翁健的论文列表 (共55条)
代表作 全部 期刊 会议 其他
2017
[1]   Zijian Zhang, Zhan Qin, Liehuang Zhu, Jian Weng, Kui Ren .   Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.  IEEE Trans. Smart Grid, 2017, 8(2): 619--626.
[2]   Jie Chen, Junqing Gong, Jian Weng .   Tightly Secure {IBE} Under Constant-Size Master Public Key.  20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography (PKC 2017), Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I, 2017: 207--231.
[3]   Zhe Liu, Jian Weng*, Zhi Hu, Hwajeong Seo .   Efficient Elliptic Curve Cryptography for Embedded Devices.  ACM Trans. Embedded Comput. Syst., 2017, 16(2): 53:1--53:18.
[4]   Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert H. Deng .   Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems.  IEEE Trans. Intelligent Transportation Systems, 2017, 18(4): 814--823.
2016
[5]   Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, Kui Ren .   Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.  IEEE Trans. Multimedia, 2016, 18(10): 2002--2014.
[6]   Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou .   Verifiable Computation over Large Database with Incremental Updates.  IEEE Trans. Computers, 2016, 65(10): 3184--3195.
[7]   Kai He, Jian Weng, Robert H. Deng, Joseph K. Liu .   On the security of two identity-based conditional proxy re-encryption schemes.  Theoretical Computer Science, 2016, 652: 18--27.
[8]   Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng .   Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.  IEEE Trans. Dependable Sec. Comput., 2016, 13(5): 533--546.
[9]   Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Jian Weng .   An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.  IEEE Trans. Information Forensics and Security, 2016, 11(11): 2401--2414.
[10]   Zhan Qin, Kui Ren, Ting Yu, Jian Weng .   DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.  IEEE Trans. Multimedia, 2016, 18(5): 929--939.
[11]   Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou .   Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.  Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016, 2016: 141--151.
[12]   Kai He, Jian Weng, Jianan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng .   Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.  Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016, 2016: 247--255.
[13]   Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng* .   CCA-Secure Keyed-Fully Homomorphic Encryption.  19th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2016), Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}, 2016: 70--98.
2015
[14]   Jian Weng, Yunlei Zhao, Robert H Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai. .   A Note on the Security of KHL Scheme..  Theoretical Computer Science. 2015, to appear.
[15]   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. .   (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond..  35th International Cryptology Conference (CRYPTO 2015), to appear(密码学顶级国际会议,中国计算机学会和中国密码学会推荐A类会议)
[16]   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng .   The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.  12th Theory of Cryptography Conference on Theory of Cryptography (TCC 2015), Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}, 2015: 7--35.
[17]   Yu Yu, Xiangxue Li, Jian Weng. .   Pseudorandom generatorsfrom regular one-way functions: New constructions with improved parameters..  Theoretical Computer Science, 569: 58-69, 2015 (CCF推荐B类期刊)
2014
[18]   Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng .   The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions.  Theory of Cryptography Conference (TCC 2015), to appear (密码学顶级国际会议,CCF 推荐B类会议)
[19]   JunzuoLai, Robert H. Deng, Hweehwa Pang, JianWeng. .   Verifiable Computation on Outsourced Encrypted Data.  In 19th EuropeanSymposium on Research in Computr Security (ESORICS2014), 2014 (CCF推荐B类会议)
[20]   Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou. .   Verifiable Computation over Large Database with Incremental Updates..  In 19th EuropeanSymposium on Research in Computr Security (ESORICS2014), 2014 (CCF推荐B类会议)
[21]   Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng .   Authorized Keyword Search on Encrypted Data.  In 19th EuropeanSymposium on Research in Computr Security (ESORICS2014), 2014 (CCF推荐B类会议)
[22]   Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao .   Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.  33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2014),(密码学顶级国际会议,CCF推荐A类会议)
