What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sherman S. M. Chow
Google Scholar
ORCID:
0000-0001-7306-453X
96
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Succinct Hash-Based Arbitrary-Range Proofs.
Weihan Li
Zongyang Zhang
Yanpei Guo
Sherman S. M. Chow
Zhiguo Wan
2025
conf/ndss
SHAFT: Secure, Handy, Accurate and Fast Transformer Inference.
Andes Y. L. Kei
Sherman S. M. Chow
2024
journals/cic
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH.
Tsz Hon Yuen
Sherman S. M. Chow
Huangting Wu
Cong Zhang
Siu-Ming Yiu
2024
conf/uss
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing.
Zongyang Zhang
Weihan Li
Yanpei Guo
Kexin Shi
Sherman S. M. Chow
Ximeng Liu
Jin Dong
2024
conf/ndss
Secure Multiparty Computation of Threshold Signatures Made More Efficient.
Harry W. H. Wong
Jack P. K. Ma
Sherman S. M. Chow
2024
conf/ndss
Unus pro omnibus: Multi-Client Searchable Encryption via Access Control.
Jiafan Wang
Sherman S. M. Chow
2024
conf/acsac
Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning.
Rouzbeh Behnia
Arman Riasi
Reza Ebrahimi
Sherman S. M. Chow
Balaji Padmanabhan
Thang Hoang
2023
conf/ccs
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass.
Minxin Du
Xiang Yue
Sherman S. M. Chow
Tianhao Wang
Chenyu Huang
Huan Sun
2023
conf/sp
SoK: Cryptographic Neural-Network Computation.
Lucien K. L. Ng
Sherman S. M. Chow
2023
conf/acns
Scored Anonymous Credentials.
Sherman S. M. Chow
Jack P. K. Ma
Tsz Hon Yuen
2023
conf/acns
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions.
Huangting Wu
Sherman S. M. Chow
2023
conf/eurosp
SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting).
Jack P. K. Ma
Sherman S. M. Chow
2023
conf/ndss
Real Threshold ECDSA.
Harry W. H. Wong
Jack P. K. Ma
Hoover H. F. Yin
Sherman S. M. Chow
2023
conf/acsac
Secure Softmax/Sigmoid for Machine-learning Computation.
Yu Zheng
Qizhi Zhang
Sherman S. M. Chow
Yuxiang Peng
Sijun Tan
Lichun Li
Shan Yin
2022
journals/popets
Forward and Backward-Secure Range-Searchable Symmetric Encryption.
Jiafan Wang
Sherman S. M. Chow
2022
journals/joc
Non-Malleable Functions and their Applications.
Yu Chen
Baodong Qin
Jiang Zhang
Yi Deng
Sherman S. M. Chow
2022
conf/uss
Omnes pro uno: Practical Multi-Writer Encrypted Database.
Jiafan Wang
Sherman S. M. Chow
2022
conf/acns
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Tsz Hon Yuen
Cong Zhang
Sherman S. M. Chow
2022
conf/asiaccs
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation.
Jack P. K. Ma
Sherman S. M. Chow
2021
journals/compsec
Universal location referencing and homomorphic evaluation of geospatial query.
Asma Aloufi
Peizhao Hu
Hang Liu
Sherman S. M. Chow
Kim-Kwang Raymond Choo
2021
conf/uss
GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference.
Lucien K. L. Ng
Sherman S. M. Chow
2021
conf/sp
Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient.
Xiuhua Wang
Sherman S. M. Chow
2021
conf/acns
Access Control Encryption from Group Encryption.
Xiuhua Wang
Harry W. H. Wong
Sherman S. M. Chow
2021
conf/ndss
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation.
Jack P. K. Ma
Raymond K. H. Tai
Yongjun Zhao
Sherman S. M. Chow
2021
conf/acsac
Sipster: Settling IOU Privately and Quickly with Smart Meters.
