Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Junzuo Lai
@article{DBLP:journals/isci/LiLZS24, author = {Yanling Li and Junzuo Lai and Rong Zhang and Meng Sun}, title = {Secure and efficient multi-key aggregation for federated learning}, journal = {Inf. Sci.}, volume = {654}, pages = {119830}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2023.119830}, doi = {10.1016/J.INS.2023.119830}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiLZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/LiZML24, author = {Peng Li and Dehua Zhou and Haobin Ma and Junzuo Lai}, title = {Flexible and secure access control for {EHR} sharing based on blockchain}, journal = {J. Syst. Archit.}, volume = {146}, pages = {103033}, year = {2024}, url = {https://doi.org/10.1016/j.sysarc.2023.103033}, doi = {10.1016/J.SYSARC.2023.103033}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/LiZML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/MuWHLZWY24, author = {Xin Mu and Yu Wang and Zhengan Huang and Junzuo Lai and Yehong Zhang and Hui Wang and Yue Yu}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {EncryIP: {A} Practical Encryption-Based Framework for Model Intellectual Property Protection}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {21438--21445}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i19.30140}, doi = {10.1609/AAAI.V38I19.30140}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/MuWHLZWY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/HanLYZLLC23, author = {Lulu Han and Weiqi Luo and Anjia Yang and Yandong Zheng and Rongxing Lu and Junzuo Lai and Yudan Cheng}, title = {Fully privacy-preserving location recommendation in outsourced environments}, journal = {Ad Hoc Networks}, volume = {141}, pages = {103077}, year = {2023}, url = {https://doi.org/10.1016/j.adhoc.2022.103077}, doi = {10.1016/J.ADHOC.2022.103077}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/HanLYZLLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ChenLWNLH23, author = {Xiuyuan Chen and Chao Lin and Wei Wu and Jianting Ning and Junzuo Lai and Debiao He}, title = {Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {8}, pages = {130--136}, year = {2023}, url = {https://doi.org/10.1109/MCOM.006.2200835}, doi = {10.1109/MCOM.006.2200835}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ChenLWNLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiLZYWF23, author = {Peng Li and Junzuo Lai and Dehua Zhou and Ye Yang and Wei Wu and Junbin Fang}, title = {Multi-authority anonymous authentication with public accountability for incentive-based applications}, journal = {Comput. Networks}, volume = {231}, pages = {109828}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109828}, doi = {10.1016/J.COMNET.2023.109828}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiLZYWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiLYSWWY23, author = {Peng Li and Junzuo Lai and Ye Yang and Meng Sun and Chi Wu and Wei Wu and Xiaowei Yuan}, title = {Attribute-based anonymous credential: Delegation, traceability, and revocation}, journal = {Comput. Networks}, volume = {237}, pages = {110086}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.110086}, doi = {10.1016/J.COMNET.2023.110086}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiLYSWWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangLZM23, author = {Zhengan Huang and Junzuo Lai and Gongxian Zeng and Xin Mu}, title = {Receiver selective opening security for identity-based encryption in the multi-challenge setting}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1233--1259}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01147-8}, doi = {10.1007/S10623-022-01147-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuangLZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiLW23, author = {Peng Li and Junzuo Lai and Yongdong Wu}, title = {Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing}, journal = {Frontiers Comput. Sci.}, volume = {17}, number = {1}, pages = {171802}, year = {2023}, url = {https://doi.org/10.1007/s11704-021-0593-4}, doi = {10.1007/S11704-021-0593-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/LiLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuWWWWLL23, author = {Yongdong Wu and Jian Weng and Zhengxia Wang and Kaimin Wei and Jinming Wen and Junzuo Lai and Xin Li}, title = {Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1744--1755}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3162623}, doi = {10.1109/TDSC.2022.3162623}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuWWWWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/HanLYYLLZ23, author = {Lulu Han and Weiqi Luo and Yaxi Yang and Anjia Yang and Rongxing Lu and Junzuo Lai and Yandong Zheng}, title = {{PPOLQ:} Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {5}, pages = {3564--3577}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3273208}, doi = {10.1109/TSC.2023.3273208}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/HanLYYLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZengLHZWLWW23, author = {Gongxian Zeng and Junzuo Lai and Zhengan Huang and Linru Zhang and Xiangning Wang and Kwok{-}Yan Lam and Huaxiong Wang and Jian Weng}, editor = {Jian Guo and Ron Steinfeld}, title = {Non-interactive Zero-Knowledge Functional Proofs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14442}, pages = {236--268}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8733-7\_8}, doi = {10.1007/978-981-99-8733-7\_8}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZengLHZWLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiuLWQYW23, author = {Yi Liu and Junzuo Lai and Qi Wang and Xianrui Qin and Anjia Yang and Jian Weng}, editor = {Jian Guo and Ron Steinfeld}, title = {Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14438}, pages = {272--301}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8721-4\_9}, doi = {10.1007/978-981-99-8721-4\_9}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuLWQYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiZHYMW23, author = {Junzuo Lai and Gongxian Zeng and Zhengan Huang and Siu Ming Yiu and Xin Mu and Jian Weng}, editor = {Carmit Hazay and Martijn Stam}, title = {Asymmetric Group Message Franking: Definitions and Constructions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {67--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_3}, doi = {10.1007/978-3-031-30589-4\_3}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiZHYMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-12049, author = {Xin Mu and Yu Wang and Zhengan Huang and Junzuo Lai and Yehong Zhang and Hui Wang and Yue Yu}, title = {EncryIP: {A} Practical Encryption-Based Framework for Model Intellectual Property Protection}, journal = {CoRR}, volume = {abs/2312.12049}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.12049}, doi = {10.48550/ARXIV.2312.12049}, eprinttype = {arXiv}, eprint = {2312.12049}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-12049.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiZHYMW23, author = {Junzuo Lai and Gongxian Zeng and Zhengan Huang and Siu Ming Yiu and Xin Mu and Jian Weng}, title = {Asymmetric Group Message Franking: Definitions {\&} Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2023}, url = {https://eprint.iacr.org/2023/332}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiZHYMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLWQYW23, author = {Yi Liu and Junzuo Lai and Qi Wang and Xianrui Qin and Anjia Yang and Jian Weng}, title = {Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1392}, year = {2023}, url = {https://eprint.iacr.org/2023/1392}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLWQYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengLHZWLWW23, author = {Gongxian Zeng and Junzuo Lai and Zhengan Huang and Linru Zhang and Xiangning Wang and Kwok{-}Yan Lam and Huaxiong Wang and Jian Weng}, title = {Non-Interactive Zero-Knowledge Functional Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1759}, year = {2023}, url = {https://eprint.iacr.org/2023/1759}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZengLHZWLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZengLHWZ22, author = {Gongxian Zeng and Junzuo Lai and Zhengan Huang and Yu Wang and Zhiming Zheng}, editor = {Shweta Agrawal and Dongdai Lin}, title = {DAG-{\(\Sigma\)}: {A} DAG-Based Sigma Protocol for Relations in {CNF}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {340--370}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_12}, doi = {10.1007/978-3-031-22966-4\_12}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZengLHWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HuangLHLW22, author = {Zhengan Huang and Junzuo Lai and Shuai Han and Lin Lyu and Jian Weng}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Anonymous Public Key Encryption Under Corruptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {423--453}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_15}, doi = {10.1007/978-3-031-22969-5\_15}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HuangLHLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiLYS22, author = {Yu Li and Junzuo Lai and Xiaowei Yuan and Beibei Song}, editor = {Chunpeng Ge and Fuchun Guo}, title = {Practical Federated Learning for Samples with Different IDs}, booktitle = {Provable and Practical Security - 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13600}, pages = {176--195}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20917-8\_13}, doi = {10.1007/978-3-031-20917-8\_13}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/LiLYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-13325, author = {Shanxiang Lyu and Ling Liu and Junzuo Lai and Cong Ling and Hao Chen}, title = {Lattice Codes for Lattice-Based {PKE}}, journal = {CoRR}, volume = {abs/2208.13325}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.13325}, doi = {10.48550/ARXIV.2208.13325}, eprinttype = {arXiv}, eprint = {2208.13325}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-13325.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lyu0L0022, author = {Shanxiang Lyu and Ling Liu and Junzuo Lai and Cong Ling and Hao Chen}, title = {Lattice Codes for Lattice-Based {PKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {874}, year = {2022}, url = {https://eprint.iacr.org/2022/874}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lyu0L0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL00022, author = {Zhengan Huang and Junzuo Lai and Shuai Han and Lin Lyu and Jian Weng}, title = {Anonymous Public Key Encryption under Corruptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2022}, url = {https://eprint.iacr.org/2022/1176}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL00022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengLHWZ22, author = {Gongxian Zeng and Junzuo Lai and Zhengan Huang and Yu Wang and Zhiming Zheng}, title = {DAG-{\(\Sigma\)}: {A} DAG-based Sigma Protocol for Relations in {CNF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1569}, year = {2022}, url = {https://eprint.iacr.org/2022/1569}, timestamp = {Fri, 25 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZengLHWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiLW21, author = {Peng Li and Junzuo Lai and Yongdong Wu}, title = {Event-oriented linkable and traceable anonymous authentication and its application to voting}, journal = {J. Inf. Secur. Appl.