default search action
Junqing Gong 0001
Person information
- affiliation: East China Normal University, Shanghai, China
Other persons with the same name
- Junqing Gong 0002 — Shanghai Jiao Tong University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Boli Hu, Kai Zhang, Junqing Gong, Lifei Wei, Jianting Ning:
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds. J. Inf. Secur. Appl. 83: 103783 (2024) - [j15]Xiwen Wang, Kai Zhang, Junqing Gong, Shi-Feng Sun, Jianting Ning:
Updatable searchable symmetric encryption: Definitions and constructions. Theor. Comput. Sci. 983: 114304 (2024) - [j14]Ziqi Zhu, Junqing Gong, Yuyu Wang, Haifeng Qian:
Fine-grained polynomial functional encryption. Theor. Comput. Sci. 1012: 114730 (2024) - [j13]Minghao Yang, Junqing Gong, Haifeng Qian:
Improved unbounded inner-product functional encryption. Theor. Comput. Sci. 1014: 114756 (2024) - [j12]Jun Zhao, Kai Zhang, Junqing Gong, Haifeng Qian:
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud. IEEE Trans. Inf. Forensics Secur. 19: 2732-2745 (2024) - [c21]Jiuheng Su, Zhili Chen, Haifeng Qian, Junqing Gong:
Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection. ESORICS (3) 2024: 383-402 - [c20]Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered Functional Encryptions from Pairings. EUROCRYPT (2) 2024: 373-402 - [c19]Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen:
Registered Attribute-Based Signature. Public Key Cryptography (1) 2024: 133-162 - [i15]Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen:
Registered Attribute-Based Signature. IACR Cryptol. ePrint Arch. 2024: 293 (2024) - [i14]Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered Functional Encryptions from Pairings. IACR Cryptol. ePrint Arch. 2024: 327 (2024) - 2023
- [j11]Zhe Jiang, Xiwen Wang, Kai Zhang, Junqing Gong, Jie Chen, Haifeng Qian:
Revocable identity-based matchmaking encryption in the standard model. IET Inf. Secur. 17(4): 567-581 (2023) - [j10]Linjian Hong, Kai Zhang, Junqing Gong, Haifeng Qian:
Blockchain-Based Fair Payment for ABE with Outsourced Decryption. Peer Peer Netw. Appl. 16(1): 312-327 (2023) - [j9]Jun Zhao, Minghao Yang, Junqing Gong, Kai Zhang, Haifeng Qian:
Bounded-collusion decentralized ABE with sublinear parameters. Theor. Comput. Sci. 960: 113897 (2023) - [j8]Yansong Chang, Kai Zhang, Junqing Gong, Haifeng Qian:
Privacy-Preserving Federated Learning via Functional Encryption, Revisited. IEEE Trans. Inf. Forensics Secur. 18: 1855-1869 (2023) - [j7]Kai Zhang, Xiwen Wang, Jianting Ning, Junqing Gong, Xinyi Huang:
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control. IEEE Trans. Inf. Forensics Secur. 18: 5286-5301 (2023) - [c18]Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered ABE via Predicate Encodings. ASIACRYPT (5) 2023: 66-97 - [c17]Junqing Gong, Ji Luo, Hoeteck Wee:
Traitor Tracing with N1/3-Size Ciphertexts and O(1)-Size Keys from k-Lin. EUROCRYPT (3) 2023: 637-668 - [i13]Junqing Gong, Ji Luo, Hoeteck Wee:
Traitor Tracing with N^(1/3)-size Ciphertexts and O(1)-size Keys from k-Lin. IACR Cryptol. ePrint Arch. 2023: 256 (2023) - [i12]Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian:
Registered ABE via Predicate Encodings. IACR Cryptol. ePrint Arch. 2023: 1383 (2023) - 2022
- [j6]Shengyuan Feng, Junqing Gong, Jie Chen:
Binary Tree Encryption with Constant-Size Public Key in the Standard Model. Comput. J. 65(6): 1489-1511 (2022) - 2021
- [j5]Junqing Gong, Haifeng Qian:
Simple and efficient FE for quadratic functions. Des. Codes Cryptogr. 89(8): 1757-1786 (2021) - [c16]Kai Zhang, Zhe Jiang, Junqing Gong, Haifeng Qian:
Updatable All-But-One Dual Projective Hashing and Its Applications. ICICS (2) 2021: 358-374 - [c15]Shengyuan Feng, Junqing Gong, Jie Chen:
Master-Key KDM-Secure ABE via Predicate Encoding. Public Key Cryptography (1) 2021: 543-572 - [i11]Shengyuan Feng, Junqing Gong, Jie Chen:
Master-Key KDM-Secure ABE via Predicate Encoding. IACR Cryptol. ePrint Arch. 2021: 246 (2021) - 2020
- [c14]Michel Abdalla, Junqing Gong, Hoeteck Wee:
