学术成果

 

01. Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao, Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency,IEEE Transactions on Dependable and Secure Computing, 2018, eprint.

02. Pingyuan Zhang, Han Jiang, Zhihua Zheng, Peichu Hu, Qiuliang Xu A New Post-Quantum Blind Signature From Lattice Assumptions. IEEE Access. 2018, 6: 27251-27258

03. Chao Ning, Qiuliang Xu, Multiparty computation for modulo reduction without bit-decomposition and a generalization to bit-decompositionASIACRYPT 2010, 2010.12.5-2010.12.9.

04. Chao Ning, Qiuliang Xu, Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect SecurityASIACRYPT 2011, 2011.12.4-2011.12.8.

05. Yang R, Xu Q, Zhou Y, et al. Updatable Hash Proof System and Its Applications. Computer Security–ESORICS 2015. Springer International Publishing, 2015: 266-285.

06. Junwei Wang, Praveen Kumar Vadnala, Johann Großsch adl, Qiuliang Xu, Higher-Order Masking in Practice: A Vector Implementation of Masked AES on ARM NEONCT-RSA 2015, San Francisco, 2015.4.20-2015.4.24.

07. Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu, Fair two-party computation with rational parties holding private typesSecurity and Communication Networks, 2015, 8(2): 284-297.

08. Yilei Wang, Zhe Liu, Qiuliang Xu, New rational parties relying on reputationSecurity and Communication Networks, 2014, 7: 1128-1137.

09. Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao,Cut-and-Choose Bilateral Oblivious Transfer and Its ApplicationThe 14th IEEE International Conf on Trust, Security and Privacy in Computing and Communications.2015: 384–391

10. Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu, Fair secure computation with reputation assumptions in the mobile social networksMobile Information Systems, 2014, 014: 1-12.

11. Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu, Social rational secure multi-party computationConcurrency and Computation Practice and Experience, 2014, 26: 1067-1083.

12. 王伊蕾, 郑志华, 王皓, 徐秋亮, 满足可计算序贯均衡的理性公平计算计算机研究与发展, 2014, 51(7): 1527-15 37.

13. Rui LI , Qiu-Liang XU, A new construction of concurrent non-malleable zero-knowledgeChinese Journal of Computers, 2012, 35(4): 682-692.

14. 张斌, 徐秋亮, 蒋瀚, 新的可抵抗自适应敌手的可组合茫然传输协议通信学报, 2011, 32(11A): 1-8.

15. 柳欣, 徐秋亮, 实用的强不可分割多重息票方案计算机研究与发展, 2012, 12: 2575-2590.

16. 王伊蕾, 徐秋亮, 理性安全多方计算研究密码学报, 2014, 1(5): 481-490.

17. Hou Mengbo, Xu Qiuliang, Guo Shanqing, Jiang Han, Cryptanalysis on identity-based authenticated key agreement protocols from pairingsJournal of Networks, 2010, 5(7): 855-862.

18. Hou Mengbo, Xu Qiuliang, Guo Shanqing, Secure Key-Escrowless Explicit Authenticated Key Agreement Protocol in ID-based Public Key Cryptography, Journal of Information Assurance and Security, 2010, (5): 130-137.

19. Xiu-Feng ZHAO , Qiu-Liang XU, An efficient multi-PKG ID-based signcryption schemeChinese Journal of Computers, 2012, 35(4): 673-681.

20. Bin Zhang, Qiuliang Xu, Han Jiang, Xiufeng Zhao, Research on the round complexity of vss in the information theory modelInternational Journal of Digital Content Technology and Its Applications, 2012, 6(8): 45-53.

21. Jiang Han, Xu Qiuliang, Shang Jiuqing, An efficient dynamic identity-based broadcast encryption scheme, 2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, 2010.9.13-2010.9.14.

22. 王皓, 徐秋亮, 抗适应性选择身份攻击的匿名HIBE方案计算机学报, 2011, 34(1): 25-37.

23. 张波, 徐秋亮, 无随机预言机的基于身份多签密方案计算机学报, 2010, 33(1): 103-110.

24. 张忠, 徐秋亮, 物联网环境下UC安全的组证明RFID协议计算机学报, 2011, 34(7): 1188-1194.