[23]   Dehua Zhou, Chaowen Guan, Jian Weng, Robert H. Deng, Minrong Chen .   On the unforgeability of an Improved Certificateless Signature Scheme in the Standard Model.  IET Information Security, Vol. 8, No. 5, pp. 273-276, 2014 (通讯作者,中国密码学会推荐B类期刊)
2013
[24]   Yu Yu and Xiangxue Liand Jian Weng. .   Pseudorandom Generators fromRegular One-way Functions: New Constructions with Improved Parameters..  Accept to 19th Annual International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT 2013), K. Sako and P. Sarkar(Eds.), LNCS 8270, pp. 261–279,Spring-Verlag, 2013 (密码学顶级国际会议,中国密码学会推荐A类会议,CCF推荐B类会议)
[25]   Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng .   Attribute-Based Encryption With Verifiable Outsourced Decryption.  IEEE Transactions on Information Forensics and Security, Vol. 8, no. 8, Pages 1343-1354, August 2013 (通讯作者,CCF推荐A类期刊,自2013年至今Google Scholar引用142次)
[26]   Dehua Zhou, Jian Weng, Chaowen Guan, Robert H. Deng, Minrong Chen, Kefei Chen .   Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.  SCIENCE CHINA Information Sciences(中国科学-信息科学),57(7): 1-5, 2014 (CCF推荐B类期刊,通讯作者)
[27]   Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng .   Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.  11th International Conference on Applied Cryptography and Network Security (ACNS 2013), LNCS 7954, pp. 186-201, Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini (Eds.), Banff, AB, Canada, June 25-28, 2013 (录用率:20%=38/192)
[28]   Xiangxue Li, Haifeng Qian, JianWeng, Yu Yu .   Fully secure identity-based signcryption scheme withshorter signcryptext in the standard model.  Mathematical and Computer Modelling,Vol. 57, No. 3-4, pp. 503-511
[29]   Shengli Liu, Jian Weng, Yunlei Zhao .   Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.  The Cryptographers' Track at the RSA Conference 2013 (CT-RSA 2013), LNCS 7779, Springer-Verlag, San Francisco,CA, USA, February 25-March 1, 2013 (密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用25篇论文)
[30]   Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng .   Accountable Authority Identity-Based Encryption with Public Traceability.  The Cryptographers' Track at the RSA Conference 2013 (CT-RSA 2013), LNCS 7779, Springer-Verlag, San Francisco,CA, USA, February 25-March 1, 2013 (密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用25篇论文)
[31]   Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang .   Robustpassword changing and DoS resilience for human-centric passwordauthentication.  Security and Communication Networks, March 01, 2013
2012
[32]   Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao .   Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. .  In Proc. of CT-RSA 2012, Orr Dunkelman (Ed.), Springer-Verlage, San Francisco, CA, USA, March 2012 (署名按姓氏首字母排序,密码学著名国际会议,中国密码学会推荐B类会议,该次会议共录用26篇论文,自2012年至今Google Scholar引用48次)
[33]   Sherman S.M. Chow, Changshe Ma, Jian Weng .   Zero-Knowledge Argument for Simultaneous Discrete Logarithms and its Application.  Algorithmica, 64(2): 246-266 (2012) (CCF推荐B类期刊, 署名按姓氏字母排序,通讯作者)
2011
[34]   Jian Weng, Yunlei Zhao, Goichiro Hanaoka .   On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010.  In: 14th IACR international conference on Practice and Theory of Public Key Cryptography (PKC 2011), LNCS 6571, pp. 284-295, Springer-Verlag, March 6-9, 2011, Taomina, Italy.(公钥密码学著名国际会议,CCF推荐B类会议,会议共录用28篇论文)
[35]   Xu An Wang, Jian Weng, Xiaoyuan Yang, Minqing Zhang .   Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.  Journal of System and Software, Volume 84, Issue 2, February 2011, Pages 219-225 (CCF推荐B类期刊,通讯作者,署名按姓氏字母排序)
[36]   Jian Weng, Guoxiang Yao, Robert H. Deng, Minrong Chen .   Cryptanalysis of a Certificateless Signcryption Scheme in the Standard Model.  Information Sciences, 183(3): 661-667, 2011(CCF推荐B类期刊)
[37]   Xu An Wang, Jian Weng, Xiaoyuan Yang, Yanjiang Yang .   Cryptanalysis of an identity based broadcast encryption scheme without random oracles.  Information Processing Letters, Volume 111, Issue 10, pp. 461-464, 2011. (通讯作者,署名按姓氏字母顺序)
2010
[38]   Jian Weng, Robert H Deng, Shengli Liu, Kefei Chen .   Chosen-Ciphertext Secure Bidirectional Proxy Re-Encryption Schemes without Pairings.  Information Sciences, 180(24): 5077-5089, 2010(CCF推荐B类期刊)
[39]   Goichiro Hanaoka, Jian Weng .   Generic Constructions of Parallel Key-Insulated Encryption.  Juan Garay (Ed.): 7th Conference on Security and Cryptography for Networks (SCN 2010), LNCS 6280, Amalfi, Italy, September, 2010 (密码学著名国际会议,会议共录用27篇论文,署名按姓氏字母排序).