}, volume = {60}, pages = {102865}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102865}, doi = {10.1016/J.JISA.2021.102865}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LiLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiLW21, author = {Peng Li and Junzuo Lai and Yongdong Wu}, title = {Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6611518:1--6611518:17}, year = {2021}, url = {https://doi.org/10.1155/2021/6611518}, doi = {10.1155/2021/6611518}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LaiYHW21, author = {Junzuo Lai and Rupeng Yang and Zhengan Huang and Jian Weng}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Simulation-Based Bi-Selective Opening Security for Public Key Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {456--482}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_16}, doi = {10.1007/978-3-030-92075-3\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LaiYHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiYHW21, author = {Junzuo Lai and Rupeng Yang and Zhengan Huang and Jian Weng}, title = {Simulation-Based Bi-Selective Opening Security for Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1268}, year = {2021}, url = {https://eprint.iacr.org/2021/1268}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiYHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LaiHAM20, author = {Junzuo Lai and Zhengan Huang and Man Ho Au and Xianping Mao}, title = {Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation}, journal = {Theor. Comput. Sci.}, volume = {847}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.09.031}, doi = {10.1016/J.TCS.2020.09.031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LaiHAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YangLHAXS20, author = {Rupeng Yang and Junzuo Lai and Zhengan Huang and Man Ho Au and Qiuliang Xu and Willy Susilo}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Possibility and Impossibility Results for Receiver Selective Opening Secure {PKE} in the Multi-challenge Setting}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {191--220}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_7}, doi = {10.1007/978-3-030-64837-4\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/YangLHAXS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangLHAXS20, author = {Rupeng Yang and Junzuo Lai and Zhengan Huang and Man Ho Au and Qiuliang Xu and Willy Susilo}, title = {Possibility and Impossibility Results for Receiver Selective Opening Secure {PKE} in the Multi-Challenge Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1080}, year = {2020}, url = {https://eprint.iacr.org/2020/1080}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangLHAXS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangLCAPL19, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, title = {Simulation-based selective opening security for receivers under chosen-ciphertext attacks}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1345--1371}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0530-1}, doi = {10.1007/S10623-018-0530-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuangLCAPL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HuangLCLX19, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Tong Li and Yang Xiang}, title = {Data security against receiver corruptions: {SOA} security for receivers from simulatable DEMs}, journal = {Inf. Sci.}, volume = {471}, pages = {201--215}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.08.059}, doi = {10.1016/J.INS.2018.08.059}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HuangLCLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HuangLCRJ19, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Muhammad Raees{-}ul{-}Haq and Liaoliang Jiang}, title = {Practical public key encryption with selective opening security for receivers}, journal = {Inf. Sci.}, volume = {478}, pages = {15--27}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.10.055}, doi = {10.1016/J.INS.2018.10.055}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HuangLCRJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YangALXY19, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Collusion Resistant Watermarking Schemes for Cryptographic Functionalities}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, pages = {371--398}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5\_14}, doi = {10.1007/978-3-030-34578-5\_14}, timestamp = {Tue, 26 Nov 2019 14:11:51 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/YangALXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/LiL19, author = {Peng Li and Junzuo Lai}, editor = {Joseph K. Liu and Xinyi Huang}, title = {LaT-Voting: Traceable Anonymous E-Voting on Blockchain}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {234--254}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_14}, doi = {10.1007/978-3-030-36938-5\_14}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/LiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CuiDLYN18, author = {Hui Cui and Robert H. Deng and Junzuo Lai and Xun Yi and Surya Nepal}, title = {An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited}, journal = {Comput. Networks}, volume = {133}, pages = {157--165}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.034}, doi = {10.1016/J.COMNET.2018.01.034}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CuiDLYN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YuAYLX18, author = {Zuoxia Yu and Man Ho Au and Rupeng Yang and Junzuo Lai and Qiuliang Xu}, editor = {Willy Susilo and Guomin Yang}, title = {Lattice-Based Universal Accumulator with Nonmembership Arguments}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {502--519}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_29}, doi = {10.1007/978-3-319-93638-3\_29}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YuAYLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LaiHAM18, author = {Junzuo Lai and Zhengan Huang and Man Ho Au and Xianping Mao}, editor = {Willy Susilo and Guomin Yang}, title = {Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {805--812}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_49}, doi = {10.1007/978-3-319-93638-3\_49}, timestamp = {Mon, 02 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LaiHAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuAYLX18, author = {Zuoxia Yu and Man Ho Au and Rupeng Yang and Junzuo Lai and Qiuliang Xu}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Achieving Flexibility for {ABE} with Outsourcing via Proxy Re-Encryption}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {659--672}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196557}, doi = {10.1145/3196494.3196557}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuAYLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LaiT18, author = {Junzuo Lai and Qiang Tang}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Making Any Attribute-Based Encryption Accountable, Efficiently}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {527--547}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_26}, doi = {10.1007/978-3-319-98989-1\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LaiT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MaoLWWL18, author = {Xianping Mao and Xuefeng Li and Xiaochuan Wu and Chuansheng Wang and Junzuo Lai}, editor = {Man Ho Au and Siu{-}Ming Yiu and Jin Li and Xiapu Luo and Cong Wang and Aniello Castiglione and Kamil Kluczniak}, title = {Anonymous Attribute-Based Conditional Proxy Re-encryption}, booktitle = {Network and System Security - 12th International Conference, {NSS} 2018, Hong Kong, China, August 27-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11058}, pages = {95--110}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02744-5\_7}, doi = {10.1007/978-3-030-02744-5\_7}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/MaoLWWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HuangLCAPL18, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {253--279}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_9}, doi = {10.1007/978-3-319-76578-5\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HuangLCAPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/YangALXY18, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, editor = {Dario Catalano and Roberto De Prisco}, title = {Unforgeable Watermarking Schemes with Public Extraction}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {63--80}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_4}, doi = {10.1007/978-3-319-98113-0\_4}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/YangALXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangLCAPL18, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, title = {Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2018}, url = {http://eprint.iacr.org/2018/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangLCAPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangLCAPL18a, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, title = {Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {755}, year = {2018}, url = {https://eprint.iacr.org/2018/755}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangLCAPL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiuLH17, author = {Jia{-}Nan Liu and Junzuo Lai and Xinyi Huang}, title = {Dual trapdoor identity-based encryption with keyword search}, journal = {Soft Comput.}, volume = {21}, number = {10}, pages = {2599--2607}, year = {2017}, url = {https://doi.org/10.1007/s00500-015-1960-6}, doi = {10.1007/S00500-015-1960-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LiuLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/MaLDD17, author = {Siqi Ma and Junzuo Lai and Robert H. Deng and Xuhua Ding}, title = {Adaptable key-policy attribute-based encryption with time interval}, journal = {Soft Comput.