Calculated based on number of publications stored in Pure and citations from Scopus
20112024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Dashing and Star: Byzantine Fault Tolerance with Weak Certificates

    Duan, S., Zhang, H., Sui, X., Huang, B., Mu, C., Di, G. & Wang, X., 22 Apr 2024, EuroSys 2024 - Proceedings of the 2024 European Conference on Computer Systems. Association for Computing Machinery, Inc, p. 250-264 15 p. (EuroSys 2024 - Proceedings of the 2024 European Conference on Computer Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Enhancing Permissioned Blockchains with Controlled Data Authorization

    Liu, Q., Zhang, X., Duan, S. & Zhang, H., 2024, Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Proceedings. Zhu, T. & Li, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time

    Duan, S., Wang, X. & Zhang, H., 15 Nov 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 815-829 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • Fine-Grained Proxy Re-encryption: Definitions and Constructions from LWE

    Zhou, Y., Liu, S., Han, S. & Zhang, H., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 199-231 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14443 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model

    Zhang, H., Duan, S., Liu, C., Zhao, B., Meng, X., Liu, S., Yu, Y., Zhang, F. & Zhu, L., 2023, Proceedings - 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023. Institute of Electrical and Electronics Engineers Inc., p. 568-581 14 p. (Proceedings - 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT

    Zhang, H., Duan, S., Zhao, B. & Zhu, L., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 5341-5358 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • 2022

    Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation

    Alhaddad, N., Das, S., Duan, S., Ren, L., Varia, M., Xiang, Z. & Zhang, H., 20 Jul 2022, PODC 2022 - Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 399-417 19 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Citations (Scopus)
  • Brief Announcement: Asynchronous Verifiable Information Dispersal with Near-Optimal Communication

    Alhaddad, N., Das, S., Duan, S., Ren, L., Varia, M., Xiang, Z. & Zhang, H., 20 Jul 2022, PODC 2022 - Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 418-420 3 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Foundations of Dynamic BFT

    Duan, S. & Zhang, H., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. Institute of Electrical and Electronics Engineers Inc., p. 1317-1334 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Citations (Scopus)
  • Marlin: Two-Phase BFT with Linearity

    Sui, X., Duan, S. & Zhang, H., 2022, Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022. Institute of Electrical and Electronics Engineers Inc., p. 54-66 13 p. (Proceedings - 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Citations (Scopus)
  • PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement

    Zhang, H. & Duan, S., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3151-3164 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Citations (Scopus)
  • 2021

    High-Threshold AVSS with Optimal Communication Complexity

    AlHaddad, N., Varia, M. & Zhang, H., 2021, Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers. Borisov, N. & Diaz, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12675 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Citations (Scopus)
  • 2020

    EPIC: Efficient Asynchronous BFT with Adaptive Security

    Liu, C., Duan, S. & Zhang, H., Jun 2020, Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020. Institute of Electrical and Electronics Engineers Inc., p. 437-451 15 p. 9153421. (Proceedings - 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Citations (Scopus)
  • Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging

    Duan, S., Liu, C., Wang, X., Wu, Y., Xu, S., Yesha, Y. & Zhang, H., Sept 2020, Proceedings - 2020 International Symposium on Reliable Distributed Systems, SRDS 2020. IEEE Computer Society, p. 319-328 10 p. 9252069. (Proceedings of the IEEE Symposium on Reliable Distributed Systems; vol. 2020-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • 2019

    On the universally composable security of openstack

    Hogan, K., Maleki, H., Rahaeimehr, R., Canetti, R., Van Dijk, M., Hennessey, J., Varia, M. & Zhang, H., Sept 2019, Proceedings - 2019 IEEE Secure Development, SecDev 2019. Institute of Electrical and Electronics Engineers Inc., p. 20-33 14 p. 8901675. (Proceedings - 2019 IEEE Secure Development, SecDev 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • 2018

    A formal treatment of efficient byzantine routing against fully byzantine adversary

    Goenka, S., Duan, S. & Zhang, H., 26 Nov 2018, NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications. Institute of Electrical and Electronics Engineers Inc., 8548163. (NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • BEAT: Asynchronous BFT made practical

    Duan, S., Reiter, M. K. & Zhang, H., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2028-2041 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    136 Citations (Scopus)
  • 2017

