Follow
Long Chen
Title
Cited by
Cited by
Year
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
H Jiang, Z Zhang, L Chen, H Wang, Z Ma
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
121*2018
Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension
L Chen, Z Zhang, X Wang
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
922017
Proof of storage-time: Efficiently checking continuous data availability
G Ateniese, L Chen, M Etemad, Q Tang
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
272020
CCA updatable encryption against malicious re-encryption attacks
L Chen, Y Li, Q Tang
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
182020
People who live in glass houses should not throw stones: targeted opening message franking schemes
L Chen, Q Tang
Cryptology ePrint Archive, 2018
142018
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model
H Jiang, Z Zhang, L Chen, H Wang, Z Ma
revisited. Cryptology ePrint Archive, Report 2017/1096, 2017. https://eprint …, 2017
122017
On the hardness of the computational Ring-LWR problem and its applications
L Chen, Z Zhang, Z Zhang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
102018
Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise
L Chen, Z Zhang
International Conference on Provable Security, 285-304, 2017
82017
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts
T Zhou, L Chen, X Che, W Liu, Z Zhang, X Yang
Cryptology ePrint Archive, 2021
62021
{End-to-Same-End} Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
L Chen, YN Li, Q Tang, M Yung
31st USENIX Security Symposium (USENIX Security 22), 2353-2370, 2022
32022
Efficient Lattice-Based Threshold Signatures with Functional Interchangeability
G Tang, B Pang, L Chen, Z Zhang
IEEE Transactions on Information Forensics and Security, 2023
22023
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting)
G Ateniese, L Chen, D Francati, D Papadopoulos, Q Tang
IACR International Conference on Public-Key Cryptography, 63-93, 2023
22023
Multi-input laconic function evaluation
B Pang, L Chen, X Fan, Q Tang
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
12020
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
WH Bai, L Chen, Q Gao, Z Zhang
2024 IEEE Symposium on Security and Privacy (SP), 157-157, 2024
2024
Efficient Secure Storage with Version Control and Key Rotation
L Chen, H Guo, YN Li, Q Tang
International Conference on the Theory and Application of Cryptology and …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–15