}, volume = {21}, number = {20}, pages = {6191--6200}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2177-z}, doi = {10.1007/S00500-016-2177-Z}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/MaLDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiLWZX17, author = {Yanling Li and Junzuo Lai and Chuansheng Wang and Jianghe Zhang and Jie Xiong}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Verifiable Range Query Processing for Cloud Computing}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {333--349}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_19}, doi = {10.1007/978-3-319-72359-4\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiLWZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LaiXWWL17, author = {Junzuo Lai and Jie Xiong and Chuansheng Wang and Guangzheng Wu and Yanling Li}, editor = {Tatsuaki Okamoto and Yong Yu and Man Ho Au and Yannan Li}, title = {A Secure Cloud Backup System with Deduplication and Assured Deletion}, booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10592}, pages = {74--83}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68637-0\_5}, doi = {10.1007/978-3-319-68637-0\_5}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LaiXWWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangALXY17, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, title = {Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak {PRF} with Efficient Protocols from {LWR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2017}, url = {http://eprint.iacr.org/2017/781}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangALXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangALXY17a, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, title = {Collusion Resistant Watermarking Schemes for Cryptographic Functionalities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1201}, year = {2017}, url = {http://eprint.iacr.org/2017/1201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangALXY17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangLXCL16, author = {Liangliang Wang and Junzuo Lai and Hu Xiong and Kefei Chen and Yu Long}, title = {Fuzzy certificateless signature}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3658--3669}, year = {2016}, url = {https://doi.org/10.1002/sec.1572}, doi = {10.1002/SEC.1572}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangLXCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuLDL16, author = {Lixian Liu and Junzuo Lai and Robert H. Deng and Yingjiu Li}, title = {Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {4897--4913}, year = {2016}, url = {https://doi.org/10.1002/sec.1663}, doi = {10.1002/SEC.1663}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuLDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaoLMCW16, author = {Xianping Mao and Junzuo Lai and Qixiang Mei and Kefei Chen and Jian Weng}, title = {Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {533--546}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2423669}, doi = {10.1109/TDSC.2015.2423669}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaoLMCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HouLL16, author = {Lin Hou and Junzuo Lai and Lixian Liu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Secret Handshakes with Dynamic Expressive Matching Policy}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {461--476}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_28}, doi = {10.1007/978-3-319-40253-6\_28}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HouLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiDMSW16, author = {Junzuo Lai and Robert H. Deng and Changshe Ma and Kouichi Sakurai and Jian Weng}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {CCA-Secure Keyed-Fully Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {70--98}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_4}, doi = {10.1007/978-3-662-49384-7\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LaiDMSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/CuiDWL16, author = {Hui Cui and Robert H. Deng and Guowei Wu and Junzuo Lai}, editor = {Liqun Chen and Jinguang Han}, title = {An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {19--38}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_2}, doi = {10.1007/978-3-319-47422-9\_2}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/CuiDWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaoLCWM15, author = {Xianping Mao and Junzuo Lai and Kefei Chen and Jian Weng and Qixiang Mei}, title = {Efficient revocable identity-based encryption from multilinear maps}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3511--3522}, year = {2015}, url = {https://doi.org/10.1002/sec.1274}, doi = {10.1002/SEC.1274}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MaoLCWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiDLWZ15, author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao}, title = {Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2015}, url = {http://eprint.iacr.org/2015/297}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiDLWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LaiLDWGY14, author = {Junzuo Lai and Yingjiu Li and Robert H. Deng and Jian Weng and Chaowen Guan and Qiang Yan}, title = {Towards semantically secure outsourcing of association rule mining on categorical data}, journal = {Inf. Sci.