Functional Encryption for Attribute-Weighted Sums from k-Lin. CRYPTO (1) 2020: 685-716 - [c13]Junqing Gong, Hoeteck Wee:
Adaptively Secure ABE for DFA from k-Lin and More. EUROCRYPT (3) 2020: 278-308 - [i10]Junqing Gong, Hoeteck Wee:
Adaptively Secure ABE for DFA from k-Lin and More. IACR Cryptol. ePrint Arch. 2020: 194 (2020) - [i9]Michel Abdalla, Junqing Gong, Hoeteck Wee:
Functional Encryption for Attribute-Weighted Sums from k-Lin. IACR Cryptol. ePrint Arch. 2020: 762 (2020) - [i8]Junqing Gong, Haifeng Qian:
Simple and Efficient FE for Quadratic Functions. IACR Cryptol. ePrint Arch. 2020: 1026 (2020)
2010 – 2019
- 2019
- [c12]Junqing Gong, Brent Waters, Hoeteck Wee:
ABE for DFA from k-Lin. CRYPTO (2) 2019: 732-764 - [i7]Junqing Gong, Brent Waters, Hoeteck Wee:
ABE for DFA from k-Lin. IACR Cryptol. ePrint Arch. 2019: 630 (2019) - 2018
- [j4]Jie Zhang, Jie Chen, Junqing Gong, Aijun Ge, Chuangui Ma:
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings. Des. Codes Cryptogr. 86(6): 1339-1366 (2018) - [c11]Jiangtao Li, Junqing Gong:
Improved Anonymous Broadcast Encryptions - Tight Security and Shorter Ciphertext. ACNS 2018: 497-515 - [c10]Jie Chen, Junqing Gong, Hoeteck Wee:
Improved Inner-Product Encryption with Adaptive Security and Full Attribute-Hiding. ASIACRYPT (2) 2018: 673-702 - [c9]Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee:
Unbounded ABE via Bilinear Entropy Expansion, Revisited. EUROCRYPT (1) 2018: 503-534 - [c8]Junqing Gong, Benoît Libert, Somindu C. Ramanna:
Compact IBBE and Fuzzy IBE from Simple Assumptions. SCN 2018: 563-582 - [i6]Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee:
Unbounded ABE via Bilinear Entropy Expansion, Revisited. IACR Cryptol. ePrint Arch. 2018: 116 (2018) - [i5]Jie Chen, Junqing Gong, Hoeteck Wee:
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding. IACR Cryptol. ePrint Arch. 2018: 833 (2018) - 2017
- [c7]Jie Chen, Junqing Gong:
ABE with Tag Made Easy - Concise Framework and New Instantiations in Prime-Order Groups. ASIACRYPT (2) 2017: 35-65 - [c6]Jie Chen, Junqing Gong, Jian Weng:
Tightly Secure IBE Under Constant-Size Master Public Key. Public Key Cryptography (1) 2017: 207-231 - [i4]Jie Chen, Junqing Gong:
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups. IACR Cryptol. ePrint Arch. 2017: 859 (2017) - 2016
- [j3]Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen:
Almost-Tight Identity Based Encryption Against Selective Opening Attack. Comput. J. 59(11): 1669-1688 (2016) - [j2]Junqing Gong, Zhenfu Cao, Shaohua Tang, Jie Chen:
Extended dual system group and shorter unbounded hierarchical identity based encryption. Des. Codes Cryptogr. 80(3): 525-559 (2016) - [c5]Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao:
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. ASIACRYPT (2) 2016: 624-654 - [c4]Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao:
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. AsiaCCS 2016: 269-279 - [c3]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong, Jie Chen:
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. ESORICS (2) 2016: 551-569 - [c2]Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. Public Key Cryptography (1) 2016: 133-163 - [i3]Junqing Gong, Xiaolei Dong, Jie Chen, Zhenfu Cao:
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. IACR Cryptol. ePrint Arch. 2016: 860 (2016) - 2015
- [i2]Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang:
Extended Nested Dual System Groups, Revisited. IACR Cryptol. ePrint Arch. 2015: 820 (2015) - [i1]Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen:
Almost-tight Identity Based Encryption against Selective Opening Attack. IACR Cryptol. ePrint Arch. 2015: 904 (2015) - 2012
- [j1]Haifeng Qian, Junqing Gong, Yuan Zhou:
Anonymous password-based key exchange with low resources consumption and better user-friendliness. Secur. Commun. Networks 5(12): 1379-1393 (2012) - 2010
- [c1]Junqing Gong, Haifeng Qian, Yuan Zhou:
Fully-Secure and Practical Sanitizable Signatures. Inscrypt 2010: 300-317
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-14 23:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint