Follow
Junqing Gong
Junqing Gong
Verified email at sei.ecnu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Unbounded ABE via bilinear entropy expansion, revisited
J Chen, J Gong, L Kowalczyk, H Wee
Annual International Conference on the Theory and Applications of …, 2018
742018
Extended nested dual system groups, revisited
J Gong, J Chen, X Dong, Z Cao, S Tang
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
382016
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
J Gong, X Dong, J Chen, Z Cao
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
382016
Fully-secure and practical sanitizable signatures
J Gong, H Qian, Y Zhou
Information Security and Cryptology: 6th International Conference, Inscrypt …, 2011
302011
Functional Encryption for Attribute-Weighted Sums from k-Lin
M Abdalla, J Gong, H Wee
Annual International Cryptology Conference, 685-716, 2020
272020
Tightly secure IBE under constant-size master public key
J Chen, J Gong, J Weng
IACR International Workshop on Public Key Cryptography, 207-231, 2017
272017
Adaptively Secure ABE for DFA from k-Lin and More
J Gong, H Wee
Annual International Conference on the Theory and Applications of …, 2020
232020
ABE for DFA from k-Lin
J Gong, B Waters, H Wee
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
222019
Improved inner-product encryption with adaptive security and full attribute-hiding
J Chen, J Gong, H Wee
International Conference on the Theory and Application of Cryptology and …, 2018
222018
ABE with tag made easy: Concise framework and new instantiations in prime-order groups
J Chen, J Gong
International Conference on the Theory and Application of Cryptology and …, 2017
212017
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
212016
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
212016
Research advances on big data security and privacy preserving
Z CAO, X DONG, J ZHOU, JC Shen, JT Ning, JQ Gong
Journal of Computer Research and Development 53 (10), 2137-2151, 2016
172016
Improved anonymous broadcast encryptions: tight security and shorter ciphertext
J Li, J Gong
Applied Cryptography and Network Security: 16th International Conference …, 2018
152018
Extended dual system group and shorter unbounded hierarchical identity based encryption
J Gong, Z Cao, S Tang, J Chen
Designs, Codes and Cryptography 80, 525-559, 2016
152016
Anonymous password‐based key exchange with low resources consumption and better user‐friendliness
H Qian, J Gong, Y Zhou
Security and Communication Networks 5 (12), 1379-1393, 2012
152012
Privacy-preserving federated learning via functional encryption, revisited
Y Chang, K Zhang, J Gong, H Qian
IEEE Transactions on Information Forensics and Security 18, 1855-1869, 2023
112023
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
J Zhang, J Chen, J Gong, A Ge, C Ma
Designs, Codes and Cryptography 86, 1339-1366, 2018
92018
Simple and efficient FE for quadratic functions
J Gong, H Qian
Designs, Codes and Cryptography 89 (8), 1757-1786, 2021
82021
Registered abe via predicate encodings
Z Zhu, K Zhang, J Gong, H Qian
International Conference on the Theory and Application of Cryptology and …, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20