2018年
1.
Yunhua Wen, Shengli
Liu*, Shuai Han: Reusable
fuzzy extractor from the decisional Diffie-Hellman assumption DCC 2018
(published online). (SCI/EI, Impact Factor: 1.009) (CCF B)
2.
Shuai
Han, Shengli
Liu*, Lin Lyu: Super-strong RKA secure MAC, PKE and SE from
tag-based hash proof system, Designs Codes and Cryptograph, 86(7): 1411-1449
(2018). The online version of this article (doi:10.1007/s10623-017-0404-y). (SCI/EI, Impact Factor: 1.009) (CCF B)
3. Shuai Han, Shengli Liu*, Baodong Qin, Dawu Gu: Tightly CCA-secure identity-based encryption with
ciphertext pseudorandomness. Des. Codes
Cryptography 86(3): 517-554 (2018), (SCI/EI, Impact Factor: 1.009) (CCF B)
4.
Lin Lyu,Shengli Liu*,Shuai Han: Public-Key Encryption with Tight Simulation-Based
Selective-Opening Security,THE COMPUTER JOURNAL,
61(2): 288-318 , 2018,
doi:10.1093/comjnl/bxx080, (SCI/EI,
Impact Factor: 0.711) (CCF B)
5. Lin Lyu, Shengli Liu*, Shuai Han, Dawu Gu: Tightly SIM-SO-CCA Secure Public Key Encryption from
Standard Assumptions. Public Key
Cryptography (1) 2018: 62-92, (CCF
B) (EI)
6.
Yunhua Wen, Shengli Liu*: Reusable Fuzzy Extractor from LWE. Information
Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong,
NSW, Australia, July 11-13, 2018, LNCS: 10946: 13-27. (CCF C) (EI) https://doi.org/10.1007/978-3-319-93638-3
7.
Ziyuan Hu, Shengli Liu*, Kefei Chen, Joseph K. Liu: Revocable Identity-Based
Encryption from the Computational Diffie-Hellman Problem. Information Security
and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW,
Australia, July 11-13, 2018, LNCS: 10946: 265-283. (CCF C) (EI) https://doi.org/10.1007/978-3-319-93638-3
2017年
1. Shuai Han, Shengli Liu*, Lin
Lyu: Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input
Authenticated Encryption. Security and
Communication Networks, 2017: 2148534:1-2148534:27 (2017), (SCI/EI, Impact Factor: 1.067) (CCF C)
2.
Shuai Han, Shengli Liu*: KDM-Secure Public-Key Encryption from Constant-Noise LPN. ACISP
(1) 2017: 44-64 EI (CCF C)
3.
Xiao
Zhang, Shengli Liu*, Dawu Gu: Tightly-Secure Signatures from the Decisional Composite
Residuosity Assumption. ACISP (1) 2017: 453-468 EI (CCF C)
4.
Baodong
Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu, “Related-key secure key
encapsulation from extended computational bilinear Diffie-Hellman”, Information
Sciences, 406 (2017) 1–11 (SCI/EI, Impact Factor: 4.832) (CCF B)
5.
Zhengan
Huang, Shengli Liu, Xianping
Mao, Kefei Chen, Jin Li*, Insight of the protection for data security under
selective opening attacks, Information Sciences, 412 (2017) 223–241(SCI/EI, Impact Factor: 4.832) (CCF B)(TC:6)
2016年
1.
Shuai Han, Shengli Liu*, Lin Lyu:
Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions.
ASIACRYPT (2) 2016: 307-338 EI (CCF B)(TC:1)
2.
Shifeng Sun,
Shuai Han, Dawu Gu, Shengli Liu: Public key cryptosystems secure against memory leakage attacks. IET
Information Security 10(6): 403-412 (2016) (SCI/EI,
impact factor 1.013) (CCF C)
3.
