Junqing Gong

From MaRDI portal
(Redirected from Person:1648811)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Registered attribute-based signature2024-11-12Paper
Registered functional encryptions from pairings2024-11-12Paper
Improved unbounded inner-product functional encryption
Theoretical Computer Science
2024-10-07Paper
Registered ABE via predicate encodings2024-09-13Paper
Fine-grained polynomial functional encryption
Theoretical Computer Science
2024-08-27Paper
Updatable searchable symmetric encryption: definitions and constructions
Theoretical Computer Science
2024-01-05Paper
Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Functional encryption for attribute-weighted sums from \(k\)-Lin2022-11-09Paper
Updatable all-but-one dual projective hashing and its applications2022-06-08Paper
Master-key KDM-secure ABE via predicate encoding2021-12-21Paper
Adaptively secure ABE for DFA from \(k\)-Lin and more2021-12-01Paper
External mean flow effect on sound transmission through composite sandwich structures filled with porous materials
Applied Mathematical Modelling
2021-11-03Paper
Simple and efficient FE for quadratic functions
Designs, Codes and Cryptography
2021-08-02Paper
ABE for DFA from \(k\)-lin2020-03-09Paper
Improved inner-product encryption with adaptive security and full attribute-hiding2019-01-23Paper
Compact IBBE and fuzzy IBE from simple assumptions2018-10-17Paper
Unbounded ABE via bilinear entropy expansion, revisited2018-07-09Paper
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
Designs, Codes and Cryptography
2018-05-24Paper
ABE with tag made easy. Concise framework and new instantiations in prime-order groups2018-03-08Paper
Tightly Secure IBE Under Constant-Size Master Public Key
Lecture Notes in Computer Science
2017-06-13Paper
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Extended dual system group and shorter unbounded hierarchical identity based encryption
Designs, Codes and Cryptography
2016-07-21Paper
Extended Nested Dual System Groups, Revisited
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Fully-Secure and Practical Sanitizable Signatures
Information Security and Cryptology
2011-07-29Paper


Research outcomes over time


This page was built for person: Junqing Gong