Master-Key KDM-Secure ABE via Predicate Encoding (PKC 2021) |
Shengyuan Feng, Junqing Gong∗ and Jie Chen∗ In Proceedings of the 24th International Conference on the Theory and Practice of Public-Key Cryptography |
Tightly Secure IBE under Constant-size Master Public Key (PKC 2017) |
Jie Chen∗ , Junqing Gong∗ and Jian Weng∗ In Proceedings of the 20th International Conference on the Theory and Practice of Public-Key Cryptography |
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting (ASIACRYPT 2016) |
Junqing Gong, Xiaolei Dong∗ , Jie Chen∗ and Zhenfu Cao In Proceedings of the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security |
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently (ESORICS 2016) |
Jianting Ning, Zhenfu Cao∗ , Xiaolei Dong∗ , Junqing Gong and Jie Chen∗ In Proceedings of the 21th European Symposium on Research in Computer Security |
Non-Zero Inner Product Encryption with Short Ciphertexts and Private Keys (SCN 2016) |
Jie Chen∗ , Benoit Libert∗ and Somindu Ramanna∗ In Proceedings of the 10th International Conference on Security and Cryptography for Networks |
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Out-sourced Verifiable Computation (AsiaCCS 2016) |
Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen∗ , Xiangxue Li, Haifeng Qian and Zhenfu Cao In Proceedings of the 11th ACM Asia Conference on Computer and Communications Security |
Extended Nested Dual System Groups, Revisited (PKC 2016) |
Junqing Gong, Jie Chen∗ , Xiaolei Dong, Zhenfu Cao∗ and Shaohua Tang In Proceedings of the 19th International Conference on the Theory and Practice of Public-Key Cryptography |
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula (SCN 2014) |
Jie Chen∗ and Hoeteck Wee In Proceedings of the 9th International Conference on Security and Cryptography for Networks |
Shorter IBE and Signatures via Asymmetric Pairings (Pairing 2012) |
Jie Chen∗ , Hoon Wei Lim, San Ling, Huaxiong Wang and Hoeteck Wee In Proceedings of the 5th International Conference on Pairing-Based Cryptography |
Revocable Identity-Based Encryption from Lattices (ACISP 2012) |
Jie Chen∗ , Hoon Wei Lim, San Ling, Huaxiong Wang and Khoa Nguyen In Proceedings of the 17th Australasian Conference on Information Security and Privacy |