Jie Chen

Orcid: 0000-0001-6757-6416

Affiliations:
  • East China Normal University, School of Software Engineering, Shanghai Key Laboratory of Trustworthy Computing, Shanghai, China
  • Tongji University, Shanghai Institute of Intelligent Science and Technology, Shanghai, China
  • Nanyang Technological University, Department of Mathematics, Singapore (PhD 2013)


According to our database1, Jie Chen authored at least 59 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control.
Frontiers Comput. Sci., June, 2024

Tightly secure (H)IBE in the random oracle model.
Theor. Comput. Sci., 2024

Registered Attribute-Based Signature.
IACR Cryptol. ePrint Arch., 2024

2023
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy.
Comput. J., October, 2023

Revocable identity-based matchmaking encryption in the standard model.
IET Inf. Secur., July, 2023

Sparsing and Smoothing for the seq2seq Models.
IEEE Trans. Artif. Intell., June, 2023

Secure and Practical Wildcard Searchable Encryption System Based on Inner Product.
IEEE Trans. Serv. Comput., 2023

SAMI: A Shape-Aware Cycling Map Inference Framework for Designated Driving Service.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Improved Fully Adaptive Decentralized MA-ABE for NC1 from MDDH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Identity-Based Matchmaking Encryption from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2022

Binary Tree Encryption with Constant-Size Public Key in the Standard Model.
Comput. J., 2022

2021
Group Signature with Verifier-Local Revocation Based on Coding Theory.
Secur. Commun. Networks, 2021

Master-Key KDM-Secure ABE via Predicate Encoding.
IACR Cryptol. ePrint Arch., 2021

Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-Assisted E-Healthcare Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting.
Theor. Comput. Sci., 2020

Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data.
IEEE Access, 2020

2019
Efficient public key encryption with equality test in the standard model.
Theor. Comput. Sci., 2019

Public key encryption with equality test via hash proof system.
Theor. Comput. Sci., 2019

A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
Comput. J., 2019

Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem.
IEEE Access, 2019

Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall.
IEEE Access, 2019

2018
P3GQ: A practical privacy-preserving generic location-based services query scheme.
Pervasive Mob. Comput., 2018

Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding.
IACR Cryptol. ePrint Arch., 2018

Unbounded ABE via Bilinear Entropy Expansion, Revisited.
IACR Cryptol. ePrint Arch., 2018

Attribute-based Data Integrity Checking for Cloud Storage.
Fundam. Informaticae, 2018

Leakage-resilient attribute based encryption in prime-order groups via predicate encodings.
Des. Codes Cryptogr., 2018

2017
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups.
Secur. Commun. Networks, 2017

ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups.
IACR Cryptol. ePrint Arch., 2017

MapReduce-based entity matching with multiple blocking functions.
Frontiers Comput. Sci., 2017

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017

Tightly Secure IBE Under Constant-Size Master Public Key.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
New application of partitioning methodology: identity-based dual receiver encryption.
Secur. Commun. Networks, 2016

Building a new secure variant of Rainbow signature scheme.
IET Inf. Secur., 2016

Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
IACR Cryptol. ePrint Arch., 2016

Tightly Secure IBE under Constant-size Master Public Key.
IACR Cryptol. ePrint Arch., 2016

Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016

Almost-Tight Identity Based Encryption Against Selective Opening Attack.
Comput. J., 2016

Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Extended Nested Dual System Groups, Revisited.
IACR Cryptol. ePrint Arch., 2015

Improved Dual System ABE in Prime-Order Groups via Predicate Encodings.
IACR Cryptol. ePrint Arch., 2015

2014
Doubly spatial encryption from DBDH.
Theor. Comput. Sci., 2014

MR-tree: an efficient index for MapReduce.
Int. J. Commun. Syst., 2014

Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula.
IACR Cryptol. ePrint Arch., 2014

Dual System Groups and its Applications - Compact HIBE and More.
IACR Cryptol. ePrint Arch., 2014

Shorter identity-based encryption via asymmetric pairings.
Des. Codes Cryptogr., 2014

The relation and transformation between hierarchical inner product encryption and spatial encryption.
Des. Codes Cryptogr., 2014

Spatial encryption supporting non-monotone access structure.
Des. Codes Cryptogr., 2014

2013
Fully, (Almost) Tightly Secure IBE from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2013

Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Fully, (Almost) Tightly Secure IBE and Dual System Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Shorter IBE and Signatures via Asymmetric Pairings.
IACR Cryptol. ePrint Arch., 2012

Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters
CoRR, 2012

Combined Public-Key Schemes: The Case of ABE and ABS.
Proceedings of the Provable Security - 6th International Conference, 2012

2011
Revocable Identity-Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2011

Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011


  Loading...