Seguir
Jie Chen
Jie Chen
East China Normal University
Dirección de correo verificada de e.ntu.edu.sg - Página principal
Título
Citado por
Citado por
Año
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Annual International Conference on the Theory and Applications of …, 2015
2312015
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Annual Cryptology Conference, 435-460, 2013
228*2013
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
1312012
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
1102013
Shorter identity-based encryption via asymmetric pairings
J Chen, HW Lim, S Ling, H Wang, H Wee
Designs, codes and cryptography 73, 911-947, 2014
104*2014
Semi-adaptive attribute-based encryption and improved delegation for boolean formula
J Chen, H Wee
International Conference on Security and Cryptography for Networks, 277-297, 2014
802014
Unbounded ABE via bilinear entropy expansion, revisited
J Chen, J Gong, L Kowalczyk, H Wee
Annual International Conference on the Theory and Applications of …, 2018
762018
Forward secure public key encryption with keyword search for outsourced cloud storage
M Zeng, H Qian, J Chen, K Zhang
IEEE transactions on cloud computing 10 (1), 426-438, 2019
532019
Two-factor data access control with efficient revocation for multi-authority cloud storage systems
X Li, S Tang, L Xu, H Wang, J Chen
IEEE Access 5, 393-405, 2016
512016
Combined public-key schemes: The case of ABE and ABS
C Chen, J Chen, HW Lim, Z Zhang, D Feng
Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012
512012
Efficient public key encryption with equality test in the standard model
K Zhang, J Chen, HT Lee, H Qian, H Wang
Theoretical Computer Science 755, 65-80, 2019
492019
Extended nested dual system groups, revisited
J Gong, J Chen, X Dong, Z Cao, S Tang
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
402016
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
J Gong, X Dong, J Chen, Z Cao
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
392016
Tightly secure IBE under constant-size master public key
J Chen, J Gong, J Weng
IACR International Workshop on Public Key Cryptography, 207-231, 2017
282017
Doubly spatial encryption from DBDH
J Chen, H Wee
Theoretical Computer Science 543, 79-89, 2014
262014
Identity-based matchmaking encryption from standard assumptions
J Chen, Y Li, J Wen, J Weng
International Conference on the Theory and Application of Cryptology and …, 2022
242022
Improved inner-product encryption with adaptive security and full attribute-hiding
J Chen, J Gong, H Wee
International Conference on the Theory and Application of Cryptology and …, 2018
232018
ABE with tag made easy: Concise framework and new instantiations in prime-order groups
J Chen, J Gong
International Conference on the Theory and Application of Cryptology and …, 2017
212017
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
212016
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
212016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20