Improved dual system ABE in prime-order groups via predicate encodings J Chen, R Gay, H Wee Annual International Conference on the Theory and Applications of …, 2015 | 250 | 2015 |
Fully,(almost) tightly secure IBE and dual system groups J Chen, H Wee Annual Cryptology Conference, 435-460, 2013 | 241* | 2013 |
Revocable identity-based encryption from lattices J Chen, HW Lim, S Ling, H Wang, K Nguyen Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 136 | 2012 |
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013 | 116 | 2013 |
Shorter identity-based encryption via asymmetric pairings J Chen, HW Lim, S Ling, H Wang, H Wee Designs, codes and cryptography 73, 911-947, 2014 | 113* | 2014 |
Unbounded ABE via bilinear entropy expansion, revisited J Chen, J Gong, L Kowalczyk, H Wee Annual International Conference on the Theory and Applications of …, 2018 | 86 | 2018 |
Semi-adaptive attribute-based encryption and improved delegation for boolean formula J Chen, H Wee International Conference on Security and Cryptography for Networks, 277-297, 2014 | 85 | 2014 |
Forward secure public key encryption with keyword search for outsourced cloud storage M Zeng, H Qian, J Chen, K Zhang IEEE transactions on cloud computing 10 (1), 426-438, 2019 | 61 | 2019 |
Two-factor data access control with efficient revocation for multi-authority cloud storage systems X Li, S Tang, L Xu, H Wang, J Chen IEEE Access 5, 393-405, 2016 | 54 | 2016 |
Combined public-key schemes: The case of ABE and ABS C Chen, J Chen, HW Lim, Z Zhang, D Feng Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012 | 53 | 2012 |
Efficient public key encryption with equality test in the standard model K Zhang, J Chen, HT Lee, H Qian, H Wang Theoretical Computer Science 755, 65-80, 2019 | 52 | 2019 |
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting J Gong, X Dong, J Chen, Z Cao Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 45 | 2016 |
Extended nested dual system groups, revisited J Gong, J Chen, X Dong, Z Cao, S Tang Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 43 | 2016 |
Tightly secure IBE under constant-size master public key J Chen, J Gong, J Weng IACR International Workshop on Public Key Cryptography, 207-231, 2017 | 31 | 2017 |
Identity-based matchmaking encryption from standard assumptions J Chen, Y Li, J Wen, J Weng International Conference on the Theory and Application of Cryptology and …, 2022 | 29 | 2022 |
Improved inner-product encryption with adaptive security and full attribute-hiding J Chen, J Gong, H Wee International Conference on the Theory and Application of Cryptology and …, 2018 | 26 | 2018 |
Doubly spatial encryption from DBDH J Chen, H Wee Theoretical Computer Science 543, 79-89, 2014 | 26 | 2014 |
ABE with tag made easy: Concise framework and new instantiations in prime-order groups J Chen, J Gong International Conference on the Theory and Application of Cryptology and …, 2017 | 25 | 2017 |
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently J Ning, Z Cao, X Dong, J Gong, J Chen European Symposium on Research in Computer Security, 551-569, 2016 | 24 | 2016 |
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 22 | 2016 |