Junzuo Lai

From MaRDI portal
Person:545360


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Non-interactive zero-knowledge functional proofs
 
2024-09-13Paper
Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
 
2024-08-30Paper
Asymmetric group message franking: definitions and constructions
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Anonymous public key encryption under corruptions
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Simulation-based bi-selective opening security for public key encryption
Lecture Notes in Computer Science
2023-05-12Paper
Receiver selective opening security for identity-based encryption in the multi-challenge setting
Designs, Codes and Cryptography
2023-04-12Paper
Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
 
2023-03-21Paper
Lattice Codes for Lattice-Based PKE
 
2022-08-28Paper
Making \textit{any} attribute-based encryption accountable, efficiently
 
2022-08-25Paper
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
Theoretical Computer Science
2020-11-06Paper
Practical public key encryption with selective opening security for receivers
Information Sciences
2020-10-07Paper
Collusion resistant watermarking schemes for cryptographic functionalities
 
2020-05-20Paper
Simulation-based selective opening security for receivers under chosen-ciphertext attacks
Designs, Codes and Cryptography
2019-05-24Paper
Unforgeable watermarking schemes with public extraction
 
2018-10-17Paper
Lattice-based universal accumulator with nonmembership arguments
 
2018-09-26Paper
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
Information Security and Privacy
2018-09-26Paper
Hedged nonce-based public-key encryption: adaptive security under randomness failures
 
2018-05-16Paper
Adaptable key-policy attribute-based encryption with time interval
Soft Computing
2018-04-11Paper
Dual trapdoor identity-based encryption with keyword search
Soft Computing
2018-02-27Paper
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
Provable Security
2017-01-06Paper
Secret handshakes with dynamic expressive matching policy
Information Security and Privacy
2016-08-31Paper
Towards semantically secure outsourcing of association rule mining on categorical data
Information Sciences
2016-07-08Paper
CCA-secure keyed-fully homomorphic encryption
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Verifiable computation on outsourced encrypted data
Computer Security - ESORICS 2014
2015-07-24Paper
Authorized keyword search on encrypted data
Computer Security - ESORICS 2014
2015-07-24Paper
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Adaptable Ciphertext-Policy Attribute-Based Encryption
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Accountable trapdoor sanitizable signatures
Information Security Practice and Experience
2013-10-10Paper
Accountable Authority Identity-Based Encryption with Public Traceability
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
General construction of chameleon all-but-one trapdoor functions
Provable Security
2011-09-16Paper
Self-generated-certificate public key encryption without pairing and its application
Information Sciences
2011-06-22Paper
Fully secure cipertext-policy hiding CP-ABE
Information Security Practice and Experience
2011-05-19Paper
Chameleon all-but-one TDFs and their application to chosen-ciphertext security
Public Key Cryptography – PKC 2011
2011-03-15Paper
Efficient CCA-Secure PKE from Identity-Based Techniques
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Self-Generated-Certificate Public Key Encryption Without Pairing
Public Key Cryptography – PKC 2007
2007-09-04Paper


Research outcomes over time


This page was built for person: Junzuo Lai