Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Strong Known Related-Key Attacks and the Security of ECDSA

    The classical related-key attack (RKA) model fails to capture some real world systems that introduce related secret keys by design. In some blockchain applications, public keys are generated in a way that th...

    Tsz Hon Yuen, Siu-Ming Yiu in Network and System Security (2019)

  2. No Access

    Chapter and Conference Paper

    Blind Polynomial Evaluation and Data Trading

    Data trading is an emerging business, in which data sellers provide buyers with, for example, their private datasets and get paid from buyers. In many scenarios, sellers prefer to sell pieces of data, such as ...

    Yi Liu, Qi Wang, Siu-Ming Yiu in Applied Cryptography and Network Security (2021)

  3. No Access

    Chapter and Conference Paper

    Making Private Function Evaluation Safer, Faster, and Simpler

    In the problem of two-party private function evaluation (PFE), one party \(\mathsf {P}_{\mathsf {A}}\) ...

    Yi Liu, Qi Wang, Siu-Ming Yiu in Public-Key Cryptography – PKC 2022 (2022)