Jian Weng

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Time-based attribute-based proxy re-encryption with decryption key update
Designs, Codes and Cryptography
2024-12-11Paper
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
 
2024-11-12Paper
Non-interactive zero-knowledge functional proofs
 
2024-09-13Paper
Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
 
2024-08-30Paper
Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
Journal of Cryptology
2024-05-13Paper
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
Information Sciences
2024-04-30Paper
Identifying buckling resistance of reinforced concrete columns during inelastic deformation
International Journal of Structural Stability and Dynamics
2024-04-23Paper
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance
Information Sciences
2024-02-28Paper
Asymmetric group message franking: definitions and constructions
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Predicate private set intersection with linear complexity
 
2023-11-10Paper
Generalized attack on ECDSA: known bits in arbitrary positions
Designs, Codes and Cryptography
2023-11-07Paper
Single-state distributed \(k\)-winners-take-all neural network model
Information Sciences
2023-09-08Paper
Optimizing rectangle attacks: a unified and generic framework for key recovery
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Anonymous public key encryption under corruptions
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
EHNP strikes back: analyzing SM2 implementations
Progress in Cryptology - AFRICACRYPT 2022
2023-06-02Paper
Simulation-based bi-selective opening security for public key encryption
Lecture Notes in Computer Science
2023-05-12Paper
Simulatable verifiable random function from the LWE assumption
Theoretical Computer Science
2023-04-27Paper
Two-pass authenticated key exchange with explicit authentication and tight security
 
2023-03-21Paper
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment
1524.68044
2022-12-22Paper
New Proof for BKP IBE Scheme and Improvement in the MIMC Setting
Information Security Practice and Experience
2022-12-09Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
Science China Information Sciences
2022-10-28Paper
On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction
IEEE Transactions on Signal Processing
2022-09-23Paper
Attribute-based conditional proxy re-encryption in the standard model under LWE
 
2022-06-24Paper
Efficient and fully secure lattice-based IBE with equality test
 
2022-06-08Paper
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
 
2022-04-22Paper
Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances
IEEE Transactions on Information Theory
2021-07-22Paper
Robustly reusable fuzzy extractor with imperfect randomness
Designs, Codes and Cryptography
2021-05-10Paper
Scalable revocable identity-based signature over lattices in the standard model
Information Sciences
2021-04-14Paper
Key regeneration-free ciphertext-policy attribute-based encryption and its application
Information Sciences
2021-03-31Paper
Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations
Information Sciences
2021-03-18Paper
A hybrid universal blind quantum computation
Information Sciences
2020-12-10Paper
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
Information Sciences
2020-12-10Paper
New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks
IEEE Transactions on Information Theory
2020-09-29Paper
Notes on a provably-secure certificate-based encryption against malicious CA attacks
Information Sciences
2020-09-09Paper
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model
Information and Communications Security
2020-07-20Paper
Collision resistant hashing from sub-exponential learning parity with noise
 
2020-05-05Paper
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields
IEEE Transactions on Information Theory
2020-01-28Paper
On Low-complexity Lattice Reduction Algorithms for Large-scale MIMO Detection: the Blessing of Sequential Reduction
 
2019-12-12Paper
Indistinguishability of pure orthogonal product states by LOCC
Quantum Information Processing
2017-10-25Paper
Tightly Secure IBE Under Constant-Size Master Public Key
Lecture Notes in Computer Science
2017-06-13Paper
Verifiable Computation over Large Database with Incremental Updates
IEEE Transactions on Computers
2017-05-16Paper
On the security of two identity-based conditional proxy re-encryption schemes
Theoretical Computer Science
2016-11-04Paper
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
Information Security and Privacy
2016-09-02Paper
Towards semantically secure outsourcing of association rule mining on categorical data
Information Sciences
2016-07-08Paper
CCA-secure keyed-fully homomorphic encryption
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Quantum bit commitment with application in quantum zero-knowledge proof (extended abstract)
Algorithms and Computation
2016-01-11Paper
(Almost) optimal constructions of UOWHFs from 1-to-1, regular one-way functions and beyond
Lecture Notes in Computer Science
2015-12-10Paper
Security model and analysis of FHMQV, revisited
Information Security and Cryptology
2015-12-02Paper
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext
Science China Information Sciences
2015-11-20Paper
Fine-grained conditional proxy re-encryption and application
Provable Security
2015-09-29Paper
A note on the security of KHL scheme
Theoretical Computer Science
2015-09-25Paper
Verifiable computation over large database with incremental updates
Computer Security - ESORICS 2014
2015-07-24Paper
Verifiable computation on outsourced encrypted data
Computer Security - ESORICS 2014
2015-07-24Paper
Authorized keyword search on encrypted data
Computer Security - ESORICS 2014
2015-07-24Paper
The randomized iterate, revisited -- almost linear seed length PRGs from a broader class of one-way functions
Theory of Cryptography
2015-07-06Paper
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
Mathematical and Computer Modelling
2015-02-19Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters
Theoretical Computer Science
2015-01-28Paper
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model
Information and Communications Security
2014-09-29Paper
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Adaptable Ciphertext-Policy Attribute-Based Encryption
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Constructing practical signcryption KEM from standard assumptions without random oracles
Applied Cryptography and Network Security
2014-01-24Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Cryptanalysis of an identity based broadcast encryption scheme without random oracles
Information Processing Letters
2013-03-28Paper
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Accountable Authority Identity-Based Encryption with Public Traceability
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Zero-knowledge argument for simultaneous discrete logarithms
Algorithmica
2012-11-21Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Lecture Notes in Computer Science
2012-06-08Paper
On the security of a bidirectional proxy re-encryption scheme from PKC 2010
Public Key Cryptography – PKC 2011
2011-03-15Paper
Certificateless key-insulated signature without random oracles
Journal of Zhejiang University. Science A
2011-02-02Paper
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
Information Sciences
2011-01-28Paper
Cryptanalysis of a certificateless signcryption scheme in the standard model
Information Sciences
2011-01-28Paper
Strong key-insulated signature in the standard model
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Optionally identifiable private handshakes
Information Security and Cryptology
2010-11-23Paper
Generic constructions of parallel key-insulated encryption
Lecture Notes in Computer Science
2010-09-10Paper
Zero-knowledge argument for simultaneous discrete logarithms
Lecture Notes in Computer Science
2010-07-20Paper
Efficient Unidirectional Proxy Re-Encryption
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Efficient discrete logarithm based multi-signature scheme in the plain public key model
Designs, Codes and Cryptography
2010-02-25Paper
Identity-Based Strong Key-Insulated Signature Without Random Oracles
Journal of Software
2010-02-12Paper
Self-enforcing private inference control
Provable Security
2009-12-11Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Lecture Notes in Computer Science
2009-09-29Paper
Conditional Proxy Broadcast Re-Encryption
Information Security and Privacy
2009-06-25Paper
Identity-Based Key-Insulated Signature with Secure Key-Updates
Information Security and Cryptology
2009-01-15Paper
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Cryptology and Network Security
2009-01-09Paper
Identity-Based Threshold Key-Insulated Encryption without Random Oracles
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Pirate decoder for the broadcast encryption schemes from Crypto 2005
Science in China. Series F
2007-10-12Paper


Research outcomes over time


This page was built for person: Jian Weng