Junqing Gong
Orcid: 0000-0003-2281-4112Affiliations:
- East China Normal University, Shanghai, China
According to our database1,
Junqing Gong
authored at least 47 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Pattern Hiding and Authorized Searchable Encryption for Data Sharing in Cloud Storage.
IEEE Trans. Knowl. Data Eng., May, 2025
Lightweight and Dynamic Privacy-Preserving Federated Learning via Functional Encryption.
IEEE Trans. Inf. Forensics Secur., 2025
Refrain From Inquiring About My Scalable Storage and Boolean Queries for Secure Cloud.
IEEE Trans. Cloud Comput., 2025
TraceBFT: Backtracking-Based Pipelined Asynchronous BFT Consensus for High-Throughput Distributed Systems.
Proceedings of the Information and Communications Security - 27th International Conference, 2025
2024
Theor. Comput. Sci., February, 2024
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud.
IEEE Trans. Inf. Forensics Secur., 2024
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.
J. Inf. Secur. Appl., 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
2023
IET Inf. Secur., July, 2023
Theor. Comput. Sci., June, 2023
Peer Peer Netw. Appl., January, 2023
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Comput. J., 2022
2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings.
Des. Codes Cryptogr., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
ABE with Tag Made Easy - Concise Framework and New Instantiations in Prime-Order Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2012
Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks, 2012
2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010