Suivre
Jie Chen
Jie Chen
East China Normal University
Adresse e-mail validée de e.ntu.edu.sg - Page d'accueil
Titre
Citée par
Citée par
Année
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Annual International Conference on the Theory and Applications of …, 2015
2462015
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Annual Cryptology Conference, 435-460, 2013
238*2013
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
1332012
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
1142013
Shorter identity-based encryption via asymmetric pairings
J Chen, HW Lim, S Ling, H Wang, H Wee
Designs, codes and cryptography 73, 911-947, 2014
110*2014
Unbounded ABE via bilinear entropy expansion, revisited
J Chen, J Gong, L Kowalczyk, H Wee
Annual International Conference on the Theory and Applications of …, 2018
842018
Semi-adaptive attribute-based encryption and improved delegation for boolean formula
J Chen, H Wee
International Conference on Security and Cryptography for Networks, 277-297, 2014
842014
Forward secure public key encryption with keyword search for outsourced cloud storage
M Zeng, H Qian, J Chen, K Zhang
IEEE transactions on cloud computing 10 (1), 426-438, 2019
602019
Two-factor data access control with efficient revocation for multi-authority cloud storage systems
X Li, S Tang, L Xu, H Wang, J Chen
IEEE Access 5, 393-405, 2016
532016
Combined public-key schemes: The case of ABE and ABS
C Chen, J Chen, HW Lim, Z Zhang, D Feng
Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012
532012
Efficient public key encryption with equality test in the standard model
K Zhang, J Chen, HT Lee, H Qian, H Wang
Theoretical Computer Science 755, 65-80, 2019
512019
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
J Gong, X Dong, J Chen, Z Cao
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
432016
Extended nested dual system groups, revisited
J Gong, J Chen, X Dong, Z Cao, S Tang
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
422016
Tightly secure IBE under constant-size master public key
J Chen, J Gong, J Weng
IACR International Workshop on Public Key Cryptography, 207-231, 2017
302017
Identity-based matchmaking encryption from standard assumptions
J Chen, Y Li, J Wen, J Weng
International Conference on the Theory and Application of Cryptology and …, 2022
272022
Doubly spatial encryption from DBDH
J Chen, H Wee
Theoretical Computer Science 543, 79-89, 2014
262014
Improved inner-product encryption with adaptive security and full attribute-hiding
J Chen, J Gong, H Wee
International Conference on the Theory and Application of Cryptology and …, 2018
252018
ABE with tag made easy: Concise framework and new instantiations in prime-order groups
J Chen, J Gong
International Conference on the Theory and Application of Cryptology and …, 2017
252017
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
242016
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
222016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20