}, volume = {267}, pages = {267--286}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.01.040}, doi = {10.1016/J.INS.2014.01.040}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LaiLDWGY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaiDLW14, author = {Junzuo Lai and Robert H. Deng and Yingjiu Li and Jian Weng}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {239--248}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590334}, doi = {10.1145/2590296.2590334}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaiDLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LaiDPW14, author = {Junzuo Lai and Robert H. Deng and HweeHwa Pang and Jian Weng}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Verifiable Computation on Outsourced Encrypted Data}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {273--291}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_16}, doi = {10.1007/978-3-319-11203-9\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LaiDPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ShiLLDW14, author = {Jie Shi and Junzuo Lai and Yingjiu Li and Robert H. Deng and Jian Weng}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Authorized Keyword Search on Encrypted Data}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {419--435}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_24}, doi = {10.1007/978-3-319-11203-9\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ShiLLDW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiDLWZ14, author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {77--92}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_5}, doi = {10.1007/978-3-642-55220-5\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiDLWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LaiDGW13, author = {Junzuo Lai and Robert H. Deng and Chaowen Guan and Jian Weng}, title = {Attribute-Based Encryption With Verifiable Outsourced Decryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {8}, pages = {1343--1354}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2271848}, doi = {10.1109/TIFS.2013.2271848}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LaiDGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaiZDLC13, author = {Junzuo Lai and Xuhua Zhou and Robert Huijie Deng and Yingjiu Li and Kefei Chen}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Expressive search on encrypted data}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {243--252}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484345}, doi = {10.1145/2484313.2484345}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaiZDLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DingPL13, author = {Xuhua Ding and HweeHwa Pang and Junzuo Lai}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Verifiable and private top-k monitoring}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {553--558}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484388}, doi = {10.1145/2484313.2484388}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DingPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LaiDZW13, author = {Junzuo Lai and Robert H. Deng and Yunlei Zhao and Jian Weng}, editor = {Ed Dawson}, title = {Accountable Authority Identity-Based Encryption with Public Traceability}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {326--342}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_21}, doi = {10.1007/978-3-642-36095-4\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/LaiDZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LaiDW13, author = {Junzuo Lai and Xuhua Ding and Yongdong Wu}, editor = {Robert H. Deng and Tao Feng}, title = {Accountable Trapdoor Sanitizable Signatures}, booktitle = {Information Security Practice and Experience - 9th International Conference, {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7863}, pages = {117--131}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38033-4\_9}, doi = {10.1007/978-3-642-38033-4\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LaiDW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/LaiDYW13, author = {Junzuo Lai and Robert H. Deng and Yanjiang Yang and Jian Weng}, editor = {Zhenfu Cao and Fangguo Zhang}, title = {Adaptable Ciphertext-Policy Attribute-Based Encryption}, booktitle = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8365}, pages = {199--214}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04873-4\_12}, doi = {10.1007/978-3-319-04873-4\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pairing/LaiDYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaiDL12, author = {Junzuo Lai and Robert H. Deng and Yingjiu Li}, editor = {Heung Youl Youm and Yoojae Won}, title = {Expressive {CP-ABE} with partially hidden access structures}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {18--19}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414465}, doi = {10.1145/2414456.2414465}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaiDL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LaiKC11, author = {Junzuo Lai and Weidong Kou and Kefei Chen}, title = {Self-generated-certificate public key encryption without pairing and its application}, journal = {Inf. Sci.