Junqing Gong

Orcid: 0000-0003-2281-4112

Affiliations:
  • East China Normal University, Shanghai, China


According to our database1, Junqing Gong authored at least 38 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Updatable searchable symmetric encryption: Definitions and constructions.
Theor. Comput. Sci., February, 2024

Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

Fine-grained polynomial functional encryption.
Theor. Comput. Sci., 2024

Improved unbounded inner-product functional encryption.
Theor. Comput. Sci., 2024

Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.
J. Inf. Secur. Appl., 2024

Registered Functional Encryptions from Pairings.
IACR Cryptol. ePrint Arch., 2024

Registered Attribute-Based Signature.
IACR Cryptol. ePrint Arch., 2024

Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Revocable identity-based matchmaking encryption in the standard model.
IET Inf. Secur., July, 2023

Bounded-collusion decentralized ABE with sublinear parameters.
Theor. Comput. Sci., June, 2023

Blockchain-Based Fair Payment for ABE with Outsourced Decryption.
Peer Peer Netw. Appl., January, 2023

Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Federated Learning via Functional Encryption, Revisited.
IEEE Trans. Inf. Forensics Secur., 2023

Registered ABE via Predicate Encodings.
IACR Cryptol. ePrint Arch., 2023

Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin.
IACR Cryptol. ePrint Arch., 2023

Traitor Tracing with N<sup>1/3</sup>-Size Ciphertexts and O(1)-Size Keys from k-Lin.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Binary Tree Encryption with Constant-Size Public Key in the Standard Model.
Comput. J., 2022

2021
Master-Key KDM-Secure ABE via Predicate Encoding.
IACR Cryptol. ePrint Arch., 2021

Simple and efficient FE for quadratic functions.
Des. Codes Cryptogr., 2021

Updatable All-But-One Dual Projective Hashing and Its Applications.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Adaptively Secure ABE for DFA from k-Lin and More.
IACR Cryptol. ePrint Arch., 2020

Functional Encryption for Attribute-Weighted Sums from k-Lin.
IACR Cryptol. ePrint Arch., 2020

2019
ABE for DFA from k-Lin.
IACR Cryptol. ePrint Arch., 2019

2018
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding.
IACR Cryptol. ePrint Arch., 2018

Unbounded ABE via Bilinear Entropy Expansion, Revisited.
IACR Cryptol. ePrint Arch., 2018

Leakage-resilient attribute based encryption in prime-order groups via predicate encodings.
Des. Codes Cryptogr., 2018

Compact IBBE and Fuzzy IBE from Simple Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups.
IACR Cryptol. ePrint Arch., 2017

Tightly Secure IBE Under Constant-Size Master Public Key.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
IACR Cryptol. ePrint Arch., 2016

Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016

Almost-Tight Identity Based Encryption Against Selective Opening Attack.
Comput. J., 2016

Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Extended Nested Dual System Groups, Revisited.
IACR Cryptol. ePrint Arch., 2015

2012
Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks, 2012

2010
Fully-Secure and Practical Sanitizable Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010


  Loading...