Follow
Tang Qiang
Title
Cited by
Cited by
Year
New algorithms for secure outsourcing of modular exponentiations
X Chen, J Li, J Ma, Q Tang, W Lou
IEEE Transactions on Parallel and Distributed Systems 25 (9), 2386-2396, 2013
5252013
Privacy in recommender systems
AJP Jeckmans, M Beye, Z Erkin, P Hartel, RL Lagendijk, Q Tang
Social media retrieval, 263-281, 2013
2022013
Type-based proxy re-encryption and its construction
Q Tang
International Conference on Cryptology in India, 130-144, 2008
1972008
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
L Ibraimi, Q Tang, P Hartel, W Jonker
Information Security Practice and Experience: 5th International Conference …, 2009
1852009
Public key encryption supporting plaintext equality test and user‐specified authorization
Q Tang
Security and Communication Networks 5 (12), 1351-1362, 2012
1842012
An application of the Goldwasser-Micali cryptosystem to biometric authentication
J Bringer, H Chabanne, M Izabachene, D Pointcheval, Q Tang, S Zimmer
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
1822007
Public key encryption schemes supporting equality test with authorisation of different granularity
Q Tang
International journal of applied cryptography 2 (4), 304-321, 2012
1742012
Towards public key encryption scheme supporting equality test with fine-grained authorization
Q Tang
Australasian conference on information security and privacy, 389-406, 2011
1692011
Public-key encryption with registered keyword search
Q Tang, L Chen
European public key infrastructure workshop, 163-178, 2009
1512009
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
Computer science and information systems 10 (2), 667-684, 2013
1412013
Efficient conditional proxy re-encryption with chosen-ciphertext security
J Weng, Y Yang, Q Tang, RH Deng, F Bao
Information Security: 12th International Conference, ISC 2009, Pisa, Italy …, 2009
1262009
Efficient algorithms for secure outsourcing of bilinear pairings
X Chen, W Susilo, J Li, DS Wong, J Ma, S Tang, Q Tang
Theoretical Computer Science 562, 112-121, 2015
1012015
Privacy-preserving contact tracing: current solutions and open questions
Q Tang
arXiv preprint arXiv:2004.06818, 2020
932020
Nothing is for free: Security in searching shared and encrypted data
Q Tang
IEEE Transactions on Information Forensics and Security 9 (11), 1943-1952, 2014
852014
Dumbo-ng: Fast asynchronous bft consensus with throughput-oblivious latency
Y Gao, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
692022
A formal study of the privacy concerns in biometric-based remote authentication schemes
Q Tang, J Bringer, H Chabanne, D Pointcheval
International Conference on Information Security Practice and Experience, 56-70, 2008
692008
Extended private information retrieval and its application in biometrics authentications
J Bringer, H Chabanne, D Pointcheval, Q Tang
International Conference on Cryptology and Network Security, 175-193, 2007
682007
Speeding dumbo: Pushing asynchronous bft closer to practice
B Guo, Y Lu, Z Lu, Q Tang, J Xu, Z Zhang
Cryptology ePrint Archive, 2022
672022
Post-quantum era privacy protection for intelligent infrastructures
L Malina, P Dzurenda, S Ricci, J Hajny, G Srivastava, R Matulevičius, ...
IEEE Access 9, 36038-36077, 2021
652021
On key recovery attacks against existing somewhat homomorphic encryption schemes
M Chenal, Q Tang
Progress in Cryptology-LATINCRYPT 2014: Third International Conference on …, 2015
652015
The system can't perform the operation now. Try again later.
Articles 1–20