[40]   Sherman S.M. Chow, Jian Weng, Yanjiang Yang and Robert H. Deng. .   Efficient Unidirectional Proxy Re-Encryption..  D.J. Bernstein and T. Lange (Eds): AFRICACRYPT 2010, volume 6055 of Lecture Notes in Computer Science, pages 316-332. Springer, 2010. (Google Scholar引用195次)
[41]   Jian Weng, Minrong Chen., Kefei Chen, Robert H. Deng .   Cryptanalysis of a hierarchical identity-based encryption scheme.  IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E93-A, No.4, pp. 854–856, April 2010
[42]   Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao .   CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles.  Science China:Information Sciences(中国科学:信息科学). Vol 53(3): 593-606, March 2010 (CCF推荐B类期刊,Google Scholar引用62次)
[43]   Changshe Ma, Jian Weng, Robert H. Deng and Yingjiu Li .   Efficient Discrete Logarithm Based Multi-Signature Scheme in the Plain Public Key Model.  Designs, Codes and Cryptography. Vol 54(2):121-133, February 2010 (密码学著名国际期刊,CCF推荐B类期刊)
[44]   翁健,陈泯融,杨艳江,邓慧杰,陈克非,鲍丰 .   无需随机预言机的自适应攻陷模型下选择密文安全的单向代理重加密方案.  中国科学:信息科学,2010
2009
[45]   Jian Weng, Yanjiang Yang, Qiang Tang, Robet H. Deng and Feng Bao. .   Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security..  Pierangela Samarati and Moti Yuang (Eds.): the 12th Information Security Conference (ISC 2009), LNCS 5735, pp. 151–166, Springer-Verlag, Pisa, Italy, September 2009. (录用率27%=29/105, Google Scholar引用77次)
[46]   Yanjiang Yang, Feng Bao, Jian Weng. .   Private Handshakes with Optional Accountability.  34th Annual IEEE Conference on Local Computer Networks (LCN 2009), pp. 245-248, Zurich, Switzerland, October 2009
[47]   Yanjiang, Jianying Zhou, Jian Weng and Feng Bao .   A New Approach for Anonymous Password Authentication.  25th Annual Computer Security Application Conference (ACSAC’09), pp. 199-208, Honolulu, Hawaii, USA, 2009. (信息安全著名国际会议,CCF推荐B类会议, 录用率19%=44/228)
[48]   Jian Weng, Robert H. Deng, Chengkang Chu, Xuhua Ding, Junzuo Lai .   Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attack.  Rei Safavi-Naini and Vijay Varadharajan (Ed.): ACM Symposium on Information, Computer and Communications Security (ACM ASIACCS 2009), pp. 322-332, Sydney, Australia, ACM Press, March 2009(信息安全著名国际会议, 录用率22%=33/140, Google Scholar引用124次)
[49]   Cheng-Kang Chu, Jian Weng, Sherman S.M. Chow, and Jianying Zhou, Robert H. Deng .   Conditional Proxy Broadcast Re-Encryption..  Colin Boyd, Juan Manuel González Nieto (Eds.): Information Security and Privacy, 14th Australasian Conference on Information Security and Privacy (ACISP 2009), Brisbane, Australia, LNCS 5594, pp. 327–342, Springer-Verlag, 2009. (录用率28%=30/106, Google Scholar引用96次)
2008
[50]   Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen .   Chosen-Cipertext Secure Proxy Re-Encryption without Pairings.  M. Franklin and D. S. Wong (Eds.): In Proc. of the 7th International Conference on Cryptology and Network Security (CANS’08), LNCS 5539, pp.1-17, Springer-Verlag, 2008 (Google Scholar引用178次)
[51]   Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng and Weidong Qiu .   Identity-Based Threshold Key-Insulated Encryption without Random Oracles.  Tal Malkin (Ed.): CT-RSA 2008, LNCS 4964, pp. 203-220, Springer-Verlage, San Francisco, CA, USA, April 2008.(密码学著名国际会议,会议共录用26篇论文)
[52]   Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li .   Identity-Based Parallel Key-Insulated Signature: Framework and Construction.  Journal of Research and Practice in Information Technology. Vol. 40(1): 55-68, February 2008
2007
[53]   Jian Weng, Shengli Liu, Kefei Chen .   Pirate Decoder for the Broadcast Encryption Schemes from Crypto 2005.  Science in China Series F-Information Sciences (中国科学F辑—信息科学),Vol.50(3):318-323, June 2007(CCF推荐B类期刊)
2006
[54]   Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma .   Identity-Based Parallel Key-Insulated Encryption without Random Oracles: Security Notions and Construction.  R. Barua and T. Lange (Eds.): IndoCrypt2006, Kolkata, India, LNCS 4329, pp. 409–423, December 2006. (录用率15%=29/186)
[55]   Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li .   Identity-Based Key-Insulated Signature with Secure Key-updates..  H. Lipmaa, M. Yung, and D. Lin (Eds.): Inscrypt 2006, LNCS 4318, pp.13–26, November 2006. (录用率10%=23/225).
SCHOLAT.com 学者网
ABOUT US | SCHOLAT