BibTeX records: Junzuo Lai

download as .bib file

@article{DBLP:journals/isci/LiLZS24,
  author       = {Yanling Li and
                  Junzuo Lai and
                  Rong Zhang and
                  Meng Sun},
  title        = {Secure and efficient multi-key aggregation for federated learning},
  journal      = {Inf. Sci.},
  volume       = {654},
  pages        = {119830},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.119830},
  doi          = {10.1016/J.INS.2023.119830},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiLZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/LiZML24,
  author       = {Peng Li and
                  Dehua Zhou and
                  Haobin Ma and
                  Junzuo Lai},
  title        = {Flexible and secure access control for {EHR} sharing based on blockchain},
  journal      = {J. Syst. Archit.},
  volume       = {146},
  pages        = {103033},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.sysarc.2023.103033},
  doi          = {10.1016/J.SYSARC.2023.103033},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/LiZML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/MuWHLZWY24,
  author       = {Xin Mu and
                  Yu Wang and
                  Zhengan Huang and
                  Junzuo Lai and
                  Yehong Zhang and
                  Hui Wang and
                  Yue Yu},
  editor       = {Michael J. Wooldridge and
                  Jennifer G. Dy and
                  Sriraam Natarajan},
  title        = {EncryIP: {A} Practical Encryption-Based Framework for Model Intellectual
                  Property Protection},
  booktitle    = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2024, Thirty-Sixth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver,
                  Canada},
  pages        = {21438--21445},
  publisher    = {{AAAI} Press},
  year         = {2024},
  url          = {https://doi.org/10.1609/aaai.v38i19.30140},
  doi          = {10.1609/AAAI.V38I19.30140},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/MuWHLZWY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/HanLYZLLC23,
  author       = {Lulu Han and
                  Weiqi Luo and
                  Anjia Yang and
                  Yandong Zheng and
                  Rongxing Lu and
                  Junzuo Lai and
                  Yudan Cheng},
  title        = {Fully privacy-preserving location recommendation in outsourced environments},
  journal      = {Ad Hoc Networks},
  volume       = {141},
  pages        = {103077},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.adhoc.2022.103077},
  doi          = {10.1016/J.ADHOC.2022.103077},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/HanLYZLLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ChenLWNLH23,
  author       = {Xiuyuan Chen and
                  Chao Lin and
                  Wei Wu and
                  Jianting Ning and
                  Junzuo Lai and
                  Debiao He},
  title        = {Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains:
                  Architecture, Challenges, and Solutions},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {8},
  pages        = {130--136},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.006.2200835},
  doi          = {10.1109/MCOM.006.2200835},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ChenLWNLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiLZYWF23,
  author       = {Peng Li and
                  Junzuo Lai and
                  Dehua Zhou and
                  Ye Yang and
                  Wei Wu and
                  Junbin Fang},
  title        = {Multi-authority anonymous authentication with public accountability
                  for incentive-based applications},
  journal      = {Comput. Networks},
  volume       = {231},
  pages        = {109828},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109828},
  doi          = {10.1016/J.COMNET.2023.109828},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/LiLZYWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiLYSWWY23,
  author       = {Peng Li and
                  Junzuo Lai and
                  Ye Yang and
                  Meng Sun and
                  Chi Wu and
                  Wei Wu and
                  Xiaowei Yuan},
  title        = {Attribute-based anonymous credential: Delegation, traceability, and
                  revocation},
  journal      = {Comput. Networks},
  volume       = {237},
  pages        = {110086},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.110086},
  doi          = {10.1016/J.COMNET.2023.110086},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LiLYSWWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangLZM23,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Gongxian Zeng and
                  Xin Mu},
  title        = {Receiver selective opening security for identity-based encryption
                  in the multi-challenge setting},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1233--1259},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01147-8},
  doi          = {10.1007/S10623-022-01147-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangLZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiLW23,
  author       = {Peng Li and
                  Junzuo Lai and
                  Yongdong Wu},
  title        = {Accountable attribute-based authentication with fine-grained access
                  control and its application to crowdsourcing},
  journal      = {Frontiers Comput. Sci.},
  volume       = {17},
  number       = {1},
  pages        = {171802},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11704-021-0593-4},
  doi          = {10.1007/S11704-021-0593-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuWWWWLL23,
  author       = {Yongdong Wu and
                  Jian Weng and
                  Zhengxia Wang and
                  Kaimin Wei and
                  Jinming Wen and
                  Junzuo Lai and
                  Xin Li},
  title        = {Attacks and Countermeasures on Privacy-Preserving Biometric Authentication
                  Schemes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1744--1755},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3162623},
  doi          = {10.1109/TDSC.2022.3162623},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuWWWWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/HanLYYLLZ23,
  author       = {Lulu Han and
                  Weiqi Luo and
                  Yaxi Yang and
                  Anjia Yang and
                  Rongxing Lu and
                  Junzuo Lai and
                  Yandong Zheng},
  title        = {{PPOLQ:} Privacy-Preserving Optimal Location Query With Multiple-Condition
