TOPS'25 End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable and Blind Cloud Storage
ACM Transactions on Privacy and Security, TOPS 2025 (CORE A)
DCC'21 Traceable Ring Signatures: General Framework and Post-quantum Security
International Journal Designs, Codes and Cryptography, DCC 2021 (CORE B)
CCPE'21 A Decentralized and Secure Blockchain Platform for Open Fair Data Trading
Concurrency and Computation: Practice and Experience, CCPE 2021
TIIS'20 Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing
KSII Transactions on Internet and Information Systems, TIIS 2020
CCS'25 End-to-End Encrypted Git Services
ACM SIGSAC Conference on Computer and Communications Security, CCS 2025 (CORE A*)
NDSS'24 Pisces: Private and Compliable Cryptocurrency Exchange
Network and Distributed System Security (NDSS) Symposium 2024 (CORE A*)
ASIACRYPT'23 Efficient Secure Storage with Version Control and Key Rotation
Advances in Cryptology - ASIACRYPT 2023 (CORE A)
USENIX SEC'22 End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable and Blind Cloud Storage
USENIX Security Symposium 2022 (CORE A*)
ASIACRYPT'20 CCA Updatable Encryption Against Malicious Re-Encryption Attacks
Advances in Cryptology - ASIACRYPT 2020 (CORE A)
CT-RSA'20 Traceable Ring Signatures with Post-quantum Security
Cryptographer’s Track at RSA Conference, CT-RSA 2020 (CORE B)
ISPEC'17 Outsourcing Encrypted Excel Files.
Information Security Practice and Experience Conference, ISPEC 2017 (CORE C)
ISPEC'17 Secure Communications in Unmanned Aerial Vehicle Network.
Information Security Practice and Experience Conference, ISPEC 2017 (CORE C)