    Real hidden identity-based signatures

    Chow, S. S. M., Zhang, H. & Zhang, T., 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Kiayias, A. (ed.). Springer Verlag, p. 21-38 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • Secure Causal Atomic Broadcast, Revisited

    Duan, S., Reiter, M. K. & Zhang, H., 30 Aug 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 61-72 12 p. 8023111. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Citations (Scopus)
  • 2016

    Byzantine reliable broadcast in sparse networks

    Duan, S., Nicely, L. & Zhang, H., 8 Dec 2016, Proceedings - 2016 IEEE 15th International Symposium on Network Computing and Applications, NCA 2016. Avresky, D. R., Gkoulalas-Divanis, A., Di Sanzo, P., Avresky, D. R. & Pellegrini, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 175-182 8 p. 7778614. (Proceedings - 2016 IEEE 15th International Symposium on Network Computing and Applications, NCA 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Norton Zone: Symantec's Secure Cloud Storage System

    Bogorad, W., Schneider, S. & Zhang, H., 21 Dec 2016, Proceedings - 2016 IEEE 35th International Symposium on Reliable Distributed Systems, SRDS 2016. IEEE Computer Society, p. 81-90 10 p. 7794332. (Proceedings of the IEEE Symposium on Reliable Distributed Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Practical State Machine Replication with Confidentiality

    Duan, S. & Zhang, H., 21 Dec 2016, Proceedings - 2016 IEEE 35th International Symposium on Reliable Distributed Systems, SRDS 2016. IEEE Computer Society, p. 187-196 10 p. 7794343. (Proceedings of the IEEE Symposium on Reliable Distributed Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Citations (Scopus)
  • 2014

    Bchain: Byzantine replication with high throughput and embedded reconfiguration

    Duan, S., Meling, H., Peisert, S. & Zhang, H., 2014, Principles of Distributed Systems - 18th International Conference, OPODIS 2014, Proceedings. Aguilera, M. K., Querzoni, L. & Shapiro, M. (eds.). Springer Verlag, p. 91-106 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8878).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    39 Citations (Scopus)
  • ByzID: Byzantine fault tolerance from intrusion detection

    Duan, S., Levitt, K., Meling, H., Peisert, S. & Zhang, H., 2014, Proceedings - 2014 IEEE 33rd International Symposium on Reliable Distributed Systems, SRDS 2014. IEEE Computer Society, p. 253-264 12 p. 6983400. (Proceedings of the IEEE Symposium on Reliable Distributed Systems; vol. 2014-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Citations (Scopus)
  • P2S: A fault-tolerant publish/subscribe infrastructure

    Chang, T., Duan, S., Meling, H., Peisert, S. & Zhang, H., 2014, DEBS 2014 - Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems. Association for Computing Machinery, p. 189-197 9 p. (DEBS 2014 - Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (Scopus)
  • Practical dual-receiver encryption: Soundness, complete non-malleability, and applications

    Chow, S. S. M., Franklin, M. & Zhang, H., 2014, Topics in Cryptology, CT-RSA 2014 - The Cryptographer's Track at the RSA Conference 2014, Proceedings. Springer Verlag, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8366 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Citations (Scopus)
  • 2013

    Unique ring signatures: A practical construction

    Franklin, M. & Zhang, H., 2013, Financial Cryptography and Data Security - 17th International Conference, FC 2013, Revised Selected Papers. p. 162-170 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7859 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • 2012

    Length-doubling ciphers and tweakable ciphers

    Zhang, H., 2012, Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Proceedings. p. 100-116 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Citations (Scopus)
  • The security of ciphertext stealing

    Rogaway, P., Wooding, M. & Zhang, H., 2012, Fast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers. p. 180-195 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Citations (Scopus)
  • Unique group signatures

    Franklin, M. & Zhang, H., 2012, Computer Security, ESORICS 2012 - 17th European Symposium on Research in Computer Security, Proceedings. p. 643-660 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7459 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    13 Citations (Scopus)
  • 2011

    Online ciphers from tweakable blockciphers

    Rogaway, P. & Zhang, H., 2011, Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, Proceedings. p. 237-249 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6558 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    34 Citations (Scopus)