                  Filter in Outsourced Environments},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {3564--3577},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3273208},
  doi          = {10.1109/TSC.2023.3273208},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/HanLYYLLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZengLHZWLWW23,
  author       = {Gongxian Zeng and
                  Junzuo Lai and
                  Zhengan Huang and
                  Linru Zhang and
                  Xiangning Wang and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang and
                  Jian Weng},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Non-interactive Zero-Knowledge Functional Proofs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14442},
  pages        = {236--268},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8733-7\_8},
  doi          = {10.1007/978-981-99-8733-7\_8},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZengLHZWLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiuLWQYW23,
  author       = {Yi Liu and
                  Junzuo Lai and
                  Qi Wang and
                  Xianrui Qin and
                  Anjia Yang and
                  Jian Weng},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Robust Publicly Verifiable Covert Security: Limited Information Leakage
                  and Guaranteed Correctness with Low Overhead},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14438},
  pages        = {272--301},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8721-4\_9},
  doi          = {10.1007/978-981-99-8721-4\_9},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiuLWQYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiZHYMW23,
  author       = {Junzuo Lai and
                  Gongxian Zeng and
                  Zhengan Huang and
                  Siu Ming Yiu and
                  Xin Mu and
                  Jian Weng},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Asymmetric Group Message Franking: Definitions and Constructions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14008},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30589-4\_3},
  doi          = {10.1007/978-3-031-30589-4\_3},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiZHYMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-12049,
  author       = {Xin Mu and
                  Yu Wang and
                  Zhengan Huang and
                  Junzuo Lai and
                  Yehong Zhang and
                  Hui Wang and
                  Yue Yu},
  title        = {EncryIP: {A} Practical Encryption-Based Framework for Model Intellectual
                  Property Protection},
  journal      = {CoRR},
  volume       = {abs/2312.12049},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.12049},
  doi          = {10.48550/ARXIV.2312.12049},
  eprinttype    = {arXiv},
  eprint       = {2312.12049},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-12049.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiZHYMW23,
  author       = {Junzuo Lai and
                  Gongxian Zeng and
                  Zhengan Huang and
                  Siu Ming Yiu and
                  Xin Mu and
                  Jian Weng},
  title        = {Asymmetric Group Message Franking: Definitions {\&} Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/332},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiZHYMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLWQYW23,
  author       = {Yi Liu and
                  Junzuo Lai and
                  Qi Wang and
                  Xianrui Qin and
                  Anjia Yang and
                  Jian Weng},
  title        = {Robust Publicly Verifiable Covert Security: Limited Information Leakage
                  and Guaranteed Correctness with Low Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1392},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1392},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLWQYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengLHZWLWW23,
  author       = {Gongxian Zeng and
                  Junzuo Lai and
                  Zhengan Huang and
                  Linru Zhang and
                  Xiangning Wang and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang and
                  Jian Weng},
  title        = {Non-Interactive Zero-Knowledge Functional Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1759},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1759},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengLHZWLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZengLHWZ22,
  author       = {Gongxian Zeng and
                  Junzuo Lai and
                  Zhengan Huang and
                  Yu Wang and
                  Zhiming Zheng},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {DAG-{\(\Sigma\)}: {A} DAG-Based Sigma Protocol for Relations in {CNF}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  pages        = {340--370},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4\_12},
  doi          = {10.1007/978-3-031-22966-4\_12},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZengLHWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HuangLHLW22,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Shuai Han and
                  Lin Lyu and
                  Jian Weng},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Anonymous Public Key Encryption Under Corruptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {423--453},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_15},
  doi          = {10.1007/978-3-031-22969-5\_15},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HuangLHLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiLYS22,
  author       = {Yu Li and
                  Junzuo Lai and
                  Xiaowei Yuan and
                  Beibei Song},
  editor       = {Chunpeng Ge and
                  Fuchun Guo},
  title        = {Practical Federated Learning for Samples with Different IDs},
  booktitle    = {Provable and Practical Security - 16th International Conference, ProvSec
                  2022, Nanjing, China, November 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13600},
  pages        = {176--195},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20917-8\_13},
  doi          = {10.1007/978-3-031-20917-8\_13},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/LiLYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-13325,
  author       = {Shanxiang Lyu and
                  Ling Liu and
                  Junzuo Lai and
                  Cong Ling and
                  Hao Chen},
  title        = {Lattice Codes for Lattice-Based {PKE}},
  journal      = {CoRR},
  volume       = {abs/2208.13325},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.13325},
  doi          = {10.48550/ARXIV.2208.13325},
  eprinttype    = {arXiv},
