Unbounded ABE via bilinear entropy expansion, revisited J Chen, J Gong, L Kowalczyk, H Wee Annual International Conference on the Theory and Applications of …, 2018 | 76 | 2018 |
Extended nested dual system groups, revisited J Gong, J Chen, X Dong, Z Cao, S Tang Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 40 | 2016 |
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting J Gong, X Dong, J Chen, Z Cao Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 39 | 2016 |
Fully-secure and practical sanitizable signatures J Gong, H Qian, Y Zhou Information Security and Cryptology: 6th International Conference, Inscrypt …, 2011 | 30 | 2011 |
Functional Encryption for Attribute-Weighted Sums from k-Lin M Abdalla, J Gong, H Wee Annual International Cryptology Conference, 685-716, 2020 | 29 | 2020 |
Tightly secure IBE under constant-size master public key J Chen, J Gong, J Weng IACR International Workshop on Public Key Cryptography, 207-231, 2017 | 28 | 2017 |
Adaptively Secure ABE for DFA from k-Lin and More J Gong, H Wee Annual International Conference on the Theory and Applications of …, 2020 | 24 | 2020 |
Improved inner-product encryption with adaptive security and full attribute-hiding J Chen, J Gong, H Wee International Conference on the Theory and Application of Cryptology and …, 2018 | 24 | 2018 |
ABE for DFA from k-Lin J Gong, B Waters, H Wee Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 23 | 2019 |
ABE with tag made easy: Concise framework and new instantiations in prime-order groups J Chen, J Gong International Conference on the Theory and Application of Cryptology and …, 2017 | 21 | 2017 |
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently J Ning, Z Cao, X Dong, J Gong, J Chen European Symposium on Research in Computer Security, 551-569, 2016 | 21 | 2016 |
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 21 | 2016 |
Research advances on big data security and privacy preserving Z CAO, X DONG, J ZHOU, JC Shen, JT Ning, JQ Gong Journal of Computer Research and Development 53 (10), 2137-2151, 2016 | 17 | 2016 |
Privacy-preserving federated learning via functional encryption, revisited Y Chang, K Zhang, J Gong, H Qian IEEE Transactions on Information Forensics and Security 18, 1855-1869, 2023 | 16 | 2023 |
Improved anonymous broadcast encryptions: tight security and shorter ciphertext J Li, J Gong Applied Cryptography and Network Security: 16th International Conference …, 2018 | 16 | 2018 |
Extended dual system group and shorter unbounded hierarchical identity based encryption J Gong, Z Cao, S Tang, J Chen Designs, Codes and Cryptography 80, 525-559, 2016 | 15 | 2016 |
Anonymous password‐based key exchange with low resources consumption and better user‐friendliness H Qian, J Gong, Y Zhou Security and Communication Networks 5 (12), 1379-1393, 2012 | 15 | 2012 |
Simple and efficient FE for quadratic functions J Gong, H Qian Designs, Codes and Cryptography 89 (8), 1757-1786, 2021 | 9 | 2021 |
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings J Zhang, J Chen, J Gong, A Ge, C Ma Designs, Codes and Cryptography 86, 1339-1366, 2018 | 9 | 2018 |
Registered abe via predicate encodings Z Zhu, K Zhang, J Gong, H Qian International Conference on the Theory and Application of Cryptology and …, 2023 | 6 | 2023 |