Dingding Jia

Orcid: 0000-0001-9424-3983

According to our database1, Dingding Jia authored at least 27 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization.
Proceedings of the Information Security - 25th International Conference, 2022

IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Is normalized iris optimal for iris recognition based on deep learning?
J. Electronic Imaging, 2021

SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions.
Des. Codes Cryptogr., 2021

Survey of Wiretap Channel Security Model.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
IBE with tight security against selective opening and chosen-ciphertext attacks.
Des. Codes Cryptogr., 2020

2019
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.
Secur. Commun. Networks, 2019

2018
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus.
IACR Cryptol. ePrint Arch., 2018

Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2018

2017
Public-Key Encryption with Simulation-Based Sender Selective-Opening Security.
Proceedings of the Provable Security, 2017

Towards Tightly Secure Deterministic Public Key Encryption.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

KDM and Selective Opening Secure IBE Based on the LWE Problem.
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017

Dual-Mode Cryptosystem Based on the Learning with Errors Problem.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2016

Receiver Selective Opening Security from Indistinguishability Obfuscation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Identity-Based Lossy Encryption from Learning with Errors.
Proceedings of the Advances in Information and Computer Security, 2015

KDM-CCA Security from RKA Secure Authenticated Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Related Key Secure PKE from Hash Proof Systems.
Proceedings of the Advances in Information and Computer Security, 2014

Related-Key Security for Hybrid Encryption.
Proceedings of the Information Security - 17th International Conference, 2014

2013
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.
IACR Cryptol. ePrint Arch., 2013

RKA Secure PKE Based on the DDH and HR Assumptions.
Proceedings of the Provable Security - 7th International Conference, 2013

RSA-OAEP is RKA Secure.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2011
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup.
IACR Cryptol. ePrint Arch., 2010


  Loading...