scispace - formally typeset
Q

Qiang Tang

Researcher at University of Sydney

Publications -  180
Citations -  4007

Qiang Tang is an academic researcher from University of Sydney. The author has contributed to research in topics: Encryption & Public-key cryptography. The author has an hindex of 31, co-authored 169 publications receiving 3204 citations. Previous affiliations of Qiang Tang include École Normale Supérieure & University of Twente.

Papers
More filters
Journal ArticleDOI

New Algorithms for Secure Outsourcing of Modular Exponentiations

TL;DR: This paper proposes a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modulo a prime in the two untrusted program model and proposes the first efficient outsource-secure algorithm for simultaneous modular exponentiations.
Book ChapterDOI

New Algorithms for Secure Outsourcing of Modular Exponentiations

TL;DR: This paper proposes a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modulo a prime in the two untrusted program model and proposes the first efficient outsource-secure algorithm for simultaneous modular exponentiations.
Proceedings ArticleDOI

ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain

TL;DR: The first private and anonymous decentralized crowdsourcing system ZebraLancer is designed and implemented, and the outsource-then-prove methodology resolves the tension between blockchain transparency and data confidentiality, which is critical in crowdsourcing use-case.
Book ChapterDOI

An application of the Goldwasser-Micali cryptosystem to biometric authentication

TL;DR: Relying on the Goldwasser-Micali encryption scheme, a protocol for biometric-based authentication is introduced and its security is proved in this security model by assuming that the biometric features to be public.
Journal ArticleDOI

Public key encryption supporting plaintext equality test and user-specified authorization

TL;DR: In this paper, Wang et al. investigate a category of public key encryption schemes that support plaintext equality test and user-specified authorization, and construct a secure personal health record application on the basis of this primitive.