  eprint       = {2208.13325},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-13325.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lyu0L0022,
  author       = {Shanxiang Lyu and
                  Ling Liu and
                  Junzuo Lai and
                  Cong Ling and
                  Hao Chen},
  title        = {Lattice Codes for Lattice-Based {PKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {874},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/874},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lyu0L0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL00022,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Shuai Han and
                  Lin Lyu and
                  Jian Weng},
  title        = {Anonymous Public Key Encryption under Corruptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1176},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1176},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL00022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengLHWZ22,
  author       = {Gongxian Zeng and
                  Junzuo Lai and
                  Zhengan Huang and
                  Yu Wang and
                  Zhiming Zheng},
  title        = {DAG-{\(\Sigma\)}: {A} DAG-based Sigma Protocol for Relations in {CNF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1569},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1569},
  timestamp    = {Fri, 25 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengLHWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LiLW21,
  author       = {Peng Li and
                  Junzuo Lai and
                  Yongdong Wu},
  title        = {Event-oriented linkable and traceable anonymous authentication and
                  its application to voting},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {60},
  pages        = {102865},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102865},
  doi          = {10.1016/J.JISA.2021.102865},
  timestamp    = {Fri, 09 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LiLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiLW21,
  author       = {Peng Li and
                  Junzuo Lai and
                  Yongdong Wu},
  title        = {Publicly Traceable Attribute-Based Anonymous Authentication and Its
                  Application to Voting},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6611518:1--6611518:17},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6611518},
  doi          = {10.1155/2021/6611518},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LaiYHW21,
  author       = {Junzuo Lai and
                  Rupeng Yang and
                  Zhengan Huang and
                  Jian Weng},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Simulation-Based Bi-Selective Opening Security for Public Key Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {456--482},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_16},
  doi          = {10.1007/978-3-030-92075-3\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LaiYHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiYHW21,
  author       = {Junzuo Lai and
                  Rupeng Yang and
                  Zhengan Huang and
                  Jian Weng},
  title        = {Simulation-Based Bi-Selective Opening Security for Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1268},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1268},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiYHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LaiHAM20,
  author       = {Junzuo Lai and
                  Zhengan Huang and
                  Man Ho Au and
                  Xianping Mao},
  title        = {Constant-size CCA-secure multi-hop unidirectional proxy re-encryption
                  from indistinguishability obfuscation},
  journal      = {Theor. Comput. Sci.},
  volume       = {847},
  pages        = {1--16},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.09.031},
  doi          = {10.1016/J.TCS.2020.09.031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/LaiHAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YangLHAXS20,
  author       = {Rupeng Yang and
                  Junzuo Lai and
                  Zhengan Huang and
                  Man Ho Au and
                  Qiuliang Xu and
                  Willy Susilo},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Possibility and Impossibility Results for Receiver Selective Opening
                  Secure {PKE} in the Multi-challenge Setting},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {191--220},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_7},
  doi          = {10.1007/978-3-030-64837-4\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YangLHAXS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangLHAXS20,
  author       = {Rupeng Yang and
                  Junzuo Lai and
                  Zhengan Huang and
                  Man Ho Au and
                  Qiuliang Xu and
                  Willy Susilo},
  title        = {Possibility and Impossibility Results for Receiver Selective Opening
                  Secure {PKE} in the Multi-Challenge Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1080},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1080},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangLHAXS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangLCAPL19,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Man Ho Au and
                  Zhen Peng and
                  Jin Li},
  title        = {Simulation-based selective opening security for receivers under chosen-ciphertext
                  attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1345--1371},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0530-1},
  doi          = {10.1007/S10623-018-0530-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangLCAPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HuangLCLX19,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Tong Li and
                  Yang Xiang},
  title        = {Data security against receiver corruptions: {SOA} security for receivers
                  from simulatable DEMs},
  journal      = {Inf. Sci.},
  volume       = {471},
  pages        = {201--215},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.08.059},
  doi          = {10.1016/J.INS.2018.08.059},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HuangLCLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HuangLCRJ19,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Muhammad Raees{-}ul{-}Haq and
                  Liaoliang Jiang},
  title        = {Practical public key encryption with selective opening security for
                  receivers},
  journal      = {Inf. Sci.},
  volume       = {478},
  pages        = {15--27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.10.055},