Sherman S. M. Chow
Ming Li
Yongjun Zhao
Wenqiang Jin
2020
conf/asiacrypt
Multi-client Oblivious RAM with Poly-logarithmic Communication.
Sherman S. M. Chow
Katharina Fech
Russell W. F. Lai
Giulio Malavolta
2019
conf/acisp
Fast-to-Finalize Nakamoto-Like Consensus.
Shuyang Tang
Sherman S. M. Chow
Zhiqiang Liu
Joseph K. Liu
2019
conf/pkc
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog.
Sherman S. M. Chow
Alexander Russell
Qiang Tang
Moti Yung
Yongjun Zhao
Hong-Sheng Zhou
2019
conf/ctrsa
Structure-Preserving Certificateless Encryption and Its Application.
Tao Zhang
Huangting Wu
Sherman S. M. Chow
2018
journals/tifs
Outsourced Biometric Identification With Privacy.
Shengshan Hu
Minghui Li
Qian Wang
Sherman S. M. Chow
Minxin Du
2018
conf/ccs
Systematic Market Control of Cryptocurrency Inflations.
Shuyang Tang
Sherman S. M. Chow
2018
conf/uss
Simple Password-Hardened Encryption Services.
Russell W. F. Lai
Christoph Egger
Manuel Reinert
Sherman S. M. Chow
Matteo Maffei
Dominique Schröder
2018
conf/asiacrypt
Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption.
Russell W. F. Lai
Raymond K. H. Tai
Harry W. H. Wong
Sherman S. M. Chow
2017
journals/popets
Are you The One to Share? Secret Transfer with Access Structure.
Yongjun Zhao
Sherman S. M. Chow
2017
conf/ccs
Updatable Block-Level Message-Locked Encryption.
Yongjun Zhao
Sherman S. M. Chow
2017
conf/uss
Phoenix: Rebirth of a Cryptographic Password-Hardening Service.
Russell W. F. Lai
Christoph Egger
Dominique Schröder
Sherman S. M. Chow
2017
conf/fc
Real Hidden Identity-Based Signatures.
Sherman S. M. Chow
Haibin Zhang
Tao Zhang
2017
conf/acns
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs.
Russell W. F. Lai
Sherman S. M. Chow
2017
conf/esorics
Privacy-Preserving Decision Trees Evaluation via Linear Functions.
Raymond K. H. Tai
Jack P. K. Ma
Yongjun Zhao
Sherman S. M. Chow
2017
conf/wisec
Geosocial query with user-controlled privacy.
Peizhao Hu
Sherman S. M. Chow
Asma Aloufi
2016
conf/ccs
Efficient Authenticated Multi-Pattern Matching.
Zhe Zhou
Tao Zhang
Sherman S. M. Chow
Yupeng Zhang
Kehuan Zhang
2016
conf/ccs
Password-Controlled Encryption with Accountable Break-Glass Access.
Tao Zhang
Sherman S. M. Chow
Jinyuan Sun
2016
conf/ccs
Functional Credentials for Internet of Things.
Sherman S. M. Chow
2016
conf/provsec
Towards Proofs of Ownership Beyond Bounded Leakage.
Yongjun Zhao
Sherman S. M. Chow
2016
conf/esorics
Efficient Sanitizable Signatures Without Random Oracles.
Russell W. F. Lai
Tao Zhang
Sherman S. M. Chow
Dominique Schröder
2016
conf/pkc
Non-Malleable Functions and Their Applications.
Yu Chen
Baodong Qin
Jiang Zhang
Yi Deng
Sherman S. M. Chow
2016
conf/iwsec
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization.
Tao Zhang
Sherman S. M. Chow
Zhe Zhou
Ming Li
2015
journals/tifs
Time-Bound Anonymous Authentication for Roaming Networks.
