Q
Qiang Tang
Researcher at University of Sydney
Publications - 180
Citations - 4007
Qiang Tang is an academic researcher from University of Sydney. The author has contributed to research in topics: Encryption & Public-key cryptography. The author has an hindex of 31, co-authored 169 publications receiving 3204 citations. Previous affiliations of Qiang Tang include École Normale Supérieure & University of Twente.
Papers
More filters
Journal ArticleDOI
New Algorithms for Secure Outsourcing of Modular Exponentiations
TL;DR: This paper proposes a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modulo a prime in the two untrusted program model and proposes the first efficient outsource-secure algorithm for simultaneous modular exponentiations.
Book ChapterDOI
New Algorithms for Secure Outsourcing of Modular Exponentiations
TL;DR: This paper proposes a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modulo a prime in the two untrusted program model and proposes the first efficient outsource-secure algorithm for simultaneous modular exponentiations.
Proceedings ArticleDOI
ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain
Yuan Lu,Qiang Tang,Guiling Wang +2 more
TL;DR: The first private and anonymous decentralized crowdsourcing system ZebraLancer is designed and implemented, and the outsource-then-prove methodology resolves the tension between blockchain transparency and data confidentiality, which is critical in crowdsourcing use-case.
Book ChapterDOI
An application of the Goldwasser-Micali cryptosystem to biometric authentication
Julien Bringer,Hervé Chabanne,Malika Izabachène,David Pointcheval,Qiang Tang,Sébastien Zimmer +5 more
TL;DR: Relying on the Goldwasser-Micali encryption scheme, a protocol for biometric-based authentication is introduced and its security is proved in this security model by assuming that the biometric features to be public.
Journal ArticleDOI
Public key encryption supporting plaintext equality test and user-specified authorization
TL;DR: In this paper, Wang et al. investigate a category of public key encryption schemes that support plaintext equality test and user-specified authorization, and construct a secure personal health record application on the basis of this primitive.