  doi          = {10.1016/J.INS.2018.10.055},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HuangLCRJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YangALXY19,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Junzuo Lai and
                  Qiuliang Xu and
                  Zuoxia Yu},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Collusion Resistant Watermarking Schemes for Cryptographic Functionalities},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  pages        = {371--398},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5\_14},
  doi          = {10.1007/978-3-030-34578-5\_14},
  timestamp    = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YangALXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/LiL19,
  author       = {Peng Li and
                  Junzuo Lai},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {LaT-Voting: Traceable Anonymous E-Voting on Blockchain},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {234--254},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_14},
  doi          = {10.1007/978-3-030-36938-5\_14},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/LiL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CuiDLYN18,
  author       = {Hui Cui and
                  Robert H. Deng and
                  Junzuo Lai and
                  Xun Yi and
                  Surya Nepal},
  title        = {An efficient and expressive ciphertext-policy attribute-based encryption
                  scheme with partially hidden access structures, revisited},
  journal      = {Comput. Networks},
  volume       = {133},
  pages        = {157--165},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comnet.2018.01.034},
  doi          = {10.1016/J.COMNET.2018.01.034},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/CuiDLYN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuAYLX18,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Rupeng Yang and
                  Junzuo Lai and
                  Qiuliang Xu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Lattice-Based Universal Accumulator with Nonmembership Arguments},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {502--519},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_29},
  doi          = {10.1007/978-3-319-93638-3\_29},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuAYLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiHAM18,
  author       = {Junzuo Lai and
                  Zhengan Huang and
                  Man Ho Au and
                  Xianping Mao},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption
                  from Indistinguishability Obfuscation},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {805--812},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_49},
  doi          = {10.1007/978-3-319-93638-3\_49},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiHAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuAYLX18,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Rupeng Yang and
                  Junzuo Lai and
                  Qiuliang Xu},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Achieving Flexibility for {ABE} with Outsourcing via Proxy Re-Encryption},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {659--672},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196557},
  doi          = {10.1145/3196494.3196557},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuAYLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LaiT18,
  author       = {Junzuo Lai and
                  Qiang Tang},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Making Any Attribute-Based Encryption Accountable, Efficiently},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {527--547},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_26},
  doi          = {10.1007/978-3-319-98989-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LaiT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MaoLWWL18,
  author       = {Xianping Mao and
                  Xuefeng Li and
                  Xiaochuan Wu and
                  Chuansheng Wang and
                  Junzuo Lai},
  editor       = {Man Ho Au and
                  Siu{-}Ming Yiu and
                  Jin Li and
                  Xiapu Luo and
                  Cong Wang and
                  Aniello Castiglione and
                  Kamil Kluczniak},
  title        = {Anonymous Attribute-Based Conditional Proxy Re-encryption},
  booktitle    = {Network and System Security - 12th International Conference, {NSS}
                  2018, Hong Kong, China, August 27-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11058},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02744-5\_7},
  doi          = {10.1007/978-3-030-02744-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MaoLWWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HuangLCAPL18,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Man Ho Au and
                  Zhen Peng and
                  Jin Li},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under
                  Randomness Failures},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {253--279},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_9},
  doi          = {10.1007/978-3-319-76578-5\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HuangLCAPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/YangALXY18,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Junzuo Lai and
                  Qiuliang Xu and
                  Zuoxia Yu},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Unforgeable Watermarking Schemes with Public Extraction},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {63--80},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_4},
  doi          = {10.1007/978-3-319-98113-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/YangALXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangLCAPL18,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Man Ho Au and
                  Zhen Peng and
                  Jin Li},
  title        = {Hedged Nonce-Based Public-Key Encryption: Adaptive Security under
                  Randomness Failures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangLCAPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangLCAPL18a,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Man Ho Au and
                  Zhen Peng and
                  Jin Li},
  title        = {Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {755},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/755},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangLCAPL18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/LiuLH17,
  author       = {Jia{-}Nan Liu and
                  Junzuo Lai and
                  Xinyi Huang},