Shifeng Sun,
Dawu Gu, Shengli Liu: Efficient chosen ciphertext secure identity-based encryption against
key leakage attacks. Security and Communication Networks 9(11): 1417-1434 (2016)
(SCI/EI, Impact Factor: 1.067) (CCF C)(Google
Scholar index 3 times) (TC:1)
4.
Shuai Han, Shengli Liu*, Fangguo Zhang,
Kefei Chen: Homomorphic Linear Authentication Schemes from
epsilon-Authentication Codes. AsiaCCS 2016: 487-498 EI
(CCF C)
5.
Baodong Qin,
Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei: How to Make the Cramer-Shoup Cryptosystem Secure Against
Linear Related-Key Attacks. Inscrypt 2016: 150-165
2015年
1. Shengli Liu*, Kenneth G. Paterson: Simulation-Based Selective Opening CCA Security
for PKE from Key Encapsulation Mechanisms. Public Key Cryptography 2015: 3-26.
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on
Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30
- April 1, 2015, Proceedings. Lecture Notes in Computer Science 9020, Springer
2015, ISBN 978-3-662-46446-5 (Google Scholar index
10 times) (CCF B)
2.
Baodong Qin, Shengli Liu*, Tsz Hon Yuen, Robert
H. Deng, Kefei Chen: Continuous Non-malleable Key Derivation and Its
Application to Related-Key Security. Public Key Cryptography 2015: 557-578,
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on
Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30
- April 1, 2015, Proceedings. Lecture Notes in Computer Science 9020, Springer
2015, ISBN 978-3-662-46446-5 (CCF B)
3.
Zhengan Huang, Shengli Liu*, Baodong Qin,
Kefei Chen, Sender-Equivocable Encryption Schemes Secure against
Chosen-Ciphertext Attacks Revisited. Applied Mathematics and Computer Science
25(2): 415-430 (2015), June 2015. (SCI, impact factor 1.42)
4.
Baodong Qin, Shengli Liu*, Kefei Chen:
Efficient chosen-ciphertext secure public-key encryption scheme with high
leakage-resilience. IET Information Security 9(1): 32-42 (2015) (SCI/EI, impact factor 1.013, Google Scholar index 7
times) (CCF C)
5.
Zhengan Huang, Shengli Liu*, Kefei Chen:
n-Evasive all-but-many lossy trapdoor function and its constructions. Security
and Communication Networks 8(4): 550-564 (2015) (SCI/EI,
Impact Factor: 1.067) (CCF C)
6.
Jian Weng,
Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai: A note on the security of KHL
scheme. Theor. Comput. Sci. 602: 1-6 (2015) (SCI/EI)
(CCF B, Impact Factor: 0.698)
7.
Baodong Qin,
Robert H. Deng, Shengli Liu*, Siqi Ma: Attribute-Based Encryption With Efficient Verifiable
Outsourced Decryption. IEEE Transactions on Information Forensics and Security
10(7): 1384-1393 (2015) (CCF A) (SCI/EI, Impact
Factor: 4.432) (Google Scholar index 48 times)(TC:25)
8.
Baodong Qin,
Robert H. Deng, Yingjiu Li, Shengli Liu: Server-Aided Revocable Identity-Based Encryption. ESORICS (1) 2015:
286-304. Computer Security - ESORICS 2015 - 20th European Symposium on Research
in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9
(CCF B) (EI) (Google Scholar index 8 times)(TC:4)
9.
Zhengan Huang, Shengli Liu,
Xianping Mao, Kefei Chen: Non-malleability Under Selective Opening Attacks:
Implication and Separation. ACNS 2015: 87-104 (EI)(CCF
C)(Google Scholar index once)
10.
