[1]
Jie Chen, Junqing Gong, Jian Weng
.
Tightly Secure {IBE} Under Constant-Size Master Public Key.
20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017), Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I, 2017: 207--231.
[4]
Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng*
.
CCA-Secure Keyed-Fully Homomorphic Encryption.
19th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2016), Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}, 2016: 70--98.
[10]
Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng
.
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013), LNCS 7954, pp. 186-201, Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini (Eds.), Banff, AB, Canada, June 25-28, 2013 (录用率:20%=38/192)
[12]
Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng
.
Accountable Authority Identity-Based Encryption with Public Traceability.
The Cryptographers' Track at the RSA Conference 2013 (CT-RSA 2013), LNCS 7779, Springer-Verlag, San Francisco,CA, USA, February 25-March 1, 2013 (密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用25篇论文)
2012
[13]
Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao
.
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. .
In Proc. of CT-RSA 2012, Orr Dunkelman (Ed.), Springer-Verlage, San Francisco, CA, USA, March 2012 (署名按姓氏首字母排序,密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用26篇论文,自2012年至今Google Scholar引用48次)
2011
[14]
Jian Weng, Yunlei Zhao, Goichiro Hanaoka
.
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010.
In: 14th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2011), LNCS 6571, pp. 284-295, Springer-Verlag, March 6-9, 2011, Taomina, Italy.(公钥密码学著名国际会议,CCF推荐B类会议,会议共录用28篇论文)
2010
[15]
Goichiro Hanaoka, Jian Weng
.
Generic Constructions of Parallel Key-Insulated Encryption.
Juan Garay (Ed.): 7th Conference on Security and Cryptography for Networks (SCN 2010), LNCS 6280, Amalfi, Italy, September, 2010 (密码学著名国际会议,会议共录用27篇论文,署名按姓氏字母排序).
[16]
Sherman S.M. Chow, Jian Weng, Yanjiang Yang and Robert H. Deng.
.
Efficient Unidirectional Proxy Re-Encryption..
D.J. Bernstein and T. Lange (Eds): AFRICACRYPT 2010, volume 6055 of Lecture Notes in Computer Science, pages 316-332. Springer, 2010. (Google Scholar引用195次)
2009
[17]
Yanjiang Yang, Feng Bao, Jian Weng.
.
Private Handshakes with Optional Accountability.
34th Annual IEEE Conference on Local Computer Networks (LCN 2009), pp. 245-248, Zurich, Switzerland, October 2009
[18]
Yanjiang, Jianying Zhou, Jian Weng and Feng Bao
.
A New Approach for Anonymous Password Authentication.
25th Annual Computer Security Application Conference (ACSAC’09), pp. 199-208, Honolulu, Hawaii, USA, 2009. (信息安全著名国际会议,CCF推荐B类会议, 录用率19%=44/228)
[19]
Jian Weng, Robert H. Deng, Chengkang Chu, Xuhua Ding, Junzuo Lai
.
Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack.
Rei Safavi-Naini and Vijay Varadharajan (Ed.): ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2009), pp. 322-332, Sydney, Australia, ACM Press, March 2009(信息安全著名国际会议, 录用率22%=33/140, Google Scholar引用124次)
[20]
Cheng-Kang Chu, Jian Weng, Sherman S.M. Chow, and Jianying Zhou, Robert H. Deng
.
Conditional Proxy Broadcast Re-Encryption..
Colin Boyd, Juan Manuel González Nieto (Eds.): Information Security and Privacy, 14th Australasian Conference on Information Security and Privacy (ACISP 2009), Brisbane, Australia, LNCS 5594, pp. 327–342, Springer-Verlag, 2009. (录用率28%=30/106, Google Scholar引用96次)
2008
[21]
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
.
Chosen-Cipertext Secure Proxy Re-Encryption without Pairings.
M. Franklin and D. S. Wong (Eds.): In Proc. of the 7th International Conference on Cryptology and Network Security (CANS’08), LNCS 5539, pp.1-17, Springer-Verlag, 2008 (Google Scholar引用178次)