  title        = {Dual trapdoor identity-based encryption with keyword search},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {10},
  pages        = {2599--2607},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-015-1960-6},
  doi          = {10.1007/S00500-015-1960-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/LiuLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/MaLDD17,
  author       = {Siqi Ma and
                  Junzuo Lai and
                  Robert H. Deng and
                  Xuhua Ding},
  title        = {Adaptable key-policy attribute-based encryption with time interval},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {20},
  pages        = {6191--6200},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2177-z},
  doi          = {10.1007/S00500-016-2177-Z},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/MaLDD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiLWZX17,
  author       = {Yanling Li and
                  Junzuo Lai and
                  Chuansheng Wang and
                  Jianghe Zhang and
                  Jie Xiong},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Verifiable Range Query Processing for Cloud Computing},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {333--349},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_19},
  doi          = {10.1007/978-3-319-72359-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiLWZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LaiXWWL17,
  author       = {Junzuo Lai and
                  Jie Xiong and
                  Chuansheng Wang and
                  Guangzheng Wu and
                  Yanling Li},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {A Secure Cloud Backup System with Deduplication and Assured Deletion},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {74--83},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_5},
  doi          = {10.1007/978-3-319-68637-0\_5},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LaiXWWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangALXY17,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Junzuo Lai and
                  Qiuliang Xu and
                  Zuoxia Yu},
  title        = {Lattice-Based Techniques for Accountable Anonymity: Composition of
                  Abstract Stern's Protocols and Weak {PRF} with Efficient Protocols
                  from {LWR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/781},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangALXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangALXY17a,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Junzuo Lai and
                  Qiuliang Xu and
                  Zuoxia Yu},
  title        = {Collusion Resistant Watermarking Schemes for Cryptographic Functionalities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1201},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangALXY17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangLXCL16,
  author       = {Liangliang Wang and
                  Junzuo Lai and
                  Hu Xiong and
                  Kefei Chen and
                  Yu Long},
  title        = {Fuzzy certificateless signature},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3658--3669},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1572},
  doi          = {10.1002/SEC.1572},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangLXCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuLDL16,
  author       = {Lixian Liu and
                  Junzuo Lai and
                  Robert H. Deng and
                  Yingjiu Li},
  title        = {Ciphertext-policy attribute-based encryption with partially hidden
                  access structure and its application to privacy-preserving electronic
                  medical record system in cloud environment},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {4897--4913},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1663},
  doi          = {10.1002/SEC.1663},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuLDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaoLMCW16,
  author       = {Xianping Mao and
                  Junzuo Lai and
                  Qixiang Mei and
                  Kefei Chen and
                  Jian Weng},
  title        = {Generic and Efficient Constructions of Attribute-Based Encryption
                  with Verifiable Outsourced Decryption},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {5},
  pages        = {533--546},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2423669},
  doi          = {10.1109/TDSC.2015.2423669},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaoLMCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HouLL16,
  author       = {Lin Hou and
                  Junzuo Lai and
                  Lixian Liu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Secret Handshakes with Dynamic Expressive Matching Policy},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {461--476},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_28},
  doi          = {10.1007/978-3-319-40253-6\_28},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HouLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiDMSW16,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Changshe Ma and
                  Kouichi Sakurai and
                  Jian Weng},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {CCA-Secure Keyed-Fully Homomorphic Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {70--98},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_4},
  doi          = {10.1007/978-3-662-49384-7\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiDMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/CuiDWL16,
  author       = {Hui Cui and
                  Robert H. Deng and
                  Guowei Wu and
                  Junzuo Lai},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption
                  Scheme with Partially Hidden Access Structures},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {19--38},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_2},
  doi          = {10.1007/978-3-319-47422-9\_2},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/CuiDWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaoLCWM15,
  author       = {Xianping Mao and
                  Junzuo Lai and
                  Kefei Chen and
                  Jian Weng and
                  Qixiang Mei},
  title        = {Efficient revocable identity-based encryption from multilinear maps},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3511--3522},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1274},
  doi          = {10.1002/SEC.1274},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MaoLCWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiDLWZ15,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Shengli Liu and
