Jian Weng

From MaRDI portal
Revision as of 04:37, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:338378

Available identifiers

zbMath Open weng.jianMaRDI QIDQ338378

List of research outcomes





PublicationDate of PublicationType
Time-based attribute-based proxy re-encryption with decryption key update2024-12-11Paper
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond2024-11-12Paper
Non-interactive zero-knowledge functional proofs2024-09-13Paper
Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead2024-08-30Paper
Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery2024-05-13Paper
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing2024-04-30Paper
Identifying buckling resistance of reinforced concrete columns during inelastic deformation2024-04-23Paper
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance2024-02-28Paper
Asymmetric group message franking: definitions and constructions2023-12-08Paper
Predicate private set intersection with linear complexity2023-11-10Paper
Generalized attack on ECDSA: known bits in arbitrary positions2023-11-07Paper
Single-state distributed \(k\)-winners-take-all neural network model2023-09-08Paper
Optimizing rectangle attacks: a unified and generic framework for key recovery2023-08-25Paper
Anonymous public key encryption under corruptions2023-08-25Paper
EHNP strikes back: analyzing SM2 implementations2023-06-02Paper
Simulation-based bi-selective opening security for public key encryption2023-05-12Paper
Simulatable verifiable random function from the LWE assumption2023-04-27Paper
Two-pass authenticated key exchange with explicit authentication and tight security2023-03-21Paper
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment2022-12-22Paper
New Proof for BKP IBE Scheme and Improvement in the MIMC Setting2022-12-09Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles2022-10-28Paper
On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction2022-09-23Paper
Attribute-based conditional proxy re-encryption in the standard model under LWE2022-06-24Paper
Efficient and fully secure lattice-based IBE with equality test2022-06-08Paper
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting2022-04-22Paper
Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances2021-07-22Paper
Robustly reusable fuzzy extractor with imperfect randomness2021-05-10Paper
Scalable revocable identity-based signature over lattices in the standard model2021-04-14Paper
Key regeneration-free ciphertext-policy attribute-based encryption and its application2021-03-31Paper
Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations2021-03-18Paper
A hybrid universal blind quantum computation2020-12-10Paper
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification2020-12-10Paper
New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks2020-09-29Paper
Notes on a provably-secure certificate-based encryption against malicious CA attacks2020-09-09Paper
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model2020-07-20Paper
Collision resistant hashing from sub-exponential learning parity with noise2020-05-05Paper
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields2020-01-28Paper
On Low-complexity Lattice Reduction Algorithms for Large-scale MIMO Detection: the Blessing of Sequential Reduction2019-12-12Paper
Indistinguishability of pure orthogonal product states by LOCC2017-10-25Paper
Tightly Secure IBE Under Constant-Size Master Public Key2017-06-13Paper
Verifiable Computation over Large Database with Incremental Updates2017-05-16Paper
On the security of two identity-based conditional proxy re-encryption schemes2016-11-04Paper
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security2016-09-02Paper
Towards semantically secure outsourcing of association rule mining on categorical data2016-07-08Paper
CCA-Secure Keyed-Fully Homomorphic Encryption2016-04-13Paper
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract)2016-01-11Paper
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond2015-12-10Paper
Security Model and Analysis of FHMQV, Revisited2015-12-02Paper
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext2015-11-20Paper
Fine-Grained Conditional Proxy Re-Encryption and Application2015-09-29Paper
A note on the security of KHL scheme2015-09-25Paper
Verifiable Computation over Large Database with Incremental Updates2015-07-24Paper
Verifiable Computation on Outsourced Encrypted Data2015-07-24Paper
Authorized Keyword Search on Encrypted Data2015-07-24Paper
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions2015-07-06Paper
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model2015-02-19Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters2015-01-28Paper
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model2014-09-29Paper
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack2014-05-27Paper
Adaptable Ciphertext-Policy Attribute-Based Encryption2014-02-18Paper
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles2014-01-24Paper
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters2013-12-10Paper
Cryptanalysis of an identity based broadcast encryption scheme without random oracles2013-03-28Paper
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks2013-03-18Paper
Accountable Authority Identity-Based Encryption with Public Traceability2013-03-18Paper
Zero-knowledge argument for simultaneous discrete logarithms2012-11-21Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 20102011-03-15Paper
Certificateless key-insulated signature without random oracles2011-02-02Paper
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings2011-01-28Paper
Cryptanalysis of a certificateless signcryption scheme in the standard model2011-01-28Paper
Strong key-insulated signature in the standard model2011-01-05Paper
Optionally Identifiable Private Handshakes2010-11-23Paper
Generic Constructions of Parallel Key-Insulated Encryption2010-09-10Paper
Zero-Knowledge Argument for Simultaneous Discrete Logarithms2010-07-20Paper
Efficient Unidirectional Proxy Re-Encryption2010-05-04Paper
Efficient discrete logarithm based multi-signature scheme in the plain public key model2010-02-25Paper
Identity-Based Strong Key-Insulated Signature Without Random Oracles2010-02-12Paper
Self-enforcing Private Inference Control2009-12-11Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security2009-09-29Paper
Conditional Proxy Broadcast Re-Encryption2009-06-25Paper
Identity-Based Key-Insulated Signature with Secure Key-Updates2009-01-15Paper
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings2009-01-09Paper
Identity-Based Threshold Key-Insulated Encryption without Random Oracles2008-04-24Paper
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction2008-04-11Paper
Pirate decoder for the broadcast encryption schemes from Crypto 20052007-10-12Paper

Research outcomes over time

This page was built for person: Jian Weng