}, volume = {181}, number = {11}, pages = {2422--2435}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2011.01.037}, doi = {10.1016/J.INS.2011.01.037}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LaiKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LiuLD11, author = {Shengli Liu and Junzuo Lai and Robert H. Deng}, title = {General Construction of Chameleon All-But-One Trapdoor Functions}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {2/3}, pages = {74--88}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.08.31.074}, doi = {10.22667/JISIS.2011.08.31.074}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LiuLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiDLM11, author = {Yingjiu Li and Robert H. Deng and Junzuo Lai and Changshe Ma}, title = {On two {RFID} privacy notions and their relations}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {4}, pages = {30:1--30:23}, year = {2011}, url = {https://doi.org/10.1145/2043628.2043631}, doi = {10.1145/2043628.2043631}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LiDLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BaoDDLZ11, author = {Feng Bao and Robert H. Deng and Xuhua Ding and Junzuo Lai and Yunlei Zhao}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Hierarchical Identity-Based Chameleon Hash and Its Applications}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {201--219}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_12}, doi = {10.1007/978-3-642-21554-4\_12}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BaoDDLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LaiDL11, author = {Junzuo Lai and Robert H. Deng and Yingjiu Li}, editor = {Feng Bao and Jian Weng}, title = {Fully Secure Cipertext-Policy Hiding {CP-ABE}}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {24--39}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_3}, doi = {10.1007/978-3-642-21031-0\_3}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LaiDL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiDL11, author = {Junzuo Lai and Robert H. Deng and Shengli Liu}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {228--245}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_14}, doi = {10.1007/978-3-642-19379-8\_14}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaiDL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiuLD11, author = {Shengli Liu and Junzuo Lai and Robert H. Deng}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {General Construction of Chameleon All-But-One Trapdoor Functions}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {257--265}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_18}, doi = {10.1007/978-3-642-24316-5\_18}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiuLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LaiZDLK10, author = {Junzuo Lai and Wen Tao Zhu and Robert H. Deng and Shengli Liu and Weidong Kou}, title = {New Constructions for Identity-Based Unidirectional Proxy Re-Encryption}, journal = {J. Comput. Sci. Technol.}, volume = {25}, number = {4}, pages = {793--806}, year = {2010}, url = {https://doi.org/10.1007/s11390-010-9366-5}, doi = {10.1007/S11390-010-9366-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/LaiZDLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LaiDL10, author = {Junzuo Lai and Robert H. Deng and Yingjiu Li}, editor = {Jianying Zhou and Moti Yung}, title = {Revisiting Unpredictability-Based {RFID} Privacy Models}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {475--492}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_28}, doi = {10.1007/978-3-642-13708-2\_28}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LaiDL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LaiDLK10, author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Weidong Kou}, editor = {Josef Pieprzyk}, title = {Efficient CCA-Secure {PKE} from Identity-Based Techniques}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {132--147}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_10}, doi = {10.1007/978-3-642-11925-5\_10}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/LaiDLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WengDDCL09, author = {Jian Weng and Robert H. Deng and Xuhua Ding and Cheng{-}Kang Chu and Junzuo Lai}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Conditional proxy re-encryption secure against chosen-ciphertext attack}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {322--332}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533100}, doi = {10.1145/1533057.1533100}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WengDDCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LaiDLK09, author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Weidong Kou}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {RSA-Based Certificateless Public Key Encryption}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {24--34}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_3}, doi = {10.1007/978-3-642-00843-6\_3}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LaiDLK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengDLCLW08, author = {Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xu An Wang}, title = {Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2008}, url = {http://eprint.iacr.org/2008/509}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengDLCLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiK07, author = {Junzuo Lai and Weidong Kou}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Self-Generated-Certificate Public Key Encryption Without Pairing}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {476--489}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_31}, doi = {10.1007/978-3-540-71677-8\_31}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.