Edited Books:
-
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I, Part II, Part III , Part IV
-
Special Issue on Blockchain and Economic Knowledge Automation
IEEE Trans. Syst. Man Cybern. Syst 2020
Preprints/Manuscripts:
-
CCA Secure Public Key Encryption against Kleptographic Attacks
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
Manuscript
-
Subverting Subversion-Resistant Cryptosystems: On the Subtle Power of Composition
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
Manuscript
Publications:
2025 -----
-
EpiOracle: Privacy-Preserving Cross-Facility EarlyWarning for Unknown Epidemics
Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, Qiang Tang
PETS 2025 -- The 25th Privacy Enhancing Technologies Symposium
Journal version in Proceedings on Privacy Enhancing Technologies. 2025(1), Sep 2015
2024 -----
-
Scalable and Adaptively Secure Any-Trust Distributed Key Generation and All-hands Checkpointing
Hanwen Feng, Michael Mai, Qiang Tang
CCS 2024 -- 31st ACM Conference of Computer and Communication Security
-
Dragon: Decentralization at the cost of Representation after
Arbitrary GrOupiNg and Its Applications to Sub-cubic DKG and
Interactive Consistency
Hanwen Feng, Zhenliang Lu, Qiang Tang
PODC 2024 -- 43rd ACM Symposium on Principles of Distributed Computing
-
Pisces: Private yet Compliable Cryptocurrency Exchange
Yanan Li, Tian Qiu, Qiang Tang
NDSS 2024 -- The Network and Distributed System Security Symposium
-
Crooked Indifferentiability of the Feistel Construction
Alexander Russell, Qiang Tang, Jiadong Zhu
ASIACRYPT 2024 -- 30th Annual International Conference on the Theory and Application of Cryptology and Information Security
-
AOAB: Optimal and Fair Ordering of Financial Transactions
Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian
DSN 2024 -- 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
-
Modeling Mobile Crash in Byzantine Consensus
Hans Schmiedel, Runchao Han, Qiang Tang, Ron Steinfeld, Jiangshan Yu
CSF 2024 -- 37th IEEE Computer Security Foundations Symposium
-
CORE: Transaction Commit-Controlled Release of Private Data over Blockchains
Shan Wang, Ming Yang, Jiannong Cao, Qiang Tang, Xinwen Fu
ICDCS 2024 -- 44th IEEE International Conference on Distributed Computing Systems
Distinguished Paper Aaward
-
Resilience to Chain-Quality Attacks in Fair Separability
Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian
ESORICS 2024 -- 29th European Symposium on Research in Computer Security
2023 -----
-
The Future of Blockchain Consensus
Vincent Gramoli, Qiang Tang
CACM -- Communication of the ACM, 2023
-
Predicate Aggregate Signatures
Tian Qiu, Qiang Tang
ASIACRYPT 2023 -- 29th Annual International Conference on the Theory and Application of Cryptology and Information Security
-
Efficient Secure Storage with Version Control and Key Rotation
Long Chen, Hui Guo, Yanan Li, Qiang Tang
ASIACRYPT 2023 -- 29th Annual International Conference on the Theory and Application of Cryptology and Information Security
-
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity
Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang
PKC 2023 -- 26th International Conference on Practice and Theory of Public Key Cryptography
-
Blockchain-Based P2P Content Delivery with Monetary Incentivization and Fairness Guarantee
Songlin He, Yuan Lu, Qiang Tang, Grace Wang, Chase Wu
TPDS -- IEEE Transactions on Parallel and Distributed Systems, 2023
2022 -----
-
Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As Pipelined BFT
Yuan Lu, Zhenliang Lu, Qiang Tang
CCS 2022 -- 29th ACM Conference of Computer and Communication Security
-
Dumbo-NG: Asynchronous Consensus with Throughput-Oblivious Latency
Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
CCS 2022 -- 29th ACM Conference of Computer and Communication Security
-
End-to-Same-End Encryption: Modularly Augmenting an App
with an Efficient, Portable and Blind Cloud Storage
Long Chen, Ya-Nan Li, Qiang Tang, Moti Yung
USENIX Security 2022 -- 31st USENIX Security Symposium
-
Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice
Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
NDSS 2022 -- The Network and Distributed System Security Symposium
-
Anonymous Traceback for End-to-End Encryption
Erin Kenney, Qiang Tang, Chase Wu
ESORICS 2022 -- 27th European Symposium on Research in Computer Security
-
Efficient Asynchronous Byzantine Agreement without Private Setups
Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
ICDCS 2022 -- 42nd IEEE International Conference on Distributed Computing Systems
-
Leopard: Towards High Throughput-Preserving BFT for Large-scale Systems
Kexin Hu, Kaiwen Guo, Qiang Tang, Zhenfeng Zhang, Hao Cheng and Zhiyang Zhao
ICDCS 2022 -- 42nd IEEE International Conference on Distributed Computing Systems
-
Escaping from Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting
Xinyu Li, Jing Xu, Lingyuan Yin, Yuan Lu, Qiang Tang, Zhenfeng Zhang
TDSC -- IEEE Transactions on Dependable and Secure Computing, 2022
-
Blockchain-Based Automated and Robust Cyber Security Management
with Songlin He, Shouhuai Xu and others
JPDC -- Journal of Parallel and Distributed Computing
2021 -----
-
Witness Authenticating NIZK Proofs and Its Applications
Hanwen Feng, Qiang Tang
CRYPTO 2021 -- 41st International Cryptology Conference
-
Computational Robust (Fuzzy) Extractor for CRS Dependent Sources with Minimal Entropy
Hanwen Feng, Qiang Tang
TCC 2021 -- 19th Theory of Cryptography Conference
-
Hierarchical Integrated Signature and Encryption (Key Separation vs. Key Reuse: Enjoy the Best of Both Worlds)
Yu Chen, Qiang Tang, Yuyu Wang
ASIACRYPT 2021 -- 27th Annual International Conference on the Theory and Application of Cryptology and Information Security
-
Fair Peer to Peer Content Delivery via Blockchain
Songlin He, Yuan Lu, Qiang Tang, Grace Wang, Chase Wu
ESORICS 2021 -- 26th European Symposium on Research in Computer Security
-
Fooling an Unbounded Attacker with a Short Key, Repeatedly -- The Honey Encryption Perspective
Xinze Li, Qiang Tang, Zhenfeng Zhang
ITC 2021 -- Information Theoretic Cryptography Conference
-
Sidechains with Fast Cross-chain Transfers
Lingyuan Yin, Jing Xu, Qiang Tang
TDSC -- IEEE Transactions on Dependable and Secure Computing, 2021
2020 -----
-
Dumbo-MVBA:Optimal Asynchronous Multi-valued Validated Byzantine Agreement, Revisited   Video
Yuan Lu, Zhenliang Lu, Qiang Tang, Grace Wang
PODC 2020 -- 39th ACM Symposium on Principles of Distributed Computing
-
Dumbo: Faster Asynchronous BFT Protocols   Video at the Suppplimental Material
Bingyong Guo, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
CCS 2020 -- 27th ACM Conference of Computer and Communication Security
-
Proof of Storage time: Efficiently Checking Continous Data Availability
Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang
NDSS 2020 -- The Network and Distributed System Security Symposium
-
CCA Updatable Encryption Against Malicious Re-Encryption Attacks
Long Chen, Ya-Nan Li, Qiang Tang
ASIACRYPT 2020 -- 26th Annual International Conference on the Theory and Application of Cryptology and Information Security
-
Generic Superlight Client for Permissionless Blockchains
Yuan Lu, Qiang Tang, Grace Wang
ESORICS 2020 -- 25th European Symposium on Research in Computer Security
-
Dragoon: Private Decentralized Human Intelligent Tasks Made Practical
Yuan Lu, Qiang Tang and Guiling Wang
ICDCS 2020 -- 40th IEEE International Conference on Distributed Computing Systems
-
Enhancing the Retailer Gift Card via Blockchain: Trusted Resale and More
Yuan Lu, Qiang Tang and Guiling Wang
Journal of Database Management, 2020
-
Decentralizing IoT Management Systems Using Blockchain for Censorship Resistance
Songlin He, Qiang Tang, Chase Wu, Xuewen Shen
IEEE Transactions on Industrial Informatics, 2020
-
Multi-Input Laconic Function Evaluation
Bo Pang, Long Chen, Leo Fan, Qiang Tang
ACISP 2020 -- 25th Australasian Conference on Information Security and Privacy
-
A Security-Enhanced Certificateless Aggregate Signature for InVANETs
with Guangquan Xu et al.
