学术成果
01. Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao, Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency,, IEEE Transactions on Dependable and Secure Computing, 2018, eprint.
02. Pingyuan Zhang, Han Jiang, Zhihua Zheng, Peichu Hu, Qiuliang Xu A New Post-Quantum Blind Signature From Lattice Assumptions. IEEE Access. 2018, 6: 27251-27258
03. Chao Ning, Qiuliang Xu, Multiparty computation for modulo reduction without bit-decomposition and a generalization to bit-decomposition, ASIACRYPT 2010, 2010.12.5-2010.12.9.
04. Chao Ning, Qiuliang Xu, Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security, ASIACRYPT 2011, 2011.12.4-2011.12.8.
05. Yang R, Xu Q, Zhou Y, et al. Updatable Hash Proof System and Its Applications. Computer Security–ESORICS 2015. Springer International Publishing, 2015: 266-285.
06. Junwei Wang, Praveen Kumar Vadnala, Johann Großsch adl, Qiuliang Xu, Higher-Order Masking in Practice: A Vector Implementation of Masked AES on ARM NEON, CT-RSA 2015, San Francisco, 2015.4.20-2015.4.24.
07. Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu, Fair two-party computation with rational parties holding private types, Security and Communication Networks, 2015, 8(2): 284-297.
08. Yilei Wang, Zhe Liu, Qiuliang Xu, New rational parties relying on reputation, Security and Communication Networks, 2014, 7: 1128-1137.
09. Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao,Cut-and-Choose Bilateral Oblivious Transfer and Its Application. The 14th IEEE International Conf on Trust, Security and Privacy in Computing and Communications.2015: 384–391
10. Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu, Fair secure computation with reputation assumptions in the mobile social networks, Mobile Information Systems, 2014, 014: 1-12.
11. Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu, Social rational secure multi-party computation, Concurrency and Computation Practice and Experience, 2014, 26: 1067-1083.
12. 王伊蕾, 郑志华, 王皓, 徐秋亮, 满足可计算序贯均衡的理性公平计算, 计算机研究与发展, 2014, 51(7): 1527-15 37.
13. Rui LI , Qiu-Liang XU, A new construction of concurrent non-malleable zero-knowledge, Chinese Journal of Computers, 2012, 35(4): 682-692.
14. 张斌, 徐秋亮, 蒋瀚, 新的可抵抗自适应敌手的可组合茫然传输协议, 通信学报, 2011, 32(11A): 1-8.
15. 柳欣, 徐秋亮, 实用的强不可分割多重息票方案, 计算机研究与发展, 2012, 12: 2575-2590.
16. 王伊蕾, 徐秋亮, 理性安全多方计算研究, 密码学报, 2014, 1(5): 481-490.
17. Hou Mengbo, Xu Qiuliang, Guo Shanqing, Jiang Han, Cryptanalysis on identity-based authenticated key agreement protocols from pairings, Journal of Networks, 2010, 5(7): 855-862.
18. Hou Mengbo, Xu Qiuliang, Guo Shanqing, Secure Key-Escrowless Explicit Authenticated Key Agreement Protocol in ID-based Public Key Cryptography, Journal of Information Assurance and Security, 2010, (5): 130-137.
19. Xiu-Feng ZHAO , Qiu-Liang XU, An efficient multi-PKG ID-based signcryption scheme, Chinese Journal of Computers, 2012, 35(4): 673-681.
20. Bin Zhang, Qiuliang Xu, Han Jiang, Xiufeng Zhao, Research on the round complexity of vss in the information theory model, International Journal of Digital Content Technology and Its Applications, 2012, 6(8): 45-53.
21. Jiang Han, Xu Qiuliang, Shang Jiuqing, An efficient dynamic identity-based broadcast encryption scheme, 2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, 2010.9.13-2010.9.14.
22. 王皓, 徐秋亮, 抗适应性选择身份攻击的匿名HIBE方案, 计算机学报, 2011, 34(1): 25-37.
23. 张波, 徐秋亮, 无随机预言机的基于身份多签密方案, 计算机学报, 2010, 33(1): 103-110.
24. 张忠, 徐秋亮, 物联网环境下UC安全的组证明RFID协议, 计算机学报, 2011, 34(7): 1188-1194.