Attribute-based encryption with verifiable outsourced decryption J Lai, RH Deng, C Guan, J Weng IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013 | 572 | 2013 |
Conditional proxy re-encryption secure against chosen-ciphertext attack J Weng, RH Deng, X Ding, CK Chu, J Lai Proceedings of the 4th international symposium on information, computer, and …, 2009 | 265 | 2009 |
Fully secure cipertext-policy hiding CP-ABE J Lai, RH Deng, Y Li Information Security Practice and Experience: 7th International Conference …, 2011 | 226 | 2011 |
Expressive CP-ABE with partially hidden access structures J Lai, RH Deng, Y Li Proceedings of the 7th ACM symposium on information, computer and …, 2012 | 223 | 2012 |
Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption X Mao, J Lai, Q Mei, K Chen, J Weng IEEE Transactions on dependable and secure computing 13 (5), 533-546, 2015 | 130 | 2015 |
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited H Cui, RH Deng, J Lai, X Yi, S Nepal Computer Networks 133, 157-165, 2018 | 84 | 2018 |
Authorized keyword search on encrypted data J Shi, J Lai, Y Li, RH Deng, J Weng Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 79 | 2014 |
Expressive search on encrypted data J Lai, X Zhou, RH Deng, Y Li, K Chen Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 78 | 2013 |
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures H Cui, RH Deng, G Wu, J Lai Provable Security: 10th International Conference, ProvSec 2016, Nanjing …, 2016 | 71 | 2016 |
Self-generated-certificate public key encryption without pairing J Lai, W Kou Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007 | 65 | 2007 |
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption J Lai, RH Deng, Y Li, J Weng Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 61 | 2014 |
Efficient CCA-secure PKE from identity-based techniques J Lai, RH Deng, S Liu, W Kou Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010 | 57 | 2010 |
Verifiable computation on outsourced encrypted data J Lai, RH Deng, HH Pang, J Weng Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 49 | 2014 |
Adaptable ciphertext-policy attribute-based encryption J Lai, RH Deng, Y Yang, J Weng Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014 | 42 | 2014 |
Identity-based encryption secure against selective opening chosen-ciphertext attack J Lai, RH Deng, S Liu, J Weng, Y Zhao Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 36 | 2014 |
Towards semantically secure outsourcing of association rule mining on categorical data J Lai, Y Li, RH Deng, J Weng, C Guan, Q Yan Information Sciences 267, 267-286, 2014 | 32 | 2014 |
Ciphertext‐policy attribute‐based encryption with partially hidden access structure and its application to privacy‐preserving electronic medical record system in cloud environment L Liu, J Lai, RH Deng, Y Li Security and Communication Networks 9 (18), 4897-4913, 2016 | 31 | 2016 |
Making Any Attribute-Based Encryption Accountable, Efficiently J Lai, Q Tang Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 28 | 2018 |
CCA-Secure Keyed-Fully Homomorphic Encryption J Lai, RH Deng, C Ma, K Sakurai, J Weng Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 28 | 2016 |
Self-generated-certificate public key encryption without pairing and its application J Lai, W Kou, K Chen Information Sciences 181 (11), 2422-2435, 2011 | 28 | 2011 |