发表论文

CRYPTO,EUROCRYPT,ASIACRYPT(第一作者)

文章标题 发表信息
Improved Fully Adaptive Decentralized MA-ABE for NC1 from MDDH (ASIACRYPT 2023) Jie Chen, Qiaohan Chu∗ , Ying Gao, Jianting Ning, and Luping Wang In Proceedings of the 29nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
Identity-Based Matchmaking Encryption from Standard Assumptions (ASIACRYPT 2022) Jie Chen∗ , Yu Li, Jinming Wen and Jian Weng In Proceedings of the 28nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding (ASIACRYPT 2018) Jie Chen, Junqing Gong∗ and Hoeteck Wee In Proceedings of the 24nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
Unbounded ABE via Bilinear Entropy Expansion, Revisited (EUROCRYPT 2018) Jie Chen, Junqing Gong∗ , Lucas Kowalczyk and Hoeteck Wee In Proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups (ASIACRYPT 2017) Jie Chen and Junqing Gong∗ In Proceedings of the 23nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings (EUROCRYPT 2015) Jie Chen∗ , Romain Gay and Hoeteck Wee In Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques
Fully, (Almost) Tightly Secure IBE and Dual System Groups (CRYPTO 2013) Jie Chen∗ and Hoeteck Wee In Proceedings of the 33th Annual International Cryptology Conference

其它刊物(会议文章)

文章标题 发表信息
Master-Key KDM-Secure ABE via Predicate Encoding (PKC 2021) Shengyuan Feng, Junqing Gong∗ and Jie Chen∗ In Proceedings of the 24th International Conference on the Theory and Practice of Public-Key Cryptography
Tightly Secure IBE under Constant-size Master Public Key (PKC 2017) Jie Chen∗ , Junqing Gong∗ and Jian Weng∗ In Proceedings of the 20th International Conference on the Theory and Practice of Public-Key Cryptography
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting (ASIACRYPT 2016) Junqing Gong, Xiaolei Dong∗ , Jie Chen∗ and Zhenfu Cao In Proceedings of the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently (ESORICS 2016) Jianting Ning, Zhenfu Cao∗ , Xiaolei Dong∗ , Junqing Gong and Jie Chen∗ In Proceedings of the 21th European Symposium on Research in Computer Security
Non-Zero Inner Product Encryption with Short Ciphertexts and Private Keys (SCN 2016) Jie Chen∗ , Benoit Libert∗ and Somindu Ramanna∗ In Proceedings of the 10th International Conference on Security and Cryptography for Networks
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Out-sourced Verifiable Computation (AsiaCCS 2016) Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen∗ , Xiangxue Li, Haifeng Qian and Zhenfu Cao In Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
Extended Nested Dual System Groups, Revisited (PKC 2016) Junqing Gong, Jie Chen∗ , Xiaolei Dong, Zhenfu Cao∗ and Shaohua Tang In Proceedings of the 19th International Conference on the Theory and Practice of Public-Key Cryptography
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula (SCN 2014) Jie Chen∗ and Hoeteck Wee In Proceedings of the 9th International Conference on Security and Cryptography for Networks
Shorter IBE and Signatures via Asymmetric Pairings (Pairing 2012) Jie Chen∗ , Hoon Wei Lim, San Ling, Huaxiong Wang and Hoeteck Wee In Proceedings of the 5th International Conference on Pairing-Based Cryptography
Revocable Identity-Based Encryption from Lattices (ACISP 2012) Jie Chen∗ , Hoon Wei Lim, San Ling, Huaxiong Wang and Khoa Nguyen In Proceedings of the 17th Australasian Conference on Information Security and Privacy

期刊文章

文章标题 发表信息
Secure and Practical Wildcard Searchable Encryption System Based on Inner Product (IEEE Transactions on Services Computing) Yu Li, Jianting Ning and Jie Chen∗
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy (The Computer Journal) Haitang Lu, Jie Chen∗ , Jianting Ning and Kai Zhang
Binary Tree Encryption with Constant-Size Public Key in the Standard Model (The Computer Journal) Shengyuan Feng, Junqing Gong and Jie Chen∗
Group Signature with Verifier-Local Revocation Based on Coding Theory (Security and Communication Networks) Luping Wang, Kai Zhang, Haifeng Qian and Jie Chen∗
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user settin (Theoretical Computer Science) Luping Wang, Jie Chen∗ , Kai Zhang and Haifeng Qian
Public key encryption with equality test via hash proof system (Theoretical Computer Science) Ming Zeng, Jie Chen∗ , Kai Zhang and Haifeng Qian
Leakage-resilient Attribute Based Encryption in Prime-order Groups via Predicate Encodings (Designs, Codes and Cryptography) Jie Zhang, Jie Chen∗ , Junqing Gong, Aijun Ge and Chuangui Ma
Extended Dual System Group and Shorter Unbounded Hierarchical Identity Based Encryption (Designs, Codes and Cryptography) Junqing Gong, Zhenfu Cao, Shaohua Tang and Jie Chen∗
Doubly Spatial Encryption from DBDH (Theoretical Computer Science) Jie Chen∗ and Hoeteck Wee

results matching ""

    No results matching ""