翁健的论文列表 (共55条)
代表作 全部 期刊 会议 其他
2017
[1]   Jie Chen, Junqing Gong, Jian Weng .   Tightly Secure {IBE} Under Constant-Size Master Public Key.  20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017), Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I, 2017: 207--231.
2016
[2]   Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou .   Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.  Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016, 2016: 141--151.
[3]   Kai He, Jian Weng, Jianan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng .   Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.  Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016, 2016: 247--255.
[4]   Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng* .   CCA-Secure Keyed-Fully Homomorphic Encryption.  19th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2016), Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}, 2016: 70--98.
2015
[5]   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. .   (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond..  35th International Cryptology Conference (CRYPTO 2015), to appear(密码学顶级国际会议,中国计算机学会和中国密码学会推荐A类会议)
[6]   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng .   The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.  12th Theory of Cryptography Conference on Theory of Cryptography (TCC 2015), Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}, 2015: 7--35.
2014
[7]   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng .   The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions.  Theory of Cryptography Conference (TCC 2015), to appear (密码学顶级国际会议,CCF 推荐B类会议)
[8]   JunzuoLai, Robert H. Deng, Hweehwa Pang, JianWeng. .   Verifiable Computation on Outsourced Encrypted Data.  In 19th EuropeanSymposium on Research in Computr Security (ESORICS2014), 2014 (CCF推荐B类会议)
[9]   Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao .   Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.  33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2014),(密码学顶级国际会议,CCF推荐A类会议)
2013
[10]   Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng .   Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.  11th International Conference on Applied Cryptography and Network Security (ACNS 2013), LNCS 7954, pp. 186-201, Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini (Eds.), Banff, AB, Canada, June 25-28, 2013 (录用率:20%=38/192)
[11]   Shengli Liu, Jian Weng, Yunlei Zhao .   Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.  The Cryptographers' Track at the RSA Conference 2013 (CT-RSA 2013), LNCS 7779, Springer-Verlag, San Francisco,CA, USA, February 25-March 1, 2013 (密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用25篇论文)
[12]   Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng .   Accountable Authority Identity-Based Encryption with Public Traceability.  The Cryptographers' Track at the RSA Conference 2013 (CT-RSA 2013), LNCS 7779, Springer-Verlag, San Francisco,CA, USA, February 25-March 1, 2013 (密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用25篇论文)
2012
[13]   Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao .   Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. .  In Proc. of CT-RSA 2012, Orr Dunkelman (Ed.), Springer-Verlage, San Francisco, CA, USA, March 2012 (署名按姓氏首字母排序,密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用26篇论文,自2012年至今Google Scholar引用48次)
2011
[14]   Jian Weng, Yunlei Zhao, Goichiro Hanaoka .   On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010.  In: 14th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2011), LNCS 6571, pp. 284-295, Springer-Verlag, March 6-9, 2011, Taomina, Italy.(公钥密码学著名国际会议,CCF推荐B类会议,会议共录用28篇论文)
2010
[15]   Goichiro Hanaoka, Jian Weng .   Generic Constructions of Parallel Key-Insulated Encryption.  Juan Garay (Ed.): 7th Conference on Security and Cryptography for Networks (SCN 2010), LNCS 6280, Amalfi, Italy, September, 2010 (密码学著名国际会议,会议共录用27篇论文,署名按姓氏字母排序).
[16]   Sherman S.M. Chow, Jian Weng, Yanjiang Yang and Robert H. Deng. .   Efficient Unidirectional Proxy Re-Encryption..  D.J. Bernstein and T. Lange (Eds): AFRICACRYPT 2010, volume 6055 of Lecture Notes in Computer Science, pages 316-332. Springer, 2010. (Google Scholar引用195次)
2009
[17]   Yanjiang Yang, Feng Bao, Jian Weng. .   Private Handshakes with Optional Accountability.  34th Annual IEEE Conference on Local Computer Networks (LCN 2009), pp. 245-248, Zurich, Switzerland, October 2009
[18]   Yanjiang, Jianying Zhou, Jian Weng and Feng Bao .   A New Approach for Anonymous Password Authentication.  25th Annual Computer Security Application Conference (ACSAC’09), pp. 199-208, Honolulu, Hawaii, USA, 2009. (信息安全著名国际会议,CCF推荐B类会议, 录用率19%=44/228)
[19]   Jian Weng, Robert H. Deng, Chengkang Chu, Xuhua Ding, Junzuo Lai .   Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack.  Rei Safavi-Naini and Vijay Varadharajan (Ed.): ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2009), pp. 322-332, Sydney, Australia, ACM Press, March 2009(信息安全著名国际会议, 录用率22%=33/140, Google Scholar引用124次)
[20]   Cheng-Kang Chu, Jian Weng, Sherman S.M. Chow, and Jianying Zhou, Robert H. Deng .   Conditional Proxy Broadcast Re-Encryption..  Colin Boyd, Juan Manuel González Nieto (Eds.): Information Security and Privacy, 14th Australasian Conference on Information Security and Privacy (ACISP 2009), Brisbane, Australia, LNCS 5594, pp. 327–342, Springer-Verlag, 2009. (录用率28%=30/106, Google Scholar引用96次)
2008
[21]   Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen .   Chosen-Cipertext Secure Proxy Re-Encryption without Pairings.  M. Franklin and D. S. Wong (Eds.): In Proc. of the 7th International Conference on Cryptology and Network Security (CANS’08), LNCS 5539, pp.1-17, Springer-Verlag, 2008 (Google Scholar引用178次)
2006
[22]   Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma .   Identity-Based Parallel Key-Insulated Encryption without Random Oracles: Security Notions and Construction.  R. Barua and T. Lange (Eds.): IndoCrypt2006, Kolkata, India, LNCS 4329, pp. 409–423, December 2006. (录用率15%=29/186)
SCHOLAT.com 学者网
ABOUT US | SCHOLAT