Xuhua Zhou , Junzuo Lai, Shengli Liu,
Kefei Chen: Sequential Aggregate Signatures and Multisignatures in the Plain Public
Key Model. Chinese Journal of Electronics, Vol.24, No.2, Apr. 2015(SCI/EI,
Impact Factor: 0.513)
2014年
1. 刘胜利,公钥加密系统的可证明安全--新挑战新方法,密码学报,第1卷,第6期,537-550页,2014年12月
2. Shengli Liu*, Fangguo Zhang, Kefei Chen: Public-key encryption scheme with
selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman
assumption. Concurrency and Computation: Practice and Experience 26(8):
1506-1519 (2014) (SCI/EI, Impact Factor: 1.133)
(Google Scholar index 4 times) (CCF C)(TC:2)
3. Shengli Liu*, Henk van Tilborg, Jian Weng and Kefei Chen, Authentication Codes
from epsilon-ASU Hash functions with Partially Secret Keys, Chinese Journal of
Electronics, Vol.23 No.4 October 2014, pp.790-793 (2014) (SCI/EI, Impact Factor: 0.513)
4.
Fangguo Zhang,
Xu Ma, Shengli Liu: Efficient computation outsourcing for inverting a class of
homomorphic functions. Inf. Sci. 286: 19-28 (2014) (SCI/EI)
(CCF B, Impact Factor: 4.832) (Google Scholar index 11 times)(TC:5)
5.
Shuai Han, Shengli Liu*,
Kefei Chen, and Dawu Gu, “Proofs of Retrievability Based on MRD Codes”, The
10th International Conference on Information Security Practice and Experience
(ISPEC 2014), LNCS 8434, pp.330-345, Springer, Fuzhou, China, May 5-8, 2014. (EI) (Google Scholar index 3 times)
6.
Junzuo Lai, Robert H.
Deng, Shengli Liu*, Jian Weng, and Yunlei
Zhao, “Identity-Based Encryption Secure Against Selective Opening
Chosen-Ciphertext Attack”, the 33rd Annual International Conference on the
Theory and Applications of Cryptographic Techniques (EUROCRYPT 2014), LNCS
8441, pp. 77-92, Springer, Copenhagen, Denmark, May 11-15, 2014. (CCF A) (EI) (Google Scholar index 18 times)(TC:8)
7.
Baodong Qin, Shengli Liu*,
“Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and
Free of Pairing”, The 17th International Conference on Practice and Theory in
Public-Key Cryptography (PKC 2014), LNCS 8383, p.19-36, Buenos Aires,
Argentina, March 26-28, 2014. (CCF B) (EI) (Google
Scholar index 21 times)(TC:5)
8.
XU Yi-dong, Shengli
Liu, One Construction of Chameleon All-But-One
Trapdoor Functions, Journal of shanghai Jiaotong University ( Science ). 2014
Vol. 19 (4): 412-417 (EI)
2013年
1.
ZBaodong Qin, Shengli
Liu*, “Leakage-Resilient Chosen-Ciphertext Secure
Public-Key Encryption from Hash Proof System and One-Time Lossy Filter”, the
19th Annual International Conference on the Theory and Application of
Cryptology and Information Security (AsiaCrypt2013), LNCS 8270, pp.381-400,
Bangalore, India, Dec 1-5, 2013. (CCF B) (EI)
(Google Scholar index 36 times)(TC:3)
2. Shengli Liu,
Kouichi Sakurai, Jian Weng, Fangguo Zhang and Yunlei Zhao, “Security Model and
Analysis of FHMQV, Revisited”, the 9th China International Conference on
Information Security and Cryptology (Inscrypt 2013), Guangzhou, China, Nov. 27
- Nov. 30, 2013. (EI) (Google Scholar index 3 times)
3.
Shi-Feng Sun, Dawu Gu, and Shengli Liu,
“Efficient Leakage-Resilient Identity-Based Encryption with CCA Security”, the
6th International Conference on Pairing-Based Cryptography (Pairing 2013), LNCS
8365, pp. 149-167, Beijing, China, November 22-24, 2013. (EI)(Google Scholar index 6 times)
4.
