The following pages link to Junzuo Lai (Q545360):
Displayed 33 items.
- Self-generated-certificate public key encryption without pairing and its application (Q545362) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- Adaptable key-policy attribute-based encryption with time interval (Q1741937) (← links)
- Hedged nonce-based public-key encryption: adaptive security under randomness failures (Q1749284) (← links)
- Lattice-based universal accumulator with nonmembership arguments (Q1784485) (← links)
- Unforgeable watermarking schemes with public extraction (Q1796781) (← links)
- Practical public key encryption with selective opening security for receivers (Q2004703) (← links)
- Making \textit{any} attribute-based encryption accountable, efficiently (Q2167762) (← links)
- Collusion resistant watermarking schemes for cryptographic functionalities (Q2181887) (← links)
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks (Q2416939) (← links)
- Towards semantically secure outsourcing of association rule mining on categorical data (Q2629963) (← links)
- Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting (Q2692342) (← links)
- Receiver selective opening security for identity-based encryption in the multi-challenge setting (Q2697475) (← links)
- CCA-Secure Keyed-Fully Homomorphic Encryption (Q2798772) (← links)
- Secret Handshakes with Dynamic Expressive Matching Policy (Q2817485) (← links)
- Accountable Trapdoor Sanitizable Signatures (Q2851311) (← links)
- An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures (Q2953846) (← links)
- Fully Secure Cipertext-Policy Hiding CP-ABE (Q3001861) (← links)
- Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security (Q3084350) (← links)
- General Construction of Chameleon All-But-One Trapdoor Functions (Q3092363) (← links)
- Accountable Authority Identity-Based Encryption with Public Traceability (Q4910248) (← links)
- Efficient CCA-Secure PKE from Identity-Based Techniques (Q5189446) (← links)
- Verifiable Computation on Outsourced Encrypted Data (Q5264266) (← links)
- Authorized Keyword Search on Encrypted Data (Q5264269) (← links)
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack (Q5418690) (← links)
- Adaptable Ciphertext-Policy Attribute-Based Encryption (Q5746231) (← links)
- Self-Generated-Certificate Public Key Encryption Without Pairing (Q5756550) (← links)
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation (Q5916240) (← links)
- Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation (Q5919024) (← links)
- Asymmetric group message franking: definitions and constructions (Q6083656) (← links)
- Anonymous public key encryption under corruptions (Q6135442) (← links)
- Simulation-based bi-selective opening security for public key encryption (Q6157527) (← links)
- Lattice Codes for Lattice-Based PKE (Q6409082) (← links)