Dingding Jia

Orcid: 0000-0001-9424-3983

According to our database1, Dingding Jia authored at least 29 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Fully selective opening secure IBE from LWE.
Des. Codes Cryptogr., May, 2025

Fiat-Shamir with Rejection and Rotation.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2022
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization.
Proceedings of the Information Security - 25th International Conference, 2022

IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Is normalized iris optimal for iris recognition based on deep learning?
J. Electronic Imaging, 2021

SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions.
Des. Codes Cryptogr., 2021

Survey of Wiretap Channel Security Model.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
IBE with tight security against selective opening and chosen-ciphertext attacks.
Des. Codes Cryptogr., 2020

2019
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.
IACR Cryptol. ePrint Arch., 2019

2018
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus.
IACR Cryptol. ePrint Arch., 2018

Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Public-Key Encryption with Simulation-Based Sender Selective-Opening Security.
Proceedings of the Provable Security, 2017

Towards Tightly Secure Deterministic Public Key Encryption.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

KDM and Selective Opening Secure IBE Based on the LWE Problem.
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017

Dual-Mode Cryptosystem Based on the Learning with Errors Problem.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Receiver Selective Opening Security from Indistinguishability Obfuscation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Identity-Based Lossy Encryption from Learning with Errors.
Proceedings of the Advances in Information and Computer Security, 2015

KDM-CCA Security from RKA Secure Authenticated Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Related Key Secure PKE from Hash Proof Systems.
Proceedings of the Advances in Information and Computer Security, 2014

Related-Key Security for Hybrid Encryption.
Proceedings of the Information Security - 17th International Conference, 2014

2013
RKA Secure PKE Based on the DDH and HR Assumptions.
Proceedings of the Provable Security - 7th International Conference, 2013

Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme.
Proceedings of the Information Security Practice and Experience, 2013

RSA-OAEP is RKA Secure.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2011
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup.
IACR Cryptol. ePrint Arch., 2010


  Loading...