Raptor: a practical lattice-based (linkable) ring signature X Lu, MH Au, Z Zhang International Conference on Applied Cryptography and Network Security, 110-130, 2019 | 108 | 2019 |
Practical signatures from the partial Fourier recovery problem revisited: a provably-secure and Gaussian-distributed construction X Lu, Z Zhang, MH Au Australasian Conference on Information Security and Privacy, 813-820, 2018 | 8 | 2018 |
Blockchain-based threshold electronic voting system B Gong, X Lu, LW Fat, MH Au Security and Privacy in Social Networks and Big Data: 5th International …, 2019 | 7 | 2019 |
Efficient linkable ring signatures: new framework and post-quantum instantiations Y Xue, X Lu, MH Au, C Zhang European Symposium on Research in Computer Security, 435-456, 2024 | 6 | 2024 |
An introduction to various privacy models X Lu, MH Au Mobile Security and Privacy, 235-245, 2017 | 5 | 2017 |
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors J Fan, X Lu, MH Au Australasian Conference on Information Security and Privacy, 320-340, 2023 | 2 | 2023 |
Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs X Lu, J Fan, MH Au Cryptology ePrint Archive, 2024 | | 2024 |
Check for updates Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors J Fan¹, X Lu, MH Au Information Security and Privacy: 28th Australasian Conference, ACISP 2023 …, 2023 | | 2023 |
Contributions to post-quantum cryptographic techniques X Lu Hong Kong Polytechnic University, 2020 | | 2020 |
(Linkable) Ring signature from hash-then-one-way signature X Lu, MH Au, Z Zhang 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | | 2019 |
Anonymous identification for ad hoc group X Lu, MH Au Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | | 2016 |