Profil

TANG Qiang

University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust > APSIA

Main Referenced Co-authors
Chen, Xiaofeng (4)
CHENAL, Massimo  (2)
Li, Jin (2)
Ma, Jianfeng (2)
RYAN, Peter Y A  (2)
Main Referenced Keywords
provable security (2); Trapdoor Privacy (2); Anonymous IBE (1); assured lifecycle (1); Asymmetric Searchable Encryption (1);
Main Referenced Unit & Research Centers
SnT (8)
Interdisciplinary Centre for Security, Reliability and Trust (1)
SnT, University of Luxembourg (1)
snt (1)
Main Referenced Disciplines
Computer science (19)

Publications (total 19)

The most downloaded
2008 downloads
Chen, X., Li, J., Ma, J., TANG, Q., & Lou, W. (July 2014). New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Transactions on Parallel and Distributed Systems, 25 (9), 2386-2396. doi:10.1109/TPDS.2013.180 https://hdl.handle.net/10993/18025

The most cited

292 citations (OpenAlex)

Chen, X., Li, J., Ma, J., TANG, Q., & Lou, W. (July 2014). New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Transactions on Parallel and Distributed Systems, 25 (9), 2386-2396. doi:10.1109/TPDS.2013.180 https://hdl.handle.net/10993/18025

PEJO, B., TANG, Q., & Gergely, B. (October 2018). The Price of Privacy in Collaborative Learning [Poster presentation]. The 25th ACM Conference on Computer and Communications Security, Toronto, Canada. doi:10.1145/3243734.3278525

SKROBOT, M., LANCRENON, J., & TANG, Q. (2016). Two More Efficient Variants of the J-PAKE Protocol. In ACNS 2016. doi:10.1007/978-3-319-39555-5_4
Peer reviewed

IOVINO, V., TANG, Q., & Zebrowski, K. (2016). On the power of Public-key Function-Private Functional Encryption. In 15th International Conference on Cryptology and Network Security. Springer Seciurity and Cryptology. doi:10.1007/978-3-319-48965-0
Peer reviewed

TANG, Q., & WANG, J. (2015). Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions. In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security.
Peer reviewed

CHENAL, M., & TANG, Q. (2015). Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes. In Information Security - 18th International Conference, ISC 2015. doi:10.1007/978-3-319-23318-5_22
Peer reviewed

TANG, Q., Ma, H., & Chen, X. (June 2015). Extend the Concept of Public Key Encryption with Delegated Search. Computer Journal, 58 (4), 11. doi:10.1093/comjnl/bxt102
Peer Reviewed verified by ORBi

Li, J., Sattar, S. A., Baig, M. M., Liu, J., TANG, Q., & Malin, B. (2015). Methods to Mitigate Risk of Composition Attack in Independent Data Publications. In Medical Data Privacy Handbook 2015. Springer.
Peer reviewed

TANG, Q. (2015). Towards Forward Security Properties for PEKS and IBE. In Information Security and Privacy - 20th Australasian Conference, ACISP 2015. doi:10.1007/978-3-319-19962-7_8
Peer reviewed

Chen, X., Li, J., Ma, J., TANG, Q., & Lou, W. (July 2014). New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Transactions on Parallel and Distributed Systems, 25 (9), 2386-2396. doi:10.1109/TPDS.2013.180
Peer Reviewed verified by ORBi

Chen, X., Susilo, W., Li, J., Wong, D., Ma, J., Tang, S., & TANG, Q. (2014). Efficient Algorithms for Secure Outsourcing of Bilinear Pairings. Theoretical Computer Science. doi:10.1016/j.tcs.2014.09.038
Peer reviewed

Bosch, Peter, A., Leenders, B., Lim, H. W., TANG, Q., Wang, H., Hartel, P., & Jonker, W. (2014). Distributed Searchable Symmetric Encryption. In PST2014 International Conference on Privacy, Security and Trust. doi:10.1109/PST.2014.6890956
Peer reviewed

DELERUE ARRIAGA, A., TANG, Q., & RYAN, P. (2014). Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. In Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014.
Peer reviewed

CHENAL, M., & TANG, Q. (2014). On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes. In Progress in Cryptology - LATINCRYPT 2014, Florianópolis 17-19 September 2014.
Peer reviewed

TANG, Q. (2014). From Ephemerizer to Timed-Ephemerizer - Achieve Assured Lifecycle Enforcement for Sensitive Data. Computer Journal. doi:10.1093/comjnl/bxu030
Peer Reviewed verified by ORBi

TANG, Q. (2014). Nothing is for Free: Security in Searching Shared & Encrypted Data. IEEE Transactions on Information Forensics and Security. doi:10.1109/TIFS.2014.2359389
Peer reviewed

KHADER, D., RYAN, P., & TANG, Q. (13 August 2013). Proving Prêt à Voter Receipt Free Using Computational Security Models. USENIX Journal of Election Technology and Systems, 1 (1), 62-81.
Peer reviewed

TANG, Q. (2013). Search in Encrypted Data: Theoretical Models and Practical Applications. In Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 84-108). IGI. doi:10.4018/978-1-4666-4030-6.ch004
Peer reviewed

TANG, Q. (2013). Towards a privacy-preserving solution for OSNs. In R. Sandhu, J. Lopez, ... X. Huang (Eds.), Towards a privacy-preserving solution for OSNs.
Peer reviewed

TANG, Q., & Chen, X. (2013). Towards asymmetric searchable encryption with message recovery and flexible search authorization. In Proceeding of 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013) (pp. 253-264). doi:10.1145/2484313.2484346
Peer reviewed

Contact ORBilu