What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jie Chen
Google Scholar
ORCID:
0000-0001-6757-6416
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Proofs of Retrievability With Public Verifiability From Lattices.
Miaomiao Tian
Chuang Gao
Long Chen
Hong Zhong
Jie Chen
2025
journals/tifs
MuseME: Multi-User Secure and Efficient Matchmaking Encryption for Mobile Devices.
Jiayun Yan
Yunhao Ling
Jie Chen
Haifeng Qian
2025
conf/icics
Multi-signer Locally Verifiable Aggregate Signature from (Leveled) Multilinear Maps.
Yuchen Yang
Jie Chen
Qiaohan Chu
Qiuyan Du
Luping Wang
2024
conf/provsec
PPA-DCA: A Privacy-Preserving and Accountable Data Collection and Analysis Scheme Using Decentralized Multi-client Functional Encryption.
Meixin Chen
Jie Chen
Guang Zhang
Qiaohan Chu
2024
conf/pkc
Registered Attribute-Based Signature.
Yijian Zhang
Jun Zhao
Ziqi Zhu
Junqing Gong
Jie Chen
2024
conf/pkc
Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions.
Yunhao Ling
Kai Zhang
Jie Chen
Qiong Huang
Haifeng Qian
2023
conf/asiacrypt
Improved Fully Adaptive Decentralized MA-ABE for NC1 from MDDH.
Jie Chen
Qiaohan Chu
Ying Gao
Jianting Ning
Luping Wang
2022
conf/asiacrypt
Identity-Based Matchmaking Encryption from Standard Assumptions.
Jie Chen
Yu Li
Jinming Wen
Jian Weng
2021
conf/pkc
Master-Key KDM-Secure ABE via Predicate Encoding.
Shengyuan Feng
Junqing Gong
Jie Chen
2018
conf/eurocrypt
Unbounded ABE via Bilinear Entropy Expansion, Revisited.
Jie Chen
Junqing Gong
Lucas Kowalczyk
Hoeteck Wee
2018
conf/asiacrypt
Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding.
Jie Chen
Junqing Gong
Hoeteck Wee
2017
conf/pkc
Tightly Secure IBE Under Constant-Size Master Public Key.
Jie Chen
Junqing Gong
Jian Weng
2017
conf/asiacrypt
ABE with Tag Made Easy - Concise Framework and New Instantiations in Prime-Order Groups.
Jie Chen
Junqing Gong
2016
conf/ccs
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Kai Zhang
Junqing Gong
Shaohua Tang
Jie Chen
Xiangxue Li
Haifeng Qian
Zhenfu Cao
2016
conf/esorics
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Jianting Ning
Zhenfu Cao
Xiaolei Dong
Junqing Gong
Jie Chen
2016
conf/pkc
Extended Nested Dual System Groups, Revisited.
Junqing Gong
Jie Chen
Xiaolei Dong
Zhenfu Cao
Shaohua Tang
2016
conf/asiacrypt
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
Junqing Gong
Xiaolei Dong
Jie Chen
Zhenfu Cao
2015
conf/eurocrypt
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings.
Jie Chen
Romain Gay
Hoeteck Wee
2013
conf/crypto
Fully, (Almost) Tightly Secure IBE and Dual System Groups.
Jie Chen
Hoeteck Wee
2013
conf/ctrsa
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Cheng Chen
Jie Chen
Hoon Wei Lim
Zhenfeng Zhang
Dengguo Feng
San Ling
Huaxiong Wang
2012
conf/acisp
Revocable Identity-Based Encryption from Lattices.
Jie Chen
Hoon Wei Lim
San Ling
Huaxiong Wang
Khoa Nguyen
2012
conf/provsec
Combined Public-Key Schemes: The Case of ABE and ABS.
Cheng Chen
Jie Chen
Hoon Wei Lim
Zhenfeng Zhang
Dengguo Feng
Coauthors
Cheng Chen
(2)
Chuang Gao
(1)
Dengguo Feng
(2)
Guang Zhang
(1)
Haifeng Qian
(3)
Hoeteck Wee
(4)
Hong Zhong
(1)
Hoon Wei Lim
(3)
Huaxiong Wang
(2)
Jian Weng
(2)
Jianting Ning
(2)
Jiayun Yan
(1)
Jie Chen
(22)
Jinming Wen
(1)
Jun Zhao
(1)
Junqing Gong
(10)
Kai Zhang
(2)
Khoa Nguyen
(1)
Long Chen
(1)
Lucas Kowalczyk
(1)
Luping Wang
(2)
Meixin Chen
(1)
Miaomiao Tian
(1)
Qiaohan Chu
(3)
Qiong Huang
(1)
Qiuyan Du
(1)
Romain Gay
(1)
San Ling
(2)
Shaohua Tang
(2)
Shengyuan Feng
(1)
Xiangxue Li
(1)
Xiaolei Dong
(3)
Yijian Zhang
(1)
Ying Gao
(1)
Yu Li
(1)
Yuchen Yang
(1)
Yunhao Ling
(2)
Zhenfeng Zhang
(2)
Zhenfu Cao
(4)
Ziqi Zhu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to