IEEE Network, 2020
2019 -----
-
Let a Non-Barking Watchdog Bite: Cliptographic Signatures With an Offline Watchdog
Sherman Chow, Alexander Russell, Qiang Tang, Moti Yung, Yun-Jun Zhao, Hong-Sheng Zhou
PKC 2019 -- 22nd International Conference on Practice and Theory of Public Key Cryptography
-
A Behavior-Aware Profiling of Smart Contracts
Xuetao Wei, Can Lu, Fatma Rana Ozcan, Ting Chen, Boyang Wang, Di Wu, Qiang Tang
SecureComm 2019 -- 15th EAI International Conference, Security and Privacy in Communication Networks
-
On Distributed Information Composition in Big Data Systems
Haifa AlQuwaiee, Songlin He, Chase Wu, Qiang Tang, Xuewen Shen
eScience 2019 -- 15th International eScience Conference
2018 -----
-
Correcting Subverted Random Oracles   Video
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
CRYPTO 2018 -- 38th International Cryptology Conference
-
ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain
Yuan Lu, Qiang Tang, Grace Wang
ICDCS 2018 -- 38th IEEE International Conference on Distributed Computing Systems
-
Making Any Attribute Based Encryption Accountable, Efficiently
Junzuo Lai, Qiang Tang
ESORICS 2018 -- 23rd European Symposium on Research in Computer Security
-
Making Public Key Functional Encryption Function Private, Distributedly
Xiong Fan, Qiang Tang
PKC 2018 -- 21st International Conference on Practice and Theory of Public Key Cryptography
-
Enabling the Crowdsourcing of Machine Learning Tasks atop Open Blockchains
Yuan Lu, Qiang Tang, Grace Wang
ICDM workshop on Blockchains and Sharing Econony Applications, 2018
-
Censorship Resistant Decentralized IoT Management Systems
Songlin He, Qiang Tang, Chase Wu
DLoT 2018 -- 1st Workshop of Distributed Ledger of Things, 2018
-
Enabling Efficient and Fine-grained DNA Similarity Search with Access Control over Encrypted Cloud Data
Hongwei Li, Guowen Xu, Qiang Tang, Xiaodong Lin and Sherman Shen
WASA 2018 -- 13rd International Conference on Wireless Algorithms, Systems and Applications
2017 -----
-
Generic Semantic Security Against a Kleptographic Adversary   Video
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
CCS 2017 -- 24th ACM Conference of Computer and Communication Security
-
Cliptography:Post-Snowden Cryptography (Tutorial),   Video Part I
  Video Part II
Qiang Tang, Moti Yung
CCS 2017 -- 24th ACM Conference of Computer and Communication Security
2016 -----
-
Cliptography: Clipping the Power of Kleptographic Attacks   Video
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
ASIACRYPT 2016 -- 22nd Annual International Conf on the Theory and Applications
of Cryptology and Information Security
One of three top rated papers that are invited to Journal of Cryptology
- Honey Encryption Beyond Message Recovery Security
Joseph Jaeger, Thomas Ristenpart, Qiang Tang
EUROCRYPT 2016 -- 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques
- Efficient Data Sharing with Encrypted Keyword Search
Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang
ESORICS 2016 -- 21th European Symposium on Research in Computer Security
- On the Security of Key Extraction from Physical Quantities
Matt Edman, Aggelos Kiayias, Qiang Tang, Bülent Yener
TIFS -- IEEE Transactions on Information Forensics and Security, 2016
2015 -----
- Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Contents
Aggelos Kiayias, Qiang Tang
CCS 2015 -- 22nd ACM Conference of Computer and Communication Security
- How to Make Any Identity Based Encryption Accountable, Efficiently
Aggelos Kiayias, Qiang Tang
ESORICS 2015 -- 20th European Symposium on Research in Computer Security
- Optimal Rate Private Information Retrieval from Homomorphic Encryption
Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
PETS 2015 -- 15th Privacy Enhancing Technologies Symposium
Journal version in Proceedings on Privacy Enhancing Technologies. 2015(2), 222-243, June 2015
- Communication Optimal Tardos-based Asymmetric Fingerprinting
Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
CT-RSA 2015 -- RSA Conference, Cryptographers' Track
- Graded Signatures
Aggelos Kiayias, Murat Osmanoglu, Qiang Tang
ISC 2015 -- 18th Information Security Conference
- Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications
Aggelos Kiayias, Ozgur Oksuz, Qiang Tang
ISC 2015 -- 18th Information Security Conference
2014 -----
- Graded Encryption, or How to Play "Who Wants To Be a Millionare" Distributively
Aggelos Kiayias, Murat Osmanoglu, Qiang Tang
ISC 2014 -- 17th Information Security Conference
2013 -----
- How to Keep a Secret: Leakage-deterring Public Key Cryptosystems
Aggelos Kiayias, Qiang Tang
CCS 2013 -- 20th ACM Conference on Computer and Communication Security
|