Joseph K. Liu
Cheng-Kang Chu
Sherman S. M. Chow
Xinyi Huang
Man Ho Au
Jianying Zhou
2015
conf/ccs
Related Randomness Attacks for Public Key Cryptosystems.
Tsz Hon Yuen
Cong Zhang
Sherman S. M. Chow
Siu-Ming Yiu
2015
conf/fc
Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding.
Yongjun Zhao
Sherman S. M. Chow
2015
conf/provsec
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Zongyang Zhang
Yu Chen
Sherman S. M. Chow
Goichiro Hanaoka
Zhenfu Cao
Yunlei Zhao
2014
conf/ccs
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Hua Deng
Qianhong Wu
Bo Qin
Sherman S. M. Chow
Josep Domingo-Ferrer
Wenchang Shi
2014
conf/acns
All-but-One Dual Projective Hashing and Its Applications.
Zongyang Zhang
Yu Chen
Sherman S. M. Chow
Goichiro Hanaoka
Zhenfu Cao
Yunlei Zhao
2014
conf/esorics
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Yujue Wang
Qianhong Wu
Duncan S. Wong
Bo Qin
Sherman S. M. Chow
Zhen Liu
Xiao Tan
2014
conf/cns
A tale of two clouds: Computing on data encrypted under multiple keys.
Boyang Wang
Ming Li
Sherman S. M. Chow
Hui Li
2014
conf/ctrsa
Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications.
Sherman S. M. Chow
Matthew K. Franklin
Haibin Zhang
2014
conf/ctrsa
Practical Distributed Signatures in the Standard Model.
Yujue Wang
Duncan S. Wong
Qianhong Wu
Sherman S. M. Chow
Bo Qin
Jianwei Liu
2013
journals/istr
Server-aided signatures verification secure against collusion attack.
Sherman S. M. Chow
Man Ho Au
Willy Susilo
2013
conf/ccs
Multi-key leakage-resilient threshold cryptography.
Cong Zhang
Tsz Hon Yuen
Hao Xiong
Sherman S. M. Chow
Siu-Ming Yiu
Yi Jun He
2013
conf/fc
Accumulators and U-Prove Revocation.
Tolga Acar
Sherman S. M. Chow
Lan Nguyen
2013
conf/provsec
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.
Tsz Hon Yuen
Cong Zhang
Sherman S. M. Chow
Joseph K. Liu
2013
conf/cns
Towards auditable cloud-assisted access of encrypted health data.
Yue Tong
Jinyuan Sun
Sherman S. M. Chow
Pan Li
2013
conf/cns
Computing encrypted cloud data efficiently under multiple keys.
Boyang Wang
Ming Li
Sherman S. M. Chow
Hui Li
2012
conf/acns
SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment.
Sherman S. M. Chow
Yi Jun He
Lucas Chi Kwong Hui
Siu-Ming Yiu
2012
conf/esorics
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Kin Ying Yu
Tsz Hon Yuen
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
2012
conf/eurocrypt
Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Tsz Hon Yuen
Sherman S. M. Chow
Ye Zhang
Siu-Ming Yiu
2011
conf/ccs
Multi-authority ciphertext-policy attribute-based encryption with accountability.
Jin Li
Qiong Huang
Xiaofeng Chen
Sherman S. M. Chow
Duncan S. Wong
Dongqing Xie
2011
conf/ccs
Server-aided signatures verification secure against collusion attack.
Sherman S. M. Chow
Man Ho Au
Willy Susilo
2011
conf/ccs
Secure mobile subscription of sensor-encrypted data.
Cheng-Kang Chu
Wen Tao Zhu
Sherman S. M. Chow
Jianying Zhou
Robert H. Deng
2011
conf/ccs
Identity-based online/offline key encapsulation and encryption.
Sherman S. M. Chow
Joseph K. Liu
Jianying Zhou
2011
conf/acns
Double-Trapdoor Anonymous Tags for Traceable Signatures.
