IMIS.2012.34},
  doi          = {10.1109/IMIS.2012.34},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/TianCZWJL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/TianJLW12,
  author       = {Haibo Tian and
                  Zhengtao Jiang and
                  Yi Liu and
                  Baodian Wei},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {A Non-delegatable Strong Designated Verifier Signature without Random
                  Oracles},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {237--244},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.85},
  doi          = {10.1109/INCOS.2012.85},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/TianJLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/SunTW12,
  author       = {Xi Sun and
                  Haibo Tian and
                  Yumin Wang},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Toward Quantum-Resistant Strong Designated Verifier Signature from
                  Isogenies},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {292--296},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.70},
  doi          = {10.1109/INCOS.2012.70},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/SunTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/GaoXLWT12,
  author       = {Chong{-}zhi Gao and
                  Dongqing Xie and
                  Jin Li and
                  Baodian Wei and
                  Haibo Tian},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Deniably Information-Hiding Encryptions Secure against Adaptive Chosen
                  Ciphertext Attack},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {377--384},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.88},
  doi          = {10.1109/INCOS.2012.88},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/GaoXLWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhaoZT11,
  author       = {Xingwen Zhao and
                  Fangguo Zhang and
                  Haibo Tian},
  title        = {Dynamic asymmetric group key agreement for ad hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {9},
  number       = {5},
  pages        = {928--939},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.adhoc.2010.11.002},
  doi          = {10.1016/J.ADHOC.2010.11.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhaoZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ChenZTWK11,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Kwangjo Kim},
  title        = {Discrete logarithm based chameleon hashing and signatures without
                  key exposure},
  journal      = {Comput. Electr. Eng.},
  volume       = {37},
  number       = {4},
  pages        = {614--623},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.03.011},
  doi          = {10.1016/J.COMPELECENG.2011.03.011},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/ChenZTWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenWZTWLLK11,
  author       = {Xiaofeng Chen and
                  Qianhong Wu and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Byoungcheon Lee and
                  Hyunrok Lee and
                  Kwangjo Kim},
  title        = {New receipt-free voting scheme using double-trapdoor commitment},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {8},
  pages        = {1493--1502},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2010.12.012},
  doi          = {10.1016/J.INS.2010.12.012},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ChenWZTWLLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ChenSZTL11,
  author       = {Xiaofeng Chen and
                  Willy Susilo and
                  Fangguo Zhang and
                  Haibo Tian and
                  Jin Li},
  title        = {Identity-based trapdoor mercurial commitments and applications},
  journal      = {Theor. Comput. Sci.},
  volume       = {412},
  number       = {39},
  pages        = {5498--5512},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.tcs.2011.05.031},
  doi          = {10.1016/J.TCS.2011.05.031},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ChenSZTL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TianCJ11,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Zhengtao Jiang},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Non-interactive Deniable Authentication Protocols},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {142--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_12},
  doi          = {10.1007/978-3-642-34704-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TianCJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TianCJD11,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Zhengtao Jiang and
                  Yusong Du},
  editor       = {Howon Kim},
  title        = {Non-delegatable Strong Designated Verifier Signature on Elliptic Curves},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_15},
  doi          = {10.1007/978-3-642-31912-9\_15},
  timestamp    = {Wed, 01 Mar 2023 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/TianCJD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/Tian11,
  author       = {Haibo Tian},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Mario K{\"{o}}ppen},
  title        = {A New Strong Multiple Designated Verifiers Signature for Broadcast
                  Propagation},
  booktitle    = {2011 Third International Conference on Intelligent Networking and
                  Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
                  2, 2011},
  pages        = {268--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/INCoS.2011.31},
  doi          = {10.1109/INCOS.2011.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/Tian11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenZSTLK10,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo and
                  Haibo Tian and
                  Jin Li and
                  Kwangjo Kim},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Identity-Based Chameleon Hash Scheme without Key Exposure},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {200--215},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_13},
  doi          = {10.1007/978-3-642-14081-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenZSTLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChenTZD10,
  author       = {Xiaofeng Chen and
                  Haibo Tian and
                  Fangguo Zhang and
                  Yong Ding},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Comments and Improvements on Key-Exposure Free Chameleon Hashing Based
                  on Factoring},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {415--426},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_29},
  doi          = {10.1007/978-3-642-21518-6\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ChenTZD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChenZTWMKK10,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Qianhong Wu and
                  Yi Mu and
                  Jangseong Kim and
                  Kwangjo Kim},
  editor       = {Radu Sion},
  title        = {Three-Round Abuse-Free Optimistic Contract Signing with Everlasting
                  Secrecy},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {304--311},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_23},
  doi          = {10.1007/978-3-642-14577-3\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ChenZTWMKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TianCD09,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Yong Ding},
  title        = {Analysis of Two Types Deniable Authentication Protocols},
  journal      = {Int. J. Netw. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {242--246},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v9-n3/ijns-2009-v9-n3-p242-246.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TianCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhanTPZWZ09,
  author       = {Yang Zhan and
                  Haibo Tian and
                  Qingqi Pei and
                  Yueyu Zhang and
                  Yumin Wang and
                  Weidong Zhang},
  title        = {A Deep Copy Protection Framework for Electronic Devices within Home},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {23--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.249},
  doi          = {10.1109/IAS.2009.249},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhanTPZWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZTWK09,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Kwangjo Kim},
  title        = {Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete
                  Logarithm Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZTWK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenTZ09,
  author       = {Xiaofeng Chen and
                  Haibo Tian and
                  Fangguo Zhang},
  title        = {Comments and Improvements on Chameleon Hashing Without Key Exposure
                  Based on Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenTZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZTK09,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Kwangjo Kim},
  title        = {Identity-Based Chameleon Hash Scheme Without Key Exposure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZTK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenZTWSMLK08,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Willy Susilo and
                  Yi Mu and
                  Hyunrok Lee and
                  Kwangjo Kim},
  title        = {Efficient generic on-line/off-line (threshold) signatures without
                  key exposure},
  journal      = {Inf. Sci.},
  volume       = {178},
  number       = {21},
  pages        = {4192--4203},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ins.2008.06.022},
  doi          = {10.1016/J.INS.2008.06.022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ChenZTWSMLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/TianSMW08,
  author       = {Haibo Tian and
                  Willy Susilo and
                  Yang Ming and
                  Yumin Wang},
  title        = {A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol
                  Without Random Oracles},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {23},
  number       = {5},
  pages        = {832--842},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11390-008-9178-z},
  doi          = {10.1007/S11390-008-9178-Z},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/TianSMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/TianSW07,
  author       = {Haibo Tian and
                  Xi Sun and
                  Yumin Wang},
  title        = {A New Public-Key Encryption Scheme},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {1},
  pages        = {95--102},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9013-y},
  doi          = {10.1007/S11390-007-9013-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/TianSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/TianW06,
  author       = {Haibo Tian and
                  Yumin Wang},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Security Analysis of the Digital Transmission Copy Protection Specification},
  booktitle    = {Proceedings of the 2006 International Conference on Security {\&}
                  Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {134--137},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 06 Dec 2006 10:51:51 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/TianW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/TianZW05,
  author       = {Haibo Tian and
                  Yang Zhan and
                  Yumin Wang},
  title        = {Analysis of host authentication mechanism in current {POD} copy protection
                  system},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {51},
  number       = {3},
  pages        = {922--924},
  year         = {2005},
  url          = {https://doi.org/10.1109/TCE.2005.1510504},
  doi          = {10.1109/TCE.2005.1510504},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/TianZW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/TianSW05,
  author       = {Haibo Tian and
                  Xi Sun and
                  Yumin Wang},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {A Virtual Bridge Certificate Authority Model},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {500--507},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_74},
  doi          = {10.1007/11596981\_74},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/TianSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics