ติดตาม
Jie Chen
Jie Chen
East China Normal University
ยืนยันอีเมลแล้วที่ e.ntu.edu.sg - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Annual International Conference on the Theory and Applications of …, 2015
2512015
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Annual Cryptology Conference, 435-460, 2013
241*2013
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
1422012
Shorter identity-based encryption via asymmetric pairings
J Chen, HW Lim, S Ling, H Wang, H Wee
Designs, codes and cryptography 73, 911-947, 2014
121*2014
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Cryptographers’ Track at the RSA Conference, 50-67, 2013
1152013
Semi-adaptive attribute-based encryption and improved delegation for boolean formula
J Chen, H Wee
International Conference on Security and Cryptography for Networks, 277-297, 2014
862014
Unbounded ABE via bilinear entropy expansion, revisited
J Chen, J Gong, L Kowalczyk, H Wee
Annual International Conference on the Theory and Applications of …, 2018
852018
Forward secure public key encryption with keyword search for outsourced cloud storage
M Zeng, H Qian, J Chen, K Zhang
IEEE transactions on cloud computing 10 (1), 426-438, 2019
622019
Efficient public key encryption with equality test in the standard model
K Zhang, J Chen, HT Lee, H Qian, H Wang
Theoretical Computer Science 755, 65-80, 2019
552019
Two-factor data access control with efficient revocation for multi-authority cloud storage systems
X Li, S Tang, L Xu, H Wang, J Chen
IEEE Access 5, 393-405, 2016
542016
Combined public-key schemes: The case of ABE and ABS
C Chen, J Chen, HW Lim, Z Zhang, D Feng
Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012
532012
Extended nested dual system groups, revisited
J Gong, J Chen, X Dong, Z Cao, S Tang
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
452016
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
J Gong, X Dong, J Chen, Z Cao
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
452016
Identity-based matchmaking encryption from standard assumptions
J Chen, Y Li, J Wen, J Weng
International Conference on the Theory and Application of Cryptology and …, 2022
352022
Tightly secure IBE under constant-size master public key
J Chen, J Gong, J Weng
IACR International Workshop on Public Key Cryptography, 207-231, 2017
322017
Improved inner-product encryption with adaptive security and full attribute-hiding
J Chen, J Gong, H Wee
International Conference on the Theory and Application of Cryptology and …, 2018
272018
Doubly spatial encryption from DBDH
J Chen, H Wee
Theoretical Computer Science 543, 79-89, 2014
272014
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
242016
A searchable asymmetric encryption scheme with support for boolean queries for cloud applications
M Zeng, K Zhang, H Qian, X Chen, J Chen
The Computer Journal 62 (4), 563-578, 2019
232019
ABE with tag made easy: Concise framework and new instantiations in prime-order groups
J Chen, J Gong
International Conference on the Theory and Application of Cryptology and …, 2017
232017
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20