Jian Weng

From MaRDI portal
Person:338378


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Time-based attribute-based proxy re-encryption with decryption key update
Designs, Codes and Cryptography
2024-12-11Paper
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
 
2024-11-12Paper
Non-interactive zero-knowledge functional proofs
 
2024-09-13Paper
Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
 
2024-08-30Paper
Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
Journal of Cryptology
2024-05-13Paper
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
Information Sciences
2024-04-30Paper
Identifying buckling resistance of reinforced concrete columns during inelastic deformation
International Journal of Structural Stability and Dynamics
2024-04-23Paper
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance
Information Sciences
2024-02-28Paper
Asymmetric group message franking: definitions and constructions
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Predicate private set intersection with linear complexity
 
2023-11-10Paper
Generalized attack on ECDSA: known bits in arbitrary positions
Designs, Codes and Cryptography
2023-11-07Paper
Single-state distributed \(k\)-winners-take-all neural network model
Information Sciences
2023-09-08Paper
Optimizing rectangle attacks: a unified and generic framework for key recovery
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Anonymous public key encryption under corruptions
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
EHNP strikes back: analyzing SM2 implementations
Progress in Cryptology - AFRICACRYPT 2022
2023-06-02Paper
Simulation-based bi-selective opening security for public key encryption
Lecture Notes in Computer Science
2023-05-12Paper
Simulatable verifiable random function from the LWE assumption
Theoretical Computer Science
2023-04-27Paper
Two-pass authenticated key exchange with explicit authentication and tight security
 
2023-03-21Paper
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment
1524.68044
2022-12-22Paper
New Proof for BKP IBE Scheme and Improvement in the MIMC Setting
Information Security Practice and Experience
2022-12-09Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
Science China Information Sciences
2022-10-28Paper
On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction
IEEE Transactions on Signal Processing
2022-09-23Paper
Attribute-based conditional proxy re-encryption in the standard model under LWE
 
2022-06-24Paper
Efficient and fully secure lattice-based IBE with equality test
 
2022-06-08Paper
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting
 
2022-04-22Paper
Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances
IEEE Transactions on Information Theory
2021-07-22Paper
Robustly reusable fuzzy extractor with imperfect randomness
Designs, Codes and Cryptography
2021-05-10Paper
Scalable revocable identity-based signature over lattices in the standard model
Information Sciences
2021-04-14Paper
Key regeneration-free ciphertext-policy attribute-based encryption and its application
Information Sciences
2021-03-31Paper
Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations
Information Sciences
2021-03-18Paper
A hybrid universal blind quantum computation
Information Sciences
2020-12-10Paper
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
Information Sciences
2020-12-10Paper
New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks
IEEE Transactions on Information Theory
2020-09-29Paper
Notes on a provably-secure certificate-based encryption against malicious CA attacks
Information Sciences
2020-09-09Paper
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model
Information and Communications Security
2020-07-20Paper
Collision resistant hashing from sub-exponential learning parity with noise
 
2020-05-05Paper
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields
IEEE Transactions on Information Theory
2020-01-28Paper
On Low-complexity Lattice Reduction Algorithms for Large-scale MIMO Detection: the Blessing of Sequential Reduction
 
2019-12-12Paper
Indistinguishability of pure orthogonal product states by LOCC
Quantum Information Processing
2017-10-25Paper
Tightly Secure IBE Under Constant-Size Master Public Key
Lecture Notes in Computer Science
2017-06-13Paper
Verifiable Computation over Large Database with Incremental Updates
IEEE Transactions on Computers
2017-05-16Paper
On the security of two identity-based conditional proxy re-encryption schemes
Theoretical Computer Science
2016-11-04Paper
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security
Information Security and Privacy
2016-09-02Paper
Towards semantically secure outsourcing of association rule mining on categorical data
Information Sciences
2016-07-08Paper
CCA-secure keyed-fully homomorphic encryption
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Quantum bit commitment with application in quantum zero-knowledge proof (extended abstract)
Algorithms and Computation
2016-01-11Paper
(Almost) optimal constructions of UOWHFs from 1-to-1, regular one-way functions and beyond
Lecture Notes in Computer Science
2015-12-10Paper
Security model and analysis of FHMQV, revisited
Information Security and Cryptology
2015-12-02Paper
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext
Science China Information Sciences
2015-11-20Paper
Fine-grained conditional proxy re-encryption and application
Provable Security
2015-09-29Paper
A note on the security of KHL scheme
Theoretical Computer Science
2015-09-25Paper
Verifiable computation over large database with incremental updates
Computer Security - ESORICS 2014
2015-07-24Paper
Verifiable computation on outsourced encrypted data
Computer Security - ESORICS 2014
2015-07-24Paper
Authorized keyword search on encrypted data
Computer Security - ESORICS 2014
2015-07-24Paper
The randomized iterate, revisited -- almost linear seed length PRGs from a broader class of one-way functions
Theory of Cryptography
2015-07-06Paper
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
Mathematical and Computer Modelling
2015-02-19Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters
Theoretical Computer Science
2015-01-28Paper
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model
Information and Communications Security
2014-09-29Paper
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Adaptable Ciphertext-Policy Attribute-Based Encryption
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Constructing practical signcryption KEM from standard assumptions without random oracles
Applied Cryptography and Network Security
2014-01-24Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Cryptanalysis of an identity based broadcast encryption scheme without random oracles
Information Processing Letters
2013-03-28Paper
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Accountable Authority Identity-Based Encryption with Public Traceability
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Zero-knowledge argument for simultaneous discrete logarithms
Algorithmica
2012-11-21Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Lecture Notes in Computer Science
2012-06-08Paper
On the security of a bidirectional proxy re-encryption scheme from PKC 2010
Public Key Cryptography – PKC 2011
2011-03-15Paper
Certificateless key-insulated signature without random oracles
Journal of Zhejiang University. Science A
2011-02-02Paper
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
Information Sciences
2011-01-28Paper
Cryptanalysis of a certificateless signcryption scheme in the standard model
Information Sciences
2011-01-28Paper
Strong key-insulated signature in the standard model
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
Optionally identifiable private handshakes
Information Security and Cryptology
2010-11-23Paper
Generic constructions of parallel key-insulated encryption
Lecture Notes in Computer Science
2010-09-10Paper
Zero-knowledge argument for simultaneous discrete logarithms
Lecture Notes in Computer Science
2010-07-20Paper
Efficient Unidirectional Proxy Re-Encryption
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Efficient discrete logarithm based multi-signature scheme in the plain public key model
Designs, Codes and Cryptography
2010-02-25Paper
Identity-Based Strong Key-Insulated Signature Without Random Oracles
Journal of Software
2010-02-12Paper
Self-enforcing private inference control
Provable Security
2009-12-11Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Lecture Notes in Computer Science
2009-09-29Paper
Conditional Proxy Broadcast Re-Encryption
Information Security and Privacy
2009-06-25Paper
Identity-Based Key-Insulated Signature with Secure Key-Updates
Information Security and Cryptology
2009-01-15Paper
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Cryptology and Network Security
2009-01-09Paper
Identity-Based Threshold Key-Insulated Encryption without Random Oracles
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Pirate decoder for the broadcast encryption schemes from Crypto 2005
Science in China. Series F
2007-10-12Paper


Research outcomes over time


This page was built for person: Jian Weng