IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited H Jiang, Z Zhang, L Chen, H Wang, Z Ma Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 121* | 2018 |
Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension L Chen, Z Zhang, X Wang Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017 | 92 | 2017 |
Proof of storage-time: Efficiently checking continuous data availability G Ateniese, L Chen, M Etemad, Q Tang Network and Distributed Systems Security (NDSS) Symposium 2020, 2020 | 27 | 2020 |
CCA updatable encryption against malicious re-encryption attacks L Chen, Y Li, Q Tang Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 18 | 2020 |
People who live in glass houses should not throw stones: targeted opening message franking schemes L Chen, Q Tang Cryptology ePrint Archive, 2018 | 14 | 2018 |
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model H Jiang, Z Zhang, L Chen, H Wang, Z Ma revisited. Cryptology ePrint Archive, Report 2017/1096, 2017. https://eprint …, 2017 | 12 | 2017 |
On the hardness of the computational Ring-LWR problem and its applications L Chen, Z Zhang, Z Zhang Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 10 | 2018 |
Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise L Chen, Z Zhang International Conference on Provable Security, 285-304, 2017 | 8 | 2017 |
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts T Zhou, L Chen, X Che, W Liu, Z Zhang, X Yang Cryptology ePrint Archive, 2021 | 6 | 2021 |
{End-to-Same-End} Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage L Chen, YN Li, Q Tang, M Yung 31st USENIX Security Symposium (USENIX Security 22), 2353-2370, 2022 | 3 | 2022 |
Efficient Lattice-Based Threshold Signatures with Functional Interchangeability G Tang, B Pang, L Chen, Z Zhang IEEE Transactions on Information Forensics and Security, 2023 | 2 | 2023 |
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting) G Ateniese, L Chen, D Francati, D Papadopoulos, Q Tang IACR International Conference on Public-Key Cryptography, 63-93, 2023 | 2 | 2023 |
Multi-input laconic function evaluation B Pang, L Chen, X Fan, Q Tang Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020 | 1 | 2020 |
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography WH Bai, L Chen, Q Gao, Z Zhang 2024 IEEE Symposium on Security and Privacy (SP), 157-157, 2024 | | 2024 |
Efficient Secure Storage with Version Control and Key Rotation L Chen, H Guo, YN Li, Q Tang International Conference on the Theory and Application of Cryptology and …, 2023 | | 2023 |