                  Jian Weng and
                  Yunlei Zhao},
  title        = {Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/297},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiDLWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LaiLDWGY14,
  author       = {Junzuo Lai and
                  Yingjiu Li and
                  Robert H. Deng and
                  Jian Weng and
                  Chaowen Guan and
                  Qiang Yan},
  title        = {Towards semantically secure outsourcing of association rule mining
                  on categorical data},
  journal      = {Inf. Sci.},
  volume       = {267},
  pages        = {267--286},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.01.040},
  doi          = {10.1016/J.INS.2014.01.040},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LaiLDWGY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaiDLW14,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yingjiu Li and
                  Jian Weng},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Fully secure key-policy attribute-based encryption with constant-size
                  ciphertexts and fast decryption},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {239--248},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590334},
  doi          = {10.1145/2590296.2590334},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LaiDLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LaiDPW14,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  HweeHwa Pang and
                  Jian Weng},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Verifiable Computation on Outsourced Encrypted Data},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {273--291},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_16},
  doi          = {10.1007/978-3-319-11203-9\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LaiDPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ShiLLDW14,
  author       = {Jie Shi and
                  Junzuo Lai and
                  Yingjiu Li and
                  Robert H. Deng and
                  Jian Weng},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Authorized Keyword Search on Encrypted Data},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {419--435},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_24},
  doi          = {10.1007/978-3-319-11203-9\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ShiLLDW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiDLWZ14,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Shengli Liu and
                  Jian Weng and
                  Yunlei Zhao},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext
                  Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {77--92},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_5},
  doi          = {10.1007/978-3-642-55220-5\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiDLWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LaiDGW13,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Chaowen Guan and
                  Jian Weng},
  title        = {Attribute-Based Encryption With Verifiable Outsourced Decryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {8},
  pages        = {1343--1354},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2271848},
  doi          = {10.1109/TIFS.2013.2271848},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LaiDGW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaiZDLC13,
  author       = {Junzuo Lai and
                  Xuhua Zhou and
                  Robert Huijie Deng and
                  Yingjiu Li and
                  Kefei Chen},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Expressive search on encrypted data},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {243--252},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484345},
  doi          = {10.1145/2484313.2484345},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LaiZDLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DingPL13,
  author       = {Xuhua Ding and
                  HweeHwa Pang and
                  Junzuo Lai},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Verifiable and private top-k monitoring},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {553--558},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484388},
  doi          = {10.1145/2484313.2484388},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DingPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LaiDZW13,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yunlei Zhao and
                  Jian Weng},
  editor       = {Ed Dawson},
  title        = {Accountable Authority Identity-Based Encryption with Public Traceability},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {326--342},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_21},
  doi          = {10.1007/978-3-642-36095-4\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LaiDZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LaiDW13,
  author       = {Junzuo Lai and
                  Xuhua Ding and
                  Yongdong Wu},
  editor       = {Robert H. Deng and
                  Tao Feng},
  title        = {Accountable Trapdoor Sanitizable Signatures},
  booktitle    = {Information Security Practice and Experience - 9th International Conference,
                  {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7863},
  pages        = {117--131},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38033-4\_9},
  doi          = {10.1007/978-3-642-38033-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LaiDW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/LaiDYW13,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yanjiang Yang and
                  Jian Weng},
  editor       = {Zhenfu Cao and
                  Fangguo Zhang},
  title        = {Adaptable Ciphertext-Policy Attribute-Based Encryption},
  booktitle    = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
                  Beijing, China, November 22-24, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8365},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04873-4\_12},
  doi          = {10.1007/978-3-319-04873-4\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pairing/LaiDYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaiDL12,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yingjiu Li},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Expressive {CP-ABE} with partially hidden access structures},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {18--19},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414465},
  doi          = {10.1145/2414456.2414465},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LaiDL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LaiKC11,
  author       = {Junzuo Lai and
