Junzuo Lai

Orcid: 0000-0001-5780-8463

According to our database1, Junzuo Lai authored at least 74 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Flexible and secure access control for EHR sharing based on blockchain.
J. Syst. Archit., January, 2024

Secure and efficient multi-key aggregation for federated learning.
Inf. Sci., January, 2024

EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Attribute-based anonymous credential: Delegation, traceability, and revocation.
Comput. Networks, December, 2023

Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions.
IEEE Commun. Mag., August, 2023

Multi-authority anonymous authentication with public accountability for incentive-based applications.
Comput. Networks, July, 2023

Receiver selective opening security for identity-based encryption in the multi-challenge setting.
Des. Codes Cryptogr., April, 2023

Fully privacy-preserving location recommendation in outsourced environments.
Ad Hoc Networks, March, 2023

PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments.
IEEE Trans. Serv. Comput., 2023

Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes.
IEEE Trans. Dependable Secur. Comput., 2023

Non-Interactive Zero-Knowledge Functional Proofs.
IACR Cryptol. ePrint Arch., 2023

Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead.
IACR Cryptol. ePrint Arch., 2023

Asymmetric Group Message Franking: Definitions & Constructions.
IACR Cryptol. ePrint Arch., 2023

Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing.
Frontiers Comput. Sci., 2023

Asymmetric Group Message Franking: Definitions and Constructions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
DAG-Σ: A DAG-based Sigma Protocol for Relations in CNF.
IACR Cryptol. ePrint Arch., 2022

Lattice Codes for Lattice-Based PKE.
IACR Cryptol. ePrint Arch., 2022

Anonymous Public Key Encryption under Corruptions.
IACR Cryptol. ePrint Arch., 2022

Lattice Codes for Lattice-Based PKE.
CoRR, 2022

Practical Federated Learning for Samples with Different IDs.
Proceedings of the Provable and Practical Security, 2022

2021
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting.
Secur. Commun. Networks, 2021

Event-oriented linkable and traceable anonymous authentication and its application to voting.
J. Inf. Secur. Appl., 2021

Simulation-Based Bi-Selective Opening Security for Public Key Encryption.
IACR Cryptol. ePrint Arch., 2021

2020
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation.
Theor. Comput. Sci., 2020

Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting.
IACR Cryptol. ePrint Arch., 2020

2019
Practical public key encryption with selective opening security for receivers.
Inf. Sci., 2019

Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019

Simulation-based selective opening security for receivers under chosen-ciphertext attacks.
Des. Codes Cryptogr., 2019

LaT-Voting: Traceable Anonymous E-Voting on Blockchain.
Proceedings of the Network and System Security - 13th International Conference, 2019

2018
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptol. ePrint Arch., 2018

An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018

Unforgeable Watermarking Schemes with Public Extraction.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Anonymous Attribute-Based Conditional Proxy Re-encryption.
Proceedings of the Network and System Security - 12th International Conference, 2018

Making Any Attribute-Based Encryption Accountable, Efficiently.
Proceedings of the Computer Security, 2018

Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Lattice-Based Universal Accumulator with Nonmembership Arguments.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Adaptable key-policy attribute-based encryption with time interval.
Soft Comput., 2017

Dual trapdoor identity-based encryption with keyword search.
Soft Comput., 2017

Collusion Resistant Watermarking Schemes for Cryptographic Functionalities.
IACR Cryptol. ePrint Arch., 2017

Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
IACR Cryptol. ePrint Arch., 2017

A Secure Cloud Backup System with Deduplication and Assured Deletion.
Proceedings of the Provable Security, 2017

Verifiable Range Query Processing for Cloud Computing.
Proceedings of the Information Security Practice and Experience, 2017

2016
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Secur. Comput., 2016

Fuzzy certificateless signature.
Secur. Commun. Networks, 2016

Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
Secur. Commun. Networks, 2016

An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016

CCA-Secure Keyed-Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Secret Handshakes with Dynamic Expressive Matching Policy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Efficient revocable identity-based encryption from multilinear maps.
Secur. Commun. Networks, 2015

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2015

2014
Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014

Authorized Keyword Search on Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Verifiable Computation on Outsourced Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Attribute-Based Encryption With Verifiable Outsourced Decryption.
IEEE Trans. Inf. Forensics Secur., 2013

Adaptable Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Accountable Trapdoor Sanitizable Signatures.
Proceedings of the Information Security Practice and Experience, 2013

Accountable Authority Identity-Based Encryption with Public Traceability.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Expressive search on encrypted data.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Verifiable and private top-k monitoring.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Expressive CP-ABE with partially hidden access structures.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
On two RFID privacy notions and their relations.
ACM Trans. Inf. Syst. Secur., 2011

General Construction of Chameleon All-But-One Trapdoor Functions.
J. Internet Serv. Inf. Secur., 2011

Self-generated-certificate public key encryption without pairing and its application.
Inf. Sci., 2011

Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Fully Secure Cipertext-Policy Hiding CP-ABE.
Proceedings of the Information Security Practice and Experience, 2011

Hierarchical Identity-Based Chameleon Hash and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption.
J. Comput. Sci. Technol., 2010

Efficient CCA-Secure PKE from Identity-Based Techniques.
Proceedings of the Topics in Cryptology, 2010

Revisiting Unpredictability-Based RFID Privacy Models.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
RSA-Based Certificateless Public Key Encryption.
Proceedings of the Information Security Practice and Experience, 2009

Conditional proxy re-encryption secure against chosen-ciphertext attack.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2008

2007
Self-Generated-Certificate Public Key Encryption Without Pairing.
Proceedings of the Public Key Cryptography, 2007


  Loading...