Masayuki Abe
Sherman S. M. Chow
Kristiyan Haralambiev
Miyako Ohkubo
2011
conf/ctrsa
Efficient Secure Two-Party Exponentiation.
Ching-Hua Yu
Sherman S. M. Chow
Kai-Min Chung
Feng-Hao Liu
2011
conf/ctrsa
Non-interactive Confirmer Signatures.
Sherman S. M. Chow
Kristiyan Haralambiev
2010
conf/ccs
Practical leakage-resilient identity-based encryption from simple assumptions.
Sherman S. M. Chow
Yevgeniy Dodis
Yannis Rouselakis
Brent Waters
2010
conf/africacrypt
Efficient Unidirectional Proxy Re-Encryption.
Sherman S. M. Chow
Jian Weng
Yanjiang Yang
Robert H. Deng
2009
conf/ccs
Improving privacy and security in multi-authority attribute-based encryption.
Melissa Chase
Sherman S. M. Chow
2009
conf/acisp
Conditional Proxy Broadcast Re-Encryption.
Cheng-Kang Chu
Jian Weng
Sherman S. M. Chow
Jianying Zhou
Robert H. Deng
2009
conf/ndss
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.
Sherman S. M. Chow
Jie-Han Lee
Lakshminarayanan Subramanian
2009
conf/pkc
Removing Escrow from Identity-Based Encryption.
Sherman S. M. Chow
2009
conf/sacrypt
Real Traceable Signatures.
Sherman S. M. Chow
2008
conf/provsec
Timed-Release Encryption Revisited.
Sherman S. M. Chow
Siu-Ming Yiu
2008
conf/ndss
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
Sherman S. M. Chow
Joseph K. Liu
Duncan S. Wong
2007
conf/acns
Security Mediated Certificateless Signatures.
Wun-She Yap
Sherman S. M. Chow
Swee-Huay Heng
Bok-Min Goi
2007
conf/iwsec
Batch Pairing Delegation.
Patrick P. Tsang
Sherman S. M. Chow
Sean W. Smith
2007
conf/cans
Running on Karma - P2P Reputation and Currency Systems.
Sherman S. M. Chow
2006
conf/ccs
Ring signatures without random oracles.
Sherman S. M. Chow
Victor K.-W. Wei
Joseph K. Liu
Tsz Hon Yuen
2006
conf/pkc
Security-Mediated Certificateless Cryptography.
Sherman S. M. Chow
Colin Boyd
Juan Manuel González Nieto
2005
conf/sec
Signcryption in Hierarchical Identity Based Cryptosystem.
Sherman S. M. Chow
Tsz Hon Yuen
Lucas Chi Kwong Hui
Siu-Ming Yiu
2005
conf/acisp
Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
Kam-Pui Chow
2005
conf/acisp
Role Activation Management in Role Based Access Control.
Richard W. C. Lui
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
2005
conf/acns
Efficient Identity Based Ring Signature.
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
2005
conf/icics
Generic Construction of (Identity-Based) Perfect Concurrent Signatures.
Sherman S. M. Chow
Willy Susilo
2004
conf/icisc
Identity Based Threshold Ring Signature.
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
2004
conf/wisa
Verifiable Pairing and Its Applications.
Sherman S. M. Chow
2004
conf/icics
Secure Hierarchical Identity Based Signature and Its Application.
