2017
[1]
Zijian Zhang, Zhan Qin, Liehuang Zhu, Jian Weng, Kui Ren
.
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017, 8(2): 619--626.
[2]
Zhe Liu, Jian Weng*, Zhi Hu, Hwajeong Seo
.
Efficient Elliptic Curve Cryptography for Embedded Devices.
ACM Trans. Embedded Comput. Syst., 2017, 16(2): 53:1--53:18.
[3]
Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert H. Deng
.
Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems.
IEEE Trans. Intelligent Transportation Systems, 2017, 18(4): 814--823.
2016
[4]
Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, Kui Ren
.
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multimedia, 2016, 18(10): 2002--2014.
[5]
Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou
.
Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016, 65(10): 3184--3195.
[6]
Kai He, Jian Weng, Robert H. Deng, Joseph K. Liu
.
On the security of two identity-based conditional proxy re-encryption schemes.
Theoretical Computer Science, 2016, 652: 18--27.
[7]
Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng
.
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Sec. Comput., 2016, 13(5): 533--546.
[8]
Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Jian Weng
.
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Information Forensics and Security, 2016, 11(11): 2401--2414.
[9]
Zhan Qin, Kui Ren, Ting Yu, Jian Weng
.
DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.
IEEE Trans. Multimedia, 2016, 18(5): 929--939.
2015
[10]
Jian Weng, Yunlei Zhao, Robert H Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai.
.
A Note on the Security of KHL Scheme..
Theoretical Computer Science. 2015, to appear.
[11]
Yu Yu, Xiangxue Li, Jian Weng.
.
Pseudorandom generatorsfrom regular one-way functions: New constructions with improved parameters..
Theoretical Computer Science, 569: 58-69, 2015 (CCF推荐B类期刊)
2014
[12]
Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou.
.
Verifiable Computation over Large Database with Incremental Updates..
In 19th EuropeanSymposium on Research in Computr Security (ESORICS2014), 2014 (CCF推荐B类会议)
[13]
Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng
.
Authorized Keyword Search on Encrypted Data.
In 19th EuropeanSymposium on Research in Computr Security (ESORICS2014), 2014 (CCF推荐B类会议)
[14]
Dehua Zhou, Chaowen Guan, Jian Weng, Robert H. Deng, Minrong Chen
.
On the unforgeability of an Improved Certificateless Signature Scheme in the Standard Model.
IET Information Security, Vol. 8, No. 5, pp. 273-276, 2014 (通讯作者,中国密码学会推荐B类期刊)
2013
[15]
Yu Yu and Xiangxue Liand Jian Weng.
.
Pseudorandom Generators fromRegular One-way Functions: New Constructions with Improved Parameters..
Accept to 19th Annual International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT 2013), K. Sako and P. Sarkar(Eds.), LNCS 8270, pp. 261–279,Spring-Verlag, 2013 (密码学顶级国际会议,中国密码学会推荐A类会议,CCF推荐B类会议)
[16]
Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng
.
Attribute-Based Encryption With Verifiable Outsourced Decryption.
IEEE Transactions on Information Forensics and Security, Vol. 8, no. 8, Pages 1343-1354, August 2013 (通讯作者,CCF推荐A类期刊,自2013年至今Google Scholar引用142次)
[17]
Dehua Zhou, Jian Weng, Chaowen Guan, Robert H. Deng, Minrong Chen, Kefei Chen
.
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
SCIENCE CHINA Information Sciences(中国科学-信息科学),57(7): 1-5, 2014 (CCF推荐B类期刊,通讯作者)
[18]
Xiangxue Li, Haifeng Qian, JianWeng, Yu Yu
.
Fully secure identity-based signcryption scheme withshorter signcryptext in the standard model.
Mathematical and Computer Modelling,Vol. 57, No. 3-4, pp. 503-511
[19]
Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang
.
Robustpassword changing and DoS resilience for human-centric passwordauthentication.
