Cloud Cryptography (2012-)
-
Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai
Lin, Hong-Sheng Zhou:
Cryptography for Parallel RAM from Indistinguishability Obfuscation.
ITCS 2016: 179-190
-
Tao Zhang, Sherman S. M. Chow, Jinyuan Sun:
Password-Controlled Encryption with Accountable Break-Glass Access.
AsiaCCS 2016: 235-246
-
Yongjun Zhao, Sherman S. M. Chow:
Towards Proofs of Ownership Beyond Bounded Leakage. ProvSec 2016: 340-350
-
Sherman S. M. Chow:
A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing
and Revocation. SACMAT 2016: 215-226
-
Ying-Kai Tang, Sherman S. M. Chow, Joseph K. Liu:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the
Standard Model'. Comput. J. 58(4): 779-781 (2015)
-
Yue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li:
Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability.
IEEE J. Biomedical and Health Informatics 18(2): 419-429 (2014)
-
Cheng-Kang Chu, Sherman S. M.
Chow, Wen-Guey Tzeng, Jianying Zhou, Robert H. Deng:
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distrib. Syst. 25(2): 468-477 (2014)
-
Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep
Domingo-Ferrer, Wenchang Shi:
Tracing and revoking leaked credentials: accountability in leaking
sensitive outsourced data. ASIACCS 2014: 425-434
-
Russell W. F. Lai, Henry K. F.
Cheung, Sherman S. M. Chow:
Trapdoors for Ideal Lattices with Applications. Inscrypt 2014: 239-256
-
Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
A tale of two clouds: Computing on data encrypted under multiple keys. CNS
2014: 337-345
-
Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang:
Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability,
and Applications. CT-RSA 2014: 85-105
-
Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M.
Chow, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for
Cloud Storage. ESORICS (1) 2014: 326-343
-
Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow:
Secure cloud storage meets with secure network coding. INFOCOM 2014:
673-681. (Journal version in IEEE Transactions on Computers.)
-
Sherman S. M. Chow, Man Ho Au, Willy Susilo:
Server-aided signatures verification secure against collusion attack. Inf.
Sec. Techn. Report 17(3): 46-57 (2013)
-
Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans.
Computers 62(2): 362-375 (2013)
-
Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
Computing encrypted cloud data efficiently under multiple keys. CNS 2013:
504-513
-
Yue Tong, Jinyuan Sun, Sherman S.
M. Chow, Pan Li:
Towards auditable cloud-assisted access of encrypted health data. CNS
2013: 514-519
-
Boyang Wang, Sherman S. M. Chow, Ming Li, Hui Li:
Storing Shared Data on the Cloud via Security-Mediator. ICDCS 2013:
124-133
-
Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu:
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
ProvSec 2013: 139-153
-
Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu:
Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
EUROCRYPT 2012: 117-134
(back)