Zhengan Huang, Shengli
Liu*, Baodong Qin, Kefei Chen: “Fixing the
Sender-Equivocable Encryption Scheme in Eurocrypt 2010”, 2013 Fifth
International Conference on Intelligent Networking and Collaborative Systems (INCoS
2013), pp.366-372, Xian, China, Sep.9-11 2013. (EI)
(Google Scholar index 8 times)
5.
Baodong Qin, Shengli Liu*,
Zhengan Huang: “Key-Dependent Message Chosen-Ciphertext Security of the
Cramer-Shoup Cryptosystem”. 18th Australasian Conference on Information
Security and Privacy (ACISP 2013), LNCS 7959, pp: 136-151, Springer, Brisbane,
Australia, July 1-3,2013. (CCF C) (EI) (Google Scholar index 8 times)
6.
Baodong Qin, Shengli
Liu*, Kefei Chen and Manuel Charlemagne,
“Leakage-Resilient Lossy Trapdoor Functions and Public-Key Encryption”, 2013
ACM Asia Public-Key Cryptography Workshop (AsiaPKC2013), pp. 3-11, May 7, 2013,
Hangzhou, China. (EI) (Google Scholar index 7
times)
7.
Zhengan Huang, Shengli
Liu*, Baodong Qin, “Sender-Equivocable Encryption
Schemes Secure against Chosen-Ciphertext Attacks Revisited”, The 16th
International Conference on Practice and Theory in Public-Key Cryptography (PKC
2013), K. Kurosawa and G. Hanaoka (Eds.): PKC 2013, LNCS 7778, pp. 369C385,
Springer, Nara, Japan, Feb. 26 - Mar. 1, 2013.
(CCF B) (EI) (Google Scholar index 21 times)(TC:2)
8.
Baodong Qin, Shengli
Liu*: “Efficient chosen ciphertext secure
public-key encryption under factoring assumption”. Security and Communication
Networks 6(3): 351-360, 2013. (CCF C) (SCI/EI, Impact Factor: 1.067) (Google Scholar
index 3 times)(TC:1)
9.
Zhou Dehua, Chen Kefei, Shengli
Liu, Zheng Dong, “Identity-Based Conditional Proxy
Re-Encryption”, CHINESE JOURNAL OF ELECTRONICS, 22(1), pp 61-66, 2013. (SCI/EI, Impact
Factor: 0.513)(TC:4)
10. Shengli Liu,
Jian Weng, Yulei Zhao, “Efficient Public Key Cryptosystem Resilient to Key
Leakage Chosen Ciphertext Attacks”, CT-RSA 2013, LNCS 7779, pp. 84–100,
Springer, Heidelberg, San Francisco, Feb 25 - Mar. 1, 2013. (CCF C) (EI) (Google Scholar index 29 times)
2012年
1. Shengli Liu*,
Fangguo Zhang, Kefei Chen, “Selective Opening Chosen Ciphertext Security
Directly from the DDH Assumption”, NSS 2012, LNCS 7645, Springer, pp. 100-112,
Wu Yi Shan, China, November 21-23, 2012. (EI)
2. Shengli Liu*,
Kefei Chen, “Homomorphic Linear Authentication Schemes from epsilon-ASU2
Functions for Proofs of Retrievability”, Control & Cybernetics Journal,
Vol. 42, No. 2, pp. 900-916. 2012. (EI)(Google
Scholar index once)
3.
Fangguo Zhang, Qiping Lin, Shengli Liu,
“Zero-Value Point Attacks on Kummer-Based Cryptosystem”, ACNS 2012, LNCS 2846,
Springer, Singapore, pp. 293-310, June 2012. (EI)(CCF
C)
4.
Junxiang Wang, Shengli Liu,“Dynamic Provable Data Possession with batch-update verifiability”, 2012 IEEE International Conference on Intelligent Control, Automatic
Detection and High-End Equipment (ICADE), pp. 108 - 113 , Beijing, 27-29 July
2012 (EI)(Google
Scholar 9 times)
5.
