Junqing Gong
Junqing Gong
Verified email at ens.fr - Homepage
Cited by
Cited by
Extended nested dual system groups, revisited
J Gong, J Chen, X Dong, Z Cao, S Tang
Public-Key Cryptography–PKC 2016, 133-163, 2016
Fully-secure and practical sanitizable signatures
J Gong, H Qian, Y Zhou
International Conference on Information Security and Cryptology, 300-317, 2010
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
J Gong, X Dong, J Chen, Z Cao
International Conference on the Theory and Application of Cryptology and …, 2016
Unbounded ABE via bilinear entropy expansion, revisited
J Chen, J Gong, L Kowalczyk, H Wee
Annual International Conference on the Theory and Applications of …, 2018
Tightly secure IBE under constant-size master public key
J Chen, J Gong, J Weng
IACR International Workshop on Public Key Cryptography, 207-231, 2017
Anonymous password‐based key exchange with low resources consumption and better user‐friendliness
H Qian, J Gong, Y Zhou
Security and Communication Networks 5 (12), 1379-1393, 2012
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
ABE for DFA from k-Lin
J Gong, B Waters, H Wee
Annual International Cryptology Conference, 732-764, 2019
ABE with tag made easy
J Chen, J Gong
International Conference on the Theory and Application of Cryptology and …, 2017
Improved inner-product encryption with adaptive security and full attribute-hiding
J Chen, J Gong, H Wee
International Conference on the Theory and Application of Cryptology and …, 2018
Extended dual system group and shorter unbounded hierarchical identity based encryption
J Gong, Z Cao, S Tang, J Chen
Designs, Codes and Cryptography 80 (3), 525-559, 2016
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
J Zhang, J Chen, J Gong, A Ge, C Ma
Designs, Codes and Cryptography 86 (6), 1339-1366, 2018
Compact IBBE and Fuzzy IBE from simple assumptions
J Gong, B Libert, SC Ramanna
International Conference on Security and Cryptography for Networks, 563-582, 2018
Almost-Tight Identity Based Encryption Against Selective Opening Attack
J Gong, X Dong, Z Cao, J Chen
The Computer Journal 59 (11), 1669-1688, 2016
Efficient sanitizable signature schemes with full privacy
JQ Gong, HF Qian
Application Research of Computers, 89, 2011
Improved Anonymous Broadcast Encryptions
J Li, J Gong
International Conference on Applied Cryptography and Network Security, 497-515, 2018
Adaptively Secure ABE for DFA from k-Lin and More
J Gong, H Wee
The system can't perform the operation now. Try again later.
Articles 1–18