[2]
Jie Chen, Junqing Gong, Jian Weng
.
Tightly Secure {IBE} Under Constant-Size Master Public Key.
20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017), Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I, 2017: 207--231.
[13]
Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng*
.
CCA-Secure Keyed-Fully Homomorphic Encryption.
19th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2016), Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}, 2016: 70--98.
2015
[14]
Jian Weng, Yunlei Zhao, Robert H Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai.
.
A Note on the Security of KHL Scheme..
Theoretical Computer Science. 2015, to appear.
[21]
Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng
.
Authorized Keyword Search on Encrypted Data.
In 19th EuropeanSymposium on Research in Computr Security (ESORICS2014), 2014 (CCF推荐B类会议)
[25]
Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng
.
Attribute-Based Encryption With Verifiable Outsourced Decryption.
IEEE Transactions on Information Forensics and Security, Vol. 8, no. 8, Pages 1343-1354, August 2013 (通讯作者,CCF推荐A类期刊,自2013年至今Google Scholar引用142次)
[27]
Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng
.
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
11th International Conference on Applied Cryptography and Network Security (ACNS 2013), LNCS 7954, pp. 186-201, Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini (Eds.), Banff, AB, Canada, June 25-28, 2013 (录用率:20%=38/192)
[30]
Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng
.
Accountable Authority Identity-Based Encryption with Public Traceability.
The Cryptographers' Track at the RSA Conference 2013 (CT-RSA 2013), LNCS 7779, Springer-Verlag, San Francisco,CA, USA, February 25-March 1, 2013 (密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用25篇论文)
[32]
Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao
.
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. .
In Proc. of CT-RSA 2012, Orr Dunkelman (Ed.), Springer-Verlage, San Francisco, CA, USA, March 2012 (署名按姓氏首字母排序,密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用26篇论文,自2012年至今Google Scholar引用48次)
[34]
Jian Weng, Yunlei Zhao, Goichiro Hanaoka
.
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010.
In: 14th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2011), LNCS 6571, pp. 284-295, Springer-Verlag, March 6-9, 2011, Taomina, Italy.(公钥密码学著名国际会议,CCF推荐B类会议,会议共录用28篇论文)
[39]
Goichiro Hanaoka, Jian Weng
.
Generic Constructions of Parallel Key-Insulated Encryption.
Juan Garay (Ed.): 7th Conference on Security and Cryptography for Networks (SCN 2010), LNCS 6280, Amalfi, Italy, September, 2010 (密码学著名国际会议,会议共录用27篇论文,署名按姓氏字母排序).
[40]
Sherman S.M. Chow, Jian Weng, Yanjiang Yang and Robert H. Deng.
.
Efficient Unidirectional Proxy Re-Encryption..
D.J. Bernstein and T. Lange (Eds): AFRICACRYPT 2010, volume 6055 of Lecture Notes in Computer Science, pages 316-332. Springer, 2010. (Google Scholar引用195次)
[45]
Jian Weng, Yanjiang Yang, Qiang Tang, Robet H. Deng and Feng Bao.
.
Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security..
Pierangela Samarati and Moti Yuang (Eds.): the 12th Information Security Conference (ISC 2009), LNCS 5735, pp. 151–166, Springer-Verlag, Pisa, Italy, September 2009. (录用率27%=29/105, Google Scholar引用77次)
[46]
Yanjiang Yang, Feng Bao, Jian Weng.
.
Private Handshakes with Optional Accountability.
34th Annual IEEE Conference on Local Computer Networks (LCN 2009), pp. 245-248, Zurich, Switzerland, October 2009
[47]
Yanjiang, Jianying Zhou, Jian Weng and Feng Bao
.
A New Approach for Anonymous Password Authentication.
25th Annual Computer Security Application Conference (ACSAC’09), pp. 199-208, Honolulu, Hawaii, USA, 2009. (信息安全著名国际会议,CCF推荐B类会议, 录用率19%=44/228)
[48]
Jian Weng, Robert H. Deng, Chengkang Chu, Xuhua Ding, Junzuo Lai
.
Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack.
Rei Safavi-Naini and Vijay Varadharajan (Ed.): ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2009), pp. 322-332, Sydney, Australia, ACM Press, March 2009(信息安全著名国际会议, 录用率22%=33/140, Google Scholar引用124次)
[49]
Cheng-Kang Chu, Jian Weng, Sherman S.M. Chow, and Jianying Zhou, Robert H. Deng
.
Conditional Proxy Broadcast Re-Encryption..
Colin Boyd, Juan Manuel González Nieto (Eds.): Information Security and Privacy, 14th Australasian Conference on Information Security and Privacy (ACISP 2009), Brisbane, Australia, LNCS 5594, pp. 327–342, Springer-Verlag, 2009. (录用率28%=30/106, Google Scholar引用96次)
2008
[50]
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
.
Chosen-Cipertext Secure Proxy Re-Encryption without Pairings.
M. Franklin and D. S. Wong (Eds.): In Proc. of the 7th International Conference on Cryptology and Network Security (CANS’08), LNCS 5539, pp.1-17, Springer-Verlag, 2008 (Google Scholar引用178次)