Yanxiang Lou, Yong Zhang, Shengli Liu,
Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks,
2012 International Workshop on Information and Electronics Engineering (IWIEE),
Procedia Engineering 29, pp. 2798 –
2803, 2012 (EI)(Google Scholar 25 times)(TC:6)
6.
Zhang Yong, Liu Shengli, Analysis and Shortening of Ciphertext Length of the Bounded CCA Security
Encryption and Better Ciphertext Length Based on the PDLP, The 4th
International Conference on Computational Intelligence and Software Engineering
(CiSE 2012), Wuhan, Dec.14-16 2012.
2011年
1. Shengli Liu*, Kefei Chen, "Homomorphic Linear Authentication Schemes for Proofs of
Retrievability", 2011 Third International Conference on Intelligent
Networking and Collaborative Systems (INCoS 2011), pp. 258-262, Nov.30-Dec.2
2011, Fukuoka, Japan. (EI) (Google Scholar index 2 times)
2. Shengli Liu*,
Junzuo Lai and Robert Deng, "General Construction of Chameleon All-But-One
Trapdoor Functions", Journal of Internet Services and Information
Security, volume: 1, number: 2/3, pp. 74-88, August 2011. (EI) (Google Scholar
index 3 times)
3. Shengli Liu*,
Junzuo Lai and Robert Deng, "General Construction of Chameleon All-But-One
Trapdoor Functions", ProvSec 2011, LNCS 6890, Springer, Oct.16-18, Xi’an. (EI)
4. Shengli Liu*,
Yu Long, Kefei Chen, "Key Updating Technique in Identity-based Encryption",
Information Sciences, vol. 181, issue. 11, pp. 2436-2440, 2011. (CCF B) (SCI/EI,
Impact Factor: 4.832) (Google Scholar index 15 times)(TC:11)
5.
Junzuo Lai, Robert H. Deng
and Shengli Liu,
"Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext
Security", The 14th IACR International Conference on Practice and Theory
in Public Key Cryptography (PKC 2011), LNCS 6571, Springer, pp. 228-245, March
6-9, 2011, Taormina, Italy. (CCF B) (EI)
(Google Scholar index 8 times)(TC:4)
6.
Zhong-Mei Wan, Jian Weng,
Xue-Jia Lai, Shengli Liu,
Jiguo Li: "On the Relation between Identity-Based Proxy Re-Encryption and
Mediated Identity-Based Encryption". J. Inf. Sci. Eng. 27(1): 243-259,
2011. (SCI/EI, Impact Factor: 0.468) (Google
Scholar index 4 times)
7.
Gang LIU, Yanxiang LOU, Shengli
Liu, Data Integrity Check and Repair in
Distributed Storage Network, ICIECS 2011, pp. 2011.
2010年
1.
Junzuo Lai, Robert H.
Deng, Shengli Liu,
and Weidong Kou, "Efficient CCA-Secure PKE from Identity-Based
Techniques", Topics in Cryptology - CT-RSA 2010, Lecture Notes in Computer
Science 5985, Springer Berlin / Heidelberg, pp. 132-147, 2010. (CCF C) (EI) (Google Scholar index 41 times)(TC:20)
2.
Jian Weng, Robert H. Deng, Shengli Liu,
Kefei Chen: "Chosen-ciphertext secure bidirectional proxy re-encryption
schemes without pairings". Information Science 180(24): 5077-5089, 2010. (CCF B) (SCI/EI, Impact Factor: 4.832) (Google Scholar
index 26 times) (TC:12)
3.
Junzuo Lai, Wen-Tao Zhu,
Robert H. Deng, Shengli Liu,
Weidong Kou: "New Constructions for Identity-Based Unidirectional Proxy
Re-Encryption". J. Comput. Sci. Technol. 25(4): 793-806, 2010. (CCF B) (SCI/EI, Impact Factor: 0.956) (Google Scholar
index 17 times)
4.
Gao Wei; Shengli
Liu; Gao Peng; Zheng Fuzhong, "Finding coding
opportunities in the air", NSWCTC 2010 - The 2nd International Conference
on Networks Security, Wireless Communications and Trusted Computing, v 2, p
270-273, 2010. (EI)
5.
