Jie Chen
Jie Chen
East China Normal University
Verified email at - Homepage
Cited by
Cited by
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Annual Cryptology Conference, 435-460, 2013
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Annual International Conference on the Theory and Applications of …, 2015
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
Shorter identity-based encryption via asymmetric pairings
J Chen, HW Lim, S Ling, H Wang, H Wee
Designs, codes and cryptography 73, 911-947, 2014
Semi-adaptive attribute-based encryption and improved delegation for boolean formula
J Chen, H Wee
International Conference on Security and Cryptography for Networks, 277-297, 2014
Unbounded ABE via bilinear entropy expansion, revisited
J Chen, J Gong, L Kowalczyk, H Wee
Annual International Conference on the Theory and Applications of …, 2018
Combined public-key schemes: The case of ABE and ABS
C Chen, J Chen, HW Lim, Z Zhang, D Feng
Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012
Two-factor data access control with efficient revocation for multi-authority cloud storage systems
X Li, S Tang, L Xu, H Wang, J Chen
IEEE Access 5, 393-405, 2016
Efficient public key encryption with equality test in the standard model
K Zhang, J Chen, HT Lee, H Qian, H Wang
Theoretical Computer Science 755, 65-80, 2019
Forward secure public key encryption with keyword search for outsourced cloud storage
M Zeng, H Qian, J Chen, K Zhang
IEEE transactions on cloud computing 10 (1), 426-438, 2019
Extended nested dual system groups, revisited
J Gong, J Chen, X Dong, Z Cao, S Tang
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
J Gong, X Dong, J Chen, Z Cao
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
Tightly secure IBE under constant-size master public key
J Chen, J Gong, J Weng
IACR International Workshop on Public Key Cryptography, 207-231, 2017
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Doubly spatial encryption from DBDH
J Chen, H Wee
Theoretical Computer Science 543, 79-89, 2014
ABE with tag made easy: Concise framework and new instantiations in prime-order groups
J Chen, J Gong
International Conference on the Theory and Application of Cryptology and …, 2017
Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on eBay efficiently
J Ning, Z Cao, X Dong, J Gong, J Chen
European Symposium on Research in Computer Security, 551-569, 2016
A searchable asymmetric encryption scheme with support for boolean queries for cloud applications
M Zeng, K Zhang, H Qian, X Chen, J Chen
The Computer Journal 62 (4), 563-578, 2019
Improved inner-product encryption with adaptive security and full attribute-hiding
J Chen, J Gong, H Wee
International Conference on the Theory and Application of Cryptology and …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20