Zhedong Wang
According to our database1,
Zhedong Wang
authored at least 22 papers
between 2017 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Revisiting Adaptively Secure IBE from Lattices with Smaller Modulus: A Conceptually Simple Framework with Low Overhead.
IACR Cryptol. ePrint Arch., 2025
Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
2024
Cybersecur., December, 2024
Des. Codes Cryptogr., June, 2024
Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Selected Areas in Cryptography - SAC 2024, 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Almost Tight Multi-user Security Under Adaptive Corruptions from LWE in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
2021
Demonstration of Spider-Eyes-Like Intelligent Antennas for Dynamically Perceiving Incoming Waves.
Adv. Intell. Syst., 2021
Ring-Based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
2019
J. Univers. Comput. Sci., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017