Seguir
Long Chen
Título
Citado por
Citado por
Año
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
H Jiang, Z Zhang, L Chen, H Wang, Z Ma
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
124*2018
Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension
L Chen, Z Zhang, X Wang
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
962017
Proof of storage-time: Efficiently checking continuous data availability
G Ateniese, L Chen, M Etemad, Q Tang
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
272020
CCA updatable encryption against malicious re-encryption attacks
L Chen, Y Li, Q Tang
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
192020
People who live in glass houses should not throw stones: targeted opening message franking schemes
L Chen, Q Tang
Cryptology ePrint Archive, 2018
142018
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model
H Jiang, Z Zhang, L Chen, H Wang, Z Ma
revisited. Cryptology ePrint Archive, Report 2017/1096, 2017. https://eprint …, 2017
122017
On the hardness of the computational Ring-LWR problem and its applications
L Chen, Z Zhang, Z Zhang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
112018
Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise
L Chen, Z Zhang
International Conference on Provable Security, 285-304, 2017
82017
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts
T Zhou, L Chen, X Che, W Liu, Z Zhang, X Yang
Cryptology ePrint Archive, 2021
72021
{End-to-Same-End} Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
L Chen, YN Li, Q Tang, M Yung
31st USENIX Security Symposium (USENIX Security 22), 2353-2370, 2022
32022
Efficient Lattice-Based Threshold Signatures with Functional Interchangeability
G Tang, B Pang, L Chen, Z Zhang
IEEE Transactions on Information Forensics and Security, 2023
22023
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting)
G Ateniese, L Chen, D Francati, D Papadopoulos, Q Tang
IACR International Conference on Public-Key Cryptography, 63-93, 2023
22023
Multi-input laconic function evaluation
B Pang, L Chen, X Fan, Q Tang
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
12020
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
WH Bai, L Chen, Q Gao, Z Zhang
2024 IEEE Symposium on Security and Privacy (SP), 157-157, 2024
2024
Efficient Secure Storage with Version Control and Key Rotation
L Chen, H Guo, YN Li, Q Tang
International Conference on the Theory and Application of Cryptology and …, 2023
2023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–15