Wan Zhong-Mei, Lai
Xue-Jia, Weng Jian, Shengli Liu, Long Yu, Hong Xuan,
"Strong key-insulated signature in the standard model", Journal of
Shanghai Jiaotong University (Science), 15(6), pp 657-661, 2010. (EI) (Google Scholar
index 4 times)
2009年
1. Sheng-Li Liu*,
Jian Weng, Ke-Fei Chen, Xiang-Xue Li, "A Fully Collusion Resistant Public
Key Trace and Revoke Scheme with Dynamic Registration and Revocation",
Chinese Journal of Electronics. Vol.50, no.2, pp.347-354, 2009. (SCI/EI, Impact Factor: 0.513)
2.
Junzuo Lai, Robert H.
Deng, Shengli Liu,
Weidong Kou: "RSA-Based Certificateless Public Key Encryption", ISPEC
2009, lncs 5451, pp. 24-34, 2009 (EI) (Google
Scholar index 10 times)(TC:7)
3.
Yu Long, Zheng Gong, Kefei
Chen, Shengli Liu:
"Provably Secure Identity-based Threshold Key Escrow from Pairing",
I. J. Network Security 8(3): 227-234 (2009) (EI)
(Google Scholar index 3 times)
4.
Zhong-mai Wan, Xue-jian
Lai, Jian Weng, Sheng-li Liu,
Yu Long, Xuan Hong, “Certificateless key-insulated signature without random
oracles”, Journal of Zhejiang University, 10(12): 1790-1800, 2009. (SCI/EI, Impact Factor: 1.676)(Google Scholar index 17 times)
5.
Wan Zhongmai, Lai Xuejia,
Weng Jian, Liu
Shengli, Hong Xuan,
“identity-based key-insulated proxy signature”, Journal of Electronics, 26(6),
pp 853-858, 2009. (EI)(Google Scholar index 9 times)
6. Chaonian Guo, Xiangxue Li, Dong Zheng, Shengli
Liu, Jianhua Li: AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC
Codes. NCM 2009: 479-483 (EI)
7.
Xian Wu, Shengli Liu,
“New mDBL Based Evaluation Scheme for Efficient
Scalar Multiplication in ECC”, 2009 IEEE International
Conference on Intelligent Computing and Intelligent Systems (ICIS 2009),pp. 3171-3197. (EI)
8. Shengli Liu, Baoan Guo, Qingsheng Zhang ,“An Identity-Based
Encryption Scheme with Compact Ciphertexts”, Journal of Shanghai JiaoTong
University (Science), vol.14, no.1, p 86-89, February 2009. (EI)
Before 2009
1. Shengli Liu,
Xiaofeng Chen, Fangguo Zhang. “Forgeability of Wang-Tang-Li’s ID-Based
Restrictive Partially Blind Signature Scheme”, Journal of Computer Science and
Technology, 23(2), pp.265-269 Mar. 2008 (SCI/EI).
2.
Jian Weng, Shengli Liu,
Kefei Chen, Dong Zheng, Weidong Qiu, “Identity-Based Threshold Key-Insulated
Encryption without Random Oracles”, CT-RSA 2008, LNCS 4964, pp. 203-220.(EI)
3.
Jian Weng, Shengli Liu,
Kefei Chen, Xiangxue Li, “Identity-Based Parallel Key-Insulated Signature:
Framework and Construction”, Journal of Research and Practice in Information
Technology, vol 40, no. 1, 2008, pp. 55-68. (SCI/EI)
4.
Jian Weng, Xiang-Xue Li,
Ke-Fei Chen, Shengli
Liu, “Identity-Based Parallel Key-Insulated Signature without Random
Oracles”, Journal of Information Science and Engineering,No. 24, pp.1143-1157, 2008. (SCI/EI)
5.
