Long Chen

Orcid: 0000-0003-3183-158X

Affiliations:
  • New Jersey Institute of Technology, Newark, NJ, USA
  • Chinese Academy of Sciences, Institute of Software, TCA Laboratory, Beijing, China
  • University of Chinese Academy of Sciences, Beijing, China


According to our database1, Long Chen authored at least 17 papers between 2017 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
ACM Trans. Priv. Secur., May, 2025

Proofs of Retrievability With Public Verifiability From Lattices.
IEEE Trans. Inf. Forensics Secur., 2025

2024
Round efficient privacy-preserving federated learning based on MKFHE.
Comput. Stand. Interfaces, January, 2024

2023
Efficient Lattice-Based Threshold Signatures With Functional Interchangeability.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Secure Storage with Version Control and Key Rotation.
IACR Cryptol. ePrint Arch., 2023

Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2021
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertext.
IACR Cryptol. ePrint Arch., 2021

Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity.
IACR Cryptol. ePrint Arch., 2021

2020
Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
IACR Cryptol. ePrint Arch., 2020

CCA Updatable Encryption Against Malicious Re-encryption Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Multi-input Laconic Function Evaluation.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2018
On the Hardness of the Computational Ring-LWR Problem and its Applications.
IACR Cryptol. ePrint Arch., 2018

People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes.
IACR Cryptol. ePrint Arch., 2018

IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Post-quantum IND-CCA-secure KEM without Additional Hash.
IACR Cryptol. ePrint Arch., 2017

Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension.
IACR Cryptol. ePrint Arch., 2017

Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise.
Proceedings of the Provable Security, 2017


  Loading...