Journal Articles
14. Xin Yin, Zhen Liu, "A secure hierarchical deterministic wallet with stealth address from lattices," Theor. Comput. Sci. 1009: 114672 (2024).
13. Mingxing Hu, Weijiong Zhang, Zhen Liu, “An Improved Lattice-based Ring Signature with Unclaimable Anonymity in the Standard Model,” Comput. J., 66(10):2542-2553 (2023).
12. Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, Haojin Zhu, “Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network,” IEEE Trans. Veh. Technol. 72(8): 10682-10695 (2023).
11. Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu, “Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key,” IEEE Transactions on Dependable and Secure Computing 19 (5): 2934-2951.
10. Zhen Liu, Qiong Huang, Duncan S. Wong, “On Enabling Attribute-Based Encryption to Be Traceable against Traitors,” Comput. J. 64(4): 575-598 (2021).
9. Nanyuan Cao, Zhenfu Cao, Zhen Liu, Xiaolei Dong, Xiaopeng Zhao, “All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application,” Comput. J. 62(8): 1148-1157 (2019).
8. Erdong Deng, Huajun Zhang, Peilin Wu, Fei Guo, Zhen Liu, Haojin Zhu, and Zhenfu Cao, “Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing,” Inf. Sci. 504: 354-371 (2019).
7. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, and Dawu Gu, “Z-Channel: Scalable and efficient scheme in Zerocash,” Computers & Security 86: 112-131 (2019).
6. Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, and Yu Long, “Fork-free hybrid consensus with flexible Proof-of-Activity,” Future Generation Comp. Syst. 96: 515-524 (2019).
5. Hao Wang, Zhen Liu, Zhe Liu, and Duncan S. Wong, “Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps,” Frontiers of Computer Science 10(4): 741-754 (2016).
4. Kan Yang, Zhen Liu, Xiaohua Jia, and Xuemin Sherman Shen, “Time-Domain Attribute-based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach,” IEEE Transactions on Multimedia 18(5): 940-950 (2016).
3. Zhen Liu and Duncan S. Wong, “Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” Comput. J. 59(7): 983-1004 (2016).
2. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild,” IEEE Transactions on Information Forensics and Security10(1): 55-68 (2015).
1. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “White-box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures,” IEEE Transactions on Information Forensics and Security 8(1): 76-88 (2013).
Refereed Conference Papers
28. Chunping Zhu, Xingkai Wang, Zhen Liu, “Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key,” The 19th International Conference on Information Security and Cryptology (Inscrypt 2023), pp. 44-64.
27. Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu, “RAI2: Responsible Identity Audit Governing the Artificial Intelligence,” The 30th Annual Network and Distributed System Security Symposium (NDSS 2023).
26. Shenwei Chen, Zhen Liu, Yu Long, and Dawu Gu, “DeChain: A Blockchain Framework Enhancing Decentralization via Sharding” The 27th Australasian Conference on Information Security and Privacy (ACISP 2022), pp.469-488.
25. Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen and Haojin Zhu, “Secure Hierarchical Deterministic Wallet Supporting Stealth Address,” The 27th European Symposium on Research in Computer Security (ESORICS 2022), Part 1, pp. 89-109.
24. Xingkai Wang, Zhenfu Cao, Zhen Liu, and Kaitai Liang, “Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption,” The 27th European Symposium on Research in Computer Security (ESORICS 2022), Part 2, 105-125.
23. Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, and Dawu Gu, “MixCT: Mixing Confidential Transactions from Homomorphic Commitment,” The 27th European Symposium on Research in Computer Security (ESORICS 2022), Part 3, 763-769.
22. Yu Song, Guoshun Fan, Yu Long, Zhen Liu, Xian Xu, Dawu Gu, “Grape: Efficient Hybrid Consensus Protocol Using DAG,” DPM/CBT@ESORICS 2022, pp.258-274.
21. Geng Wang, Ming Wan, Zhen Liu, Dawu Gu, “Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption,” The 17th International Conference on Information Security and Cryptology (Inscrypt 2021), pp. 421-441.
20. Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu, and Yu Yu, “MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK),” The 26th European Symposium on Research in Computer Security (ESORICS 2021), Part 2, pp.332-351.
19. Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang, and Yu Yu, “A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key” The 25th European Symposium on Research in Computer Security (ESORICS 2020), Part 2, pp.357-377.
18. Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, and Duncan S. Wong, “A Lattice-based Linkable Ring Signature Supporting Stealth Addresses,” The 24th European Symposium on Research in Computer Security (ESORICS 2019), Part I, pp. 726-746.
17. Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, and Huaxiong Wang, “Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key,” The 4th IEEE European Symposium on Security and Privacy (Euro S&P 2019), pp. 215-230.
16. Geng Wang, Zhen Liu and Dawu Gu, “Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption,” The 21th International Conference on Information and Communications Security (ICICS 2019), pp. 378-396, Springer, 2019.
15. Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu, “Making Monero Hard-to-Trace and More Efficient," TrustCom/BigDataSE 2019: 514-521
14. Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu, “A Secure and Practical Blockchain Scheme for IoT,” TrustCom/BigDataSE 2019: 538-545.
13. Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia, “TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility,” The 13th International Conference on Provable Security (ProvSec 2019), pp. 339-346, Springer, 2019.
12. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, and Dawu Gu, “Z-Channel: Scalable and Efficient Scheme in Zerocash,” The 23th Australasian Conference on Information Security and Privacy (ACISP 2018), pp. 687-705, Springer, 2018.
11. Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu, “Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol,” In Proc. of the 14th International Conference on Information Security and Cryptology (Inscrypt 2018), pp. 49-69, Springer, 2018.
10. Hao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, and Dawu Gu, “Dynamic Practical Byzantine Fault Tolerance,” 2018 IEEE Conference on Communications and Network Security (CNS 2018), pp. 1-8, IEEE, 2018.
9. Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, and Ning Ding, “Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain,” 12th International Conference on Network and System Security (NSS 2018), pp. 1-15, Springer, 2018.
8. Zhen Liu, Duncan S. Wong, and Jack Poon, “Dealerless Corporate Key Generation for Identity-Based Encryption Schemes,” The 11th ACM on Asia Conference on Computer and Communications Security (ASIACCS 2016), pp. 211-222, ACM, 2016.
7. Zhen Liu and Duncan S. Wong, “Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable,” The 17th International Conference on Information and Communications Security (ICICS 2015), pp. 109-124, Springer, 2015.
6. Zhen Liu and Duncan S. Wong, “Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” In Proc. of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), pp. 127 – 146, Springer, 2015.
5. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts,” In Proc. of the 10th International Conference on Information Security and Cryptology (INSCRYPT 2014), pp. 403 – 423, Springer, 2014.
4. Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, and Xiao Tan, “Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage,” In Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014), pp. 326 – 343, Springer, 2014.
3. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay,” In Proc. of the 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 475-486, ACM, 2013.
2. Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, and Chunming Tang, “A CCA-Secure Identity-Based Conditional Proxy Re-Encryption Without Random Oracles,” In Proc. of the 15th International Conference on Information Security and Cryptology (ICISC 2012), pp. 231-246, Springer, 2012.
1. Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, and Tsz Hon Yuen, “Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles,” In Proc. of the 16th European Symposium on Research in Computer Security (ESORICS 2011), pp. 278 – 297, Springer, 2011.