Security and Communication Networks, March 01, 2013
2012
[20]
Sherman S.M. Chow, Changshe Ma, Jian Weng
.
Zero-Knowledge Argument for Simultaneous Discrete Logarithms and its Application.
Algorithmica, 64(2): 246-266 (2012) (CCF推荐B类期刊, 署名按姓氏字母排序,通讯作者)
2011
[21]
Xu An Wang, Jian Weng, Xiaoyuan Yang, Minqing Zhang
.
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
Journal of System and Software, Volume 84, Issue 2, February 2011, Pages 219-225 (CCF推荐B类期刊,通讯作者,署名按姓氏字母排序)
[22]
Jian Weng, Guoxiang Yao, Robert H. Deng, Minrong Chen
.
Cryptanalysis of a Certificateless Signcryption Scheme in the Standard Model.
Information Sciences, 183(3): 661-667, 2011(CCF推荐B类期刊)
[23]
Xu An Wang, Jian Weng, Xiaoyuan Yang, Yanjiang Yang
.
Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Information Processing Letters, Volume 111, Issue 10, pp. 461-464, 2011. (通讯作者,署名按姓氏字母顺序)
2010
[24]
Jian Weng, Robert H Deng, Shengli Liu, Kefei Chen
.
Chosen-Ciphertext Secure Bidirectional Proxy Re-Encryption Schemes without Pairings.
Information Sciences, 180(24): 5077-5089, 2010(CCF推荐B类期刊)
[25]
Jian Weng, Minrong Chen., Kefei Chen, Robert H. Deng
.
Cryptanalysis of a hierarchical identity-based encryption scheme.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E93-A, No.4, pp. 854–856, April 2010
[26]
Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao
.
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles.
Science China:Information Sciences(中国科学:信息科学). Vol 53(3): 593-606, March 2010 (CCF推荐B类期刊,Google Scholar引用62次)
[27]
Changshe Ma, Jian Weng, Robert H. Deng and Yingjiu Li
.
Efficient Discrete Logarithm Based Multi-Signature Scheme in the Plain Public Key Model.
Designs, Codes and Cryptography. Vol 54(2):121-133, February 2010 (密码学著名国际期刊,CCF推荐B类期刊)
[28]
翁健,陈泯融,杨艳江,邓慧杰,陈克非,鲍丰
.
无需随机预言机的自适应攻陷模型下选择密文安全的单向代理重加密方案.
中国科学:信息科学,2010
2009
[29]
Jian Weng, Yanjiang Yang, Qiang Tang, Robet H. Deng and Feng Bao.
.
Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security..
Pierangela Samarati and Moti Yuang (Eds.): the 12th Information Security Conference (ISC 2009), LNCS 5735, pp. 151–166, Springer-Verlag, Pisa, Italy, September 2009. (录用率27%=29/105, Google Scholar引用77次)
2008
[30]
Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng and Weidong Qiu
.
Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Tal Malkin (Ed.): CT-RSA 2008, LNCS 4964, pp. 203-220, Springer-Verlage, San Francisco, CA, USA, April 2008.(密码学著名国际会议,会议共录用26篇论文)
[31]
Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
.
Identity-Based Parallel Key-Insulated Signature: Framework and Construction.
Journal of Research and Practice in Information Technology. Vol. 40(1): 55-68, February 2008
2007
[32]
Jian Weng, Shengli Liu, Kefei Chen
.
Pirate Decoder for the Broadcast Encryption Schemes from Crypto 2005.
Science in China Series F-Information Sciences (中国科学F辑—信息科学),Vol.50(3):318-323, June 2007(CCF推荐B类期刊)
2006
[33]
Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
.
Identity-Based Key-Insulated Signature with Secure Key-updates..
H. Lipmaa, M. Yung, and D. Lin (Eds.): Inscrypt 2006, LNCS 4318, pp.13–26, November 2006. (录用率10%=23/225).