Long Chen

Orcid: 0000-0003-3183-158X

Affiliations:
  • New Jersey Institute of Technology, Newark, NJ, USA
  • Chinese Academy of Sciences, Institute of Software, TCA Laboratory, Beijing, China
  • University of Chinese Academy of Sciences, Beijing, China


According to our database1, Long Chen authored at least 20 papers between 2017 and 2026.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Authorized multi-key fully homomorphic encryption scheme with compact ciphertext.
Des. Codes Cryptogr., March, 2026

Analysis of key reuse security for Aigis.KEM.
Theor. Comput. Sci., 2026

2025
Proofs of Retrievability With Public Verifiability From Lattices.
IEEE Trans. Inf. Forensics Secur., 2025

Short Paper: Decentralized Fair Exchange for Assets across Blockchain and the Internet.
Proceedings of the Crypto Valley Conference, 2025

2024
Round efficient privacy-preserving federated learning based on MKFHE.
Comput. Stand. Interfaces, January, 2024

2023
Efficient Lattice-Based Threshold Signatures With Functional Interchangeability.
IEEE Trans. Inf. Forensics Secur., 2023

Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Efficient Secure Storage with Version Control and Key Rotation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertext.
IACR Cryptol. ePrint Arch., 2021

Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity.
IACR Cryptol. ePrint Arch., 2021

2020
Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

CCA Updatable Encryption Against Malicious Re-encryption Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Multi-input Laconic Function Evaluation.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2018
People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes.
IACR Cryptol. ePrint Arch., 2018

IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

On the Hardness of the Computational Ring-LWR Problem and Its Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Post-quantum IND-CCA-secure KEM without Additional Hash.
IACR Cryptol. ePrint Arch., 2017

Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Bootstrapping Fully Homomorphic Encryption with Ring Plaintexts Within Polynomial Noise.
Proceedings of the Provable Security, 2017


  Loading...