关注
junzuo lai
junzuo lai
Professor, Department of Computer Science, Jinan University
没有经过验证的电子邮件地址
标题
引用次数
引用次数
年份
Attribute-based encryption with verifiable outsourced decryption
J Lai, RH Deng, C Guan, J Weng
IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013
5722013
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th international symposium on information, computer, and …, 2009
2652009
Fully secure cipertext-policy hiding CP-ABE
J Lai, RH Deng, Y Li
Information Security Practice and Experience: 7th International Conference …, 2011
2262011
Expressive CP-ABE with partially hidden access structures
J Lai, RH Deng, Y Li
Proceedings of the 7th ACM symposium on information, computer and …, 2012
2232012
Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption
X Mao, J Lai, Q Mei, K Chen, J Weng
IEEE Transactions on dependable and secure computing 13 (5), 533-546, 2015
1302015
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited
H Cui, RH Deng, J Lai, X Yi, S Nepal
Computer Networks 133, 157-165, 2018
842018
Authorized keyword search on encrypted data
J Shi, J Lai, Y Li, RH Deng, J Weng
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
792014
Expressive search on encrypted data
J Lai, X Zhou, RH Deng, Y Li, K Chen
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
782013
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures
H Cui, RH Deng, G Wu, J Lai
Provable Security: 10th International Conference, ProvSec 2016, Nanjing …, 2016
712016
Self-generated-certificate public key encryption without pairing
J Lai, W Kou
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
652007
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption
J Lai, RH Deng, Y Li, J Weng
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
612014
Efficient CCA-secure PKE from identity-based techniques
J Lai, RH Deng, S Liu, W Kou
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
572010
Verifiable computation on outsourced encrypted data
J Lai, RH Deng, HH Pang, J Weng
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
492014
Adaptable ciphertext-policy attribute-based encryption
J Lai, RH Deng, Y Yang, J Weng
Pairing-Based Cryptography–Pairing 2013: 6th International Conference …, 2014
422014
Identity-based encryption secure against selective opening chosen-ciphertext attack
J Lai, RH Deng, S Liu, J Weng, Y Zhao
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
362014
Towards semantically secure outsourcing of association rule mining on categorical data
J Lai, Y Li, RH Deng, J Weng, C Guan, Q Yan
Information Sciences 267, 267-286, 2014
322014
Ciphertext‐policy attribute‐based encryption with partially hidden access structure and its application to privacy‐preserving electronic medical record system in cloud environment
L Liu, J Lai, RH Deng, Y Li
Security and Communication Networks 9 (18), 4897-4913, 2016
312016
Making Any Attribute-Based Encryption Accountable, Efficiently
J Lai, Q Tang
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
282018
CCA-Secure Keyed-Fully Homomorphic Encryption
J Lai, RH Deng, C Ma, K Sakurai, J Weng
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
282016
Self-generated-certificate public key encryption without pairing and its application
J Lai, W Kou, K Chen
Information Sciences 181 (11), 2422-2435, 2011
282011
系统目前无法执行此操作,请稍后再试。
文章 1–20