Junqing Gong

Orcid: 0000-0003-2281-4112

Affiliations:
  • East China Normal University, Shanghai, China


According to our database1, Junqing Gong authored at least 34 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Updatable searchable symmetric encryption: Definitions and constructions.
Theor. Comput. Sci., February, 2024

Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

Registered Functional Encryptions from Pairings.
IACR Cryptol. ePrint Arch., 2024

Registered Attribute-Based Signature.
IACR Cryptol. ePrint Arch., 2024

2023
Revocable identity-based matchmaking encryption in the standard model.
IET Inf. Secur., July, 2023

Bounded-collusion decentralized ABE with sublinear parameters.
Theor. Comput. Sci., June, 2023

Blockchain-Based Fair Payment for ABE with Outsourced Decryption.
Peer Peer Netw. Appl., January, 2023

Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Federated Learning via Functional Encryption, Revisited.
IEEE Trans. Inf. Forensics Secur., 2023

Registered ABE via Predicate Encodings.
IACR Cryptol. ePrint Arch., 2023

Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin.
IACR Cryptol. ePrint Arch., 2023

Traitor Tracing with N<sup>1/3</sup>-Size Ciphertexts and O(1)-Size Keys from k-Lin.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Binary Tree Encryption with Constant-Size Public Key in the Standard Model.
Comput. J., 2022

2021
Master-Key KDM-Secure ABE via Predicate Encoding.
IACR Cryptol. ePrint Arch., 2021

Simple and efficient FE for quadratic functions.
Des. Codes Cryptogr., 2021

Updatable All-But-One Dual Projective Hashing and Its Applications.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Adaptively Secure ABE for DFA from k-Lin and More.
IACR Cryptol. ePrint Arch., 2020

Functional Encryption for Attribute-Weighted Sums from k-Lin.
IACR Cryptol. ePrint Arch., 2020

2019
ABE for DFA from k-Lin.
IACR Cryptol. ePrint Arch., 2019

2018
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding.
IACR Cryptol. ePrint Arch., 2018

Unbounded ABE via Bilinear Entropy Expansion, Revisited.
IACR Cryptol. ePrint Arch., 2018

Leakage-resilient attribute based encryption in prime-order groups via predicate encodings.
Des. Codes Cryptogr., 2018

Compact IBBE and Fuzzy IBE from Simple Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups.
IACR Cryptol. ePrint Arch., 2017

Tightly Secure IBE Under Constant-Size Master Public Key.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
IACR Cryptol. ePrint Arch., 2016

Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016

Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Almost-tight Identity Based Encryption against Selective Opening Attack.
IACR Cryptol. ePrint Arch., 2015

Extended Nested Dual System Groups, Revisited.
IACR Cryptol. ePrint Arch., 2015

2012
Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks, 2012

2010
Fully-Secure and Practical Sanitizable Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010


  Loading...