Jian Weng, Kefei Chen, Shengli Liu,
Xiangxue Li, “Identity-Based Strong Key-Insulated Signature Scheme Without
Random Oracles”, 软件学报, 19(6): 1555-1564, 2008.
6.
Robert H. Deng, Jian Weng, Shengli Liu,
Kefei Chen, “Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings”,
CANS2008, Springer, LNCS 5339, pp.1-17, Hong-Kong, China 2008, December 2–4,
2008.(EI)
7. Shengli Liu,
Kefei Chen, Weidong Qiu, “Identity-based threshold decryption”, ISPEC 2007,
HongKong, LNCS 4464, pp. 329-343. Springer-Verlag, 2007. (EI)
8.
Jian Weng, Shengli Liu,
Kefei Chen, “Pirate Decoder for the Broadcast Encryption Schemes from Crypto
2005”, Science in China Series F -Information Sciences, Vol. 50, No.3,
p.318-323, 2007.(SCI)
9.
JianWeng, Shengli Liu,
Kefei Chen, Dong Zheng, Baoan Guo. “Cryptanalysis of AU et al’s Hierarchical
Identity-based Signature Scheme”. In Proc. of ChinaCrypt’07, Aug 2007
10.
Yu Long, Kefei Chen, Shengli Liu,
“ID-based threshold decryption secure against adaptive chosen-ciphertext
attack”, Computers & Electrical Engineering, Vol.33, 2007, pp. 166-176.
(SCI/EI)
11.
Chen Xiaofeng; Zhang
Fangguo; Liu
Shengli, “ID-based restrictive partially blind signatures and
applications”, Journal of Systems and Software, v 80, n 2, February, 2007, p
164-171. (SCI/EI)
12.
Jian Weng, Shengli Liu,
Kefei Chen, Changshe Ma, “Identity-based key-insulated signature without random
oracles”, v 4456 LNAI, Computational Intelligence and Security - International
Conference, CIS 2006, Revised Selected Papers, p 470-480, 2007. (EI)
13. Liu Sheng-li,
Zheng Dong, Chen Ke-fei, Analysis of information leakage in quantum key
agreement, Journal of shanghai Jiaotong university (science), Vol. E-11, No.2,
p 219-223, 2006. (EI)
14.
Jian Weng, Shengli Liu,
Kefei Chen, Xiangxue Li, “Identity-based key-insulated signature with secure
key-updates Information Security and Crytpology”, Second SKLOIS Conference,
Inscrypt 2006, Lecture Notes in Computer Science 4318, pp. 13-26.
15.
Jian Weng, Shengli Liu,
Kefei Chen, Changshe Ma, “Identity-based parallel key-insulated encryption
without random oracles: security notions and constructions”, Progress in
Cryptology—INDOCRYPT 2006, Lecture Notes in Computer Science 4329, pp 409-423,
2006.
16.
Yu Long, Kefei Chen, Shengli Liu,
Adaptive chosen ciphertext secure threshold key escrow scheme from pairing,
Informatica, Lith. Acad. Sci. vol.17, no.4, pp.519-534, 2006. (SCI)
17.
Long Yu, Chen Ke-fei, Shengli Liu,
“ID-based threshold decryption secure against chosen plaintext attack”, Journal
of shanghai Jiaotong university (science) , Vol. E-11, No.2, 2006
18.
Changshe Ma, Kefei Chen,
and Shengli
Liu, “Analysis and Improvement of Fair Certified Mail Delivery
Protocol”, Computer Standards & Interfaces, Elsevier, v 28, n 4, April,
2006, p 467-474, 2006. (SCI/EI)
19.
Long Yu, Li Shiqun, Shengli Liu,
Chen Kefei, “How to construct provably secure ID-based mediated threshold
cryptosystems without key escrow”, 密码学进展—Chinacrypt’2006,第九届中国密码学学术会议论文集
20. Liu Shengli, Zhang Fangguo, Chen Kefei, “Crypatanalysis of REESSE1 Digital Signature
Algorithm”, 第四届中国通信与信息安全学术会议,2005, CCICS’2005.
