Seguir
Junqing Gong
Junqing Gong
Dirección de correo verificada de sei.ecnu.edu.cn - Página principal
Título
Citado por
Citado por
Año
Unbounded ABE via bilinear entropy expansion, revisited
J Chen, J Gong, L Kowalczyk, H Wee
Annual International Conference on the Theory and Applications of …, 2018
762018
Extended nested dual system groups, revisited
J Gong, J Chen, X Dong, Z Cao, S Tang
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
402016
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
J Gong, X Dong, J Chen, Z Cao
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
392016
Fully-secure and practical sanitizable signatures
J Gong, H Qian, Y Zhou
Information Security and Cryptology: 6th International Conference, Inscrypt …, 2011
302011
Functional Encryption for Attribute-Weighted Sums from k-Lin
M Abdalla, J Gong, H Wee
Annual International Cryptology Conference, 685-716, 2020
292020
Tightly secure IBE under constant-size master public key
J Chen, J Gong, J Weng
IACR International Workshop on Public Key Cryptography, 207-231, 2017
282017
Adaptively Secure ABE for DFA from k-Lin and More
J Gong, H Wee
Annual International Conference on the Theory and Applications of …, 2020
242020
ABE for DFA from k-Lin
J Gong, B Waters, H Wee
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
232019
Improved inner-product encryption with adaptive security and full attribute-hiding
J Chen, J Gong, H Wee
International Conference on the Theory and Application of Cryptology and …, 2018
232018
ABE with tag made easy: Concise framework and new instantiations in prime-order groups
J Chen, J Gong
International Conference on the Theory and Application of Cryptology and …, 2017
212017
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
212016
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
212016
Research advances on big data security and privacy preserving
Z CAO, X DONG, J ZHOU, JC Shen, JT Ning, JQ Gong
Journal of Computer Research and Development 53 (10), 2137-2151, 2016
172016
Improved anonymous broadcast encryptions: tight security and shorter ciphertext
J Li, J Gong
Applied Cryptography and Network Security: 16th International Conference …, 2018
152018
Extended dual system group and shorter unbounded hierarchical identity based encryption
J Gong, Z Cao, S Tang, J Chen
Designs, Codes and Cryptography 80, 525-559, 2016
152016
Anonymous password‐based key exchange with low resources consumption and better user‐friendliness
H Qian, J Gong, Y Zhou
Security and Communication Networks 5 (12), 1379-1393, 2012
152012
Privacy-preserving federated learning via functional encryption, revisited
Y Chang, K Zhang, J Gong, H Qian
IEEE Transactions on Information Forensics and Security 18, 1855-1869, 2023
142023
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
J Zhang, J Chen, J Gong, A Ge, C Ma
Designs, Codes and Cryptography 86, 1339-1366, 2018
92018
Simple and efficient FE for quadratic functions
J Gong, H Qian
Designs, Codes and Cryptography 89 (8), 1757-1786, 2021
82021
Registered abe via predicate encodings
Z Zhu, K Zhang, J Gong, H Qian
International Conference on the Theory and Application of Cryptology and …, 2023
62023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20