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
Kam-Pui Chow
2003
conf/icisc
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
Kam-Pui Chow
Coauthors
Alexander Russell
(1)
Andes Y. L. Kei
(1)
Arman Riasi
(1)
Asma Aloufi
(2)
Balaji Padmanabhan
(1)
Baodong Qin
(2)
Bo Qin
(3)
Bok-Min Goi
(1)
Boyang Wang
(2)
Brent Waters
(1)
Cheng-Kang Chu
(3)
Chenyu Huang
(1)
Ching-Hua Yu
(1)
Christoph Egger
(2)
Colin Boyd
(1)
Cong Zhang
(5)
Dominique Schröder
(3)
Dongqing Xie
(1)
Duncan S. Wong
(4)
Feng-Hao Liu
(1)
Giulio Malavolta
(1)
Goichiro Hanaoka
(2)
Haibin Zhang
(2)
Hang Liu
(1)
Hao Xiong
(1)
Harry W. H. Wong
(4)
Hong-Sheng Zhou
(1)
Hoover H. F. Yin
(1)
Hua Deng
(1)
Huan Sun
(1)
Huangting Wu
(3)
Hui Li
(2)
Jack P. K. Ma
(7)
Jiafan Wang
(3)
Jian Weng
(2)
Jiang Zhang
(2)
Jianwei Liu
(1)
Jianying Zhou
(4)
Jie-Han Lee
(1)
Jin Dong
(1)
Jin Li
(1)
Jinyuan Sun
(2)
Josep Domingo-Ferrer
(1)
Joseph K. Liu
(6)
Juan Manuel González Nieto
(1)
Kai-Min Chung
(1)
Kam-Pui Chow
(3)
Katharina Fech
(1)
Kehuan Zhang
(1)
Kexin Shi
(1)
Kim-Kwang Raymond Choo
(1)
Kin Ying Yu
(1)
Kristiyan Haralambiev
(2)
Lakshminarayanan Subramanian
(1)
Lan Nguyen
(1)
Lichun Li
(1)
Lucas Chi Kwong Hui
(9)
Lucien K. L. Ng
(2)
Man Ho Au
(3)
Manuel Reinert
(1)
Masayuki Abe
(1)
Matteo Maffei
(1)
Matthew K. Franklin
(1)
Melissa Chase
(1)
Ming Li
(2)
Ming Li
(2)
Minghui Li
(1)
Minxin Du
(2)
Miyako Ohkubo
(1)
Moti Yung
(1)
Pan Li
(1)
Patrick P. Tsang
(1)
Peizhao Hu
(2)
Qian Wang
(1)
Qiang Tang
(1)
Qianhong Wu
(3)
Qiong Huang
(1)
Qizhi Zhang
(1)
Raymond K. H. Tai
(3)
Reza Ebrahimi
(1)
Richard W. C. Lui
(1)
Robert H. Deng
(3)
Rouzbeh Behnia
(1)
Russell W. F. Lai
(6)
Sean W. Smith
(1)
Shan Yin
(1)
Shengshan Hu
(1)
Sherman S. M. Chow
(96)
Shuyang Tang
(2)
Sijun Tan
(1)
Siu-Ming Yiu
(14)
Swee-Huay Heng
(1)
Tao Zhang
(6)
Thang Hoang
(1)
Tianhao Wang
(1)
Tolga Acar
(1)
Tsz Hon Yuen
(10)
Victor K.-W. Wei
(1)
Weihan Li
(2)
Wen Tao Zhu
(1)
Wenchang Shi
(1)
Wenqiang Jin
(1)
Willy Susilo
(3)
Wun-She Yap
(1)
Xiang Yue
(1)
Xiao Tan
(1)
Xiaofeng Chen
(1)
Ximeng Liu
(1)
Xinyi Huang
(1)
Xiuhua Wang
(2)
Yanjiang Yang
(1)
Yannis Rouselakis
(1)
Yanpei Guo
(2)
Ye Zhang
(1)
Yevgeniy Dodis
(1)
Yi Deng
(2)
Yi Jun He
(2)
Yongjun Zhao
(8)
Yu Chen
(4)
Yu Zheng
(1)
Yue Tong
(1)
Yujue Wang
(2)
Yunlei Zhao
(2)
Yupeng Zhang
(1)
Yuxiang Peng
(1)
Zhe Zhou
(2)
Zhen Liu
(1)
Zhenfu Cao
(2)
Zhiguo Wan
(1)
Zhiqiang Liu
(1)
Zongyang Zhang
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to