21.
Xiaofeng Chen, Fangguo
Zhang, Shengli
Liu: “ID-Based Restrictive Partially Blind Signatures”. CIS’2005,
LNCS 3802, pp. 117-124, 2005.
22.
Changshe Ma, Kefei Chen,
Dong Zheng, Shengli
Liu, “Efficient and proactive threshold signcryption”, Information
Security, 8th International Converence, ISC 2005, LNCS,3650. p 233-243, 2005.
(EI)
23.
Changshe Ma, Kefei chen, Shengli Liu,
Dong Zheng, “Transitive signature based on Bilinear maps”, The 3rd Inernational
Workshop on Security in Information Systems, WOSIS 2005, pp. 48-56, 2005.
24. Shengli Liu,
Zheng Dong, Kefei Chen, “Attack on identity-based broadcasting encryption
schemes”, Progress on cryptography-25 years of cryptography in China, 2004
25. Shengli Liu,
Fangguo Zhang, Kefei Chen, “Authenticating tripartite key agreement protocol
with pairing, Journal of computer science and technology”, vol.19, no.2, p
169-176, 2004.(SCI/EI)
26.
Zheng Dong, Shengli Liu,
Chen Kefei, “Cryptanalysis of LKK proxy signature”, Progress on cryptography-25
years of cryptography in China, 2004
27. Shengli Liu,
Henk van Tilborg, “A practical protocol for advantage distillation and
information reconciliation”, Designs Codes and Cryptography, Volume 30, Issue 1
(August 2003), pp: 39 – 62, 2003, ISSN:0925-1022. (SCI)
28. Shengli Liu,
Fangguo Zhang, Kefei Chen, “ID-based tripartite key agreement protocol with
pairings”, IEEE International Symposium on information Theory 2003 (ISIT2003),
p. 136, Yakohama, Japan, June 29-July 4, p 136, 2003.(EI)
29. Shengli Liu and Henk van Tilborg, “Privacy amplification over a non-authetnic public
channel”, IEEE International Symposium on information Theory 2002 (ISIT’02), p.
322, Lausanne, Swizerland, June 30-July 5, 2002. (EI)
30. Liu Shengli, Zhang
Fangguo and Wang Yumin, “A secure electronic auction protocol”, Chinese Journal
of Electronics, Vol. 9, No.2, April, pp.219-223, 2000. (SCI/EI)
31.
Fangguo Zhang, Shengli Liu,
and Kwangjo Kim, “Compact representation of domain parameters of hyperelliptic
curve cryptosystems”, Proceeding of ACISP 2002, the 7th Australian Conference
on Information Security and Privacy, Melbourne, Australia, July 3-5, 2002, LNCS
2384, Springer Verlag, pp.203-213, 2002. (SCI/EI)
32. Liu Shengli, Wang Changjie
and Wang Yumin, “A secure multi-round electronic asction scheme”, EuroComm
2000, pp.330-334, May 2000, in Munich, Germany.
33. Shengli Liu and
Yumin Wang, “Privacy amplification against active attacks with strong
robustness”, Electronics Letters, Vol. 35, No. 9, pp.712-713, 1999. (SCI/EI)
34. Shengli Liu and Yumin Wang, “An authentication scheme over non-authentic public channel in
information-theoretic secret-key agreement”, AAECC-13 Symposium, Honolulu,
Hawaii, USA, Nov. 14-19, Springer-Verlag, pp. 294-301, 1999. (SCI)
35. 刘胜利,“信息论与密码”,中国密码学发展报告2009(第三期),主题“数学密码学”,中国密码学会组编,电子工业出版社,pp.1-28,2010。
36.
翁健, 刘胜利, 陈克非, 可随机数重用的自适应选择密文安全加密方案 《 计算机研究与发展》, Vol. 43, Suppl. II. Aug. 2006.