                  Weidong Kou and
                  Kefei Chen},
  title        = {Self-generated-certificate public key encryption without pairing and
                  its application},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {11},
  pages        = {2422--2435},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2011.01.037},
  doi          = {10.1016/J.INS.2011.01.037},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LaiKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LiuLD11,
  author       = {Shengli Liu and
                  Junzuo Lai and
                  Robert H. Deng},
  title        = {General Construction of Chameleon All-But-One Trapdoor Functions},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {2/3},
  pages        = {74--88},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.08.31.074},
  doi          = {10.22667/JISIS.2011.08.31.074},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LiuLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiDLM11,
  author       = {Yingjiu Li and
                  Robert H. Deng and
                  Junzuo Lai and
                  Changshe Ma},
  title        = {On two {RFID} privacy notions and their relations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {30:1--30:23},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043628.2043631},
  doi          = {10.1145/2043628.2043631},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LiDLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaoDDLZ11,
  author       = {Feng Bao and
                  Robert H. Deng and
                  Xuhua Ding and
                  Junzuo Lai and
                  Yunlei Zhao},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Hierarchical Identity-Based Chameleon Hash and Its Applications},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {201--219},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_12},
  doi          = {10.1007/978-3-642-21554-4\_12},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BaoDDLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LaiDL11,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yingjiu Li},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {Fully Secure Cipertext-Policy Hiding {CP-ABE}},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {24--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_3},
  doi          = {10.1007/978-3-642-21031-0\_3},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LaiDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiDL11,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Shengli Liu},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext
                  Security},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_14},
  doi          = {10.1007/978-3-642-19379-8\_14},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiuLD11,
  author       = {Shengli Liu and
                  Junzuo Lai and
                  Robert H. Deng},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {General Construction of Chameleon All-But-One Trapdoor Functions},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {257--265},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_18},
  doi          = {10.1007/978-3-642-24316-5\_18},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiuLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LaiZDLK10,
  author       = {Junzuo Lai and
                  Wen Tao Zhu and
                  Robert H. Deng and
                  Shengli Liu and
                  Weidong Kou},
  title        = {New Constructions for Identity-Based Unidirectional Proxy Re-Encryption},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {25},
  number       = {4},
  pages        = {793--806},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11390-010-9366-5},
  doi          = {10.1007/S11390-010-9366-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/LaiZDLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LaiDL10,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yingjiu Li},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Revisiting Unpredictability-Based {RFID} Privacy Models},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {475--492},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_28},
  doi          = {10.1007/978-3-642-13708-2\_28},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LaiDL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LaiDLK10,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Shengli Liu and
                  Weidong Kou},
  editor       = {Josef Pieprzyk},
  title        = {Efficient CCA-Secure {PKE} from Identity-Based Techniques},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {132--147},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_10},
  doi          = {10.1007/978-3-642-11925-5\_10},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LaiDLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WengDDCL09,
  author       = {Jian Weng and
                  Robert H. Deng and
                  Xuhua Ding and
                  Cheng{-}Kang Chu and
                  Junzuo Lai},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Conditional proxy re-encryption secure against chosen-ciphertext attack},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {322--332},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533100},
  doi          = {10.1145/1533057.1533100},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WengDDCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LaiDLK09,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Shengli Liu and
                  Weidong Kou},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {RSA-Based Certificateless Public Key Encryption},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {24--34},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_3},
  doi          = {10.1007/978-3-642-00843-6\_3},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LaiDLK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengDLCLW08,
  author       = {Jian Weng and
                  Robert H. Deng and
                  Shengli Liu and
                  Kefei Chen and
                  Junzuo Lai and
                  Xu An Wang},
  title        = {Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/509},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengDLCLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiK07,
  author       = {Junzuo Lai and
                  Weidong Kou},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Self-Generated-Certificate Public Key Encryption Without Pairing},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {476--489},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_31},
  doi          = {10.1007/978-3-540-71677-8\_31},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics