default search action
Jianchang Lai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j23]Jinguang Han, Willy Susilo, Liquan Chen, Jianchang Lai, Ge Wu:
Privacy-Preserving Confidential Reporting System With Designated Reporters. Comput. J. 67(5): 1951-1962 (2024) - [j22]Xiao Li, Liquan Chen, Jianchang Lai, Zhangjie Fu, Suhui Liu:
GAN-based image steganography by exploiting transform domain knowledge with deep networks. Multim. Syst. 30(4): 224 (2024) - [j21]Jianchang Lai, Willy Susilo, Robert H. Deng, Fuchun Guo:
SDSS: Sequential Data Sharing System in IoT. IEEE Trans. Inf. Forensics Secur. 19: 2288-2299 (2024) - [j20]Suhui Liu, Liquan Chen, Liqun Chen, Jianchang Lai:
Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance. IEEE Trans. Ind. Informatics 20(3): 4940-4952 (2024) - 2023
- [j19]Zhen Zhao, Willy Susilo, Fuchun Guo, Jianchang Lai, Baocang Wang:
Full black-box retrievable and accountable identity-based encryption. Comput. Stand. Interfaces 86: 103741 (2023) - 2022
- [j18]Jianchang Lai, Xinyi Huang, Debiao He, Wei Wu:
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9. Comput. J. 65(7): 1692-1701 (2022) - [j17]Jianchang Lai, Fuchun Guo, Willy Susilo, Peng Jiang, Guomin Yang, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022) - [j16]Willy Susilo, Peng Jiang, Jianchang Lai, Fuchun Guo, Guomin Yang, Robert H. Deng:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. IEEE Trans. Dependable Secur. Comput. 19(3): 2138-2148 (2022) - [j15]Jianchang Lai, Fuchun Guo, Willy Susilo, Xinyi Huang, Peng Jiang, Futai Zhang:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. IEEE Trans. Serv. Comput. 15(5): 2658-2670 (2022) - 2021
- [j14]Jianchang Lai, Ge Wu, Peng Jiang, Zhen Zhao, Willy Susilo, Fuchun Guo:
Generic construction for tightly-secure signatures from discrete log. Theor. Comput. Sci. 888: 13-21 (2021) - [j13]Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Jianchang Lai, Wenmin Li:
PPFilter: Provider Privacy-Aware Encrypted Filtering System. IEEE Trans. Serv. Comput. 14(5): 1519-1530 (2021) - 2020
- [j12]Peng Jiang, Fuchun Guo, Kaitai Liang, Jianchang Lai, Qiaoyan Wen:
Searchain: Blockchain-based private keyword search in decentralized storage. Future Gener. Comput. Syst. 107: 781-792 (2020) - [j11]Zhen Zhao, Fuchun Guo, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu:
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. Theor. Comput. Sci. 809: 73-87 (2020) - 2019
- [j10]Zhen Zhao, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu, Fuchun Guo:
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption. IEEE Access 7: 25936-25947 (2019) - [j9]Peng Jiang, Jianchang Lai, Fuchun Guo, Willy Susilo, Man Ho Au, Guomin Yang, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j8]Ge Wu, Jianchang Lai, Fuchun Guo, Willy Susilo, Futai Zhang:
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions. J. Comput. Sci. Technol. 34(6): 1366-1379 (2019) - 2018
- [j7]Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. Comput. J. 61(8): 1240-1251 (2018) - [j6]Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Willy Susilo:
Privacy-enhanced attribute-based private information retrieval. Inf. Sci. 454-455: 275-291 (2018) - [j5]Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen, Sha Ma:
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost. Theor. Comput. Sci. 714: 15-26 (2018) - 2017
- [j4]Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen:
Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization. Comput. J. 60(12): 1809-1821 (2017) - [j3]Jianchang Lai, Yi Mu, Fuchun Guo:
Efficient identity-based online/offline encryption and signcryption with short ciphertext. Int. J. Inf. Sec. 16(3): 299-311 (2017) - [j2]Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen:
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city. Pers. Ubiquitous Comput. 21(5): 855-868 (2017) - 2016
- [j1]Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Jianchang Lai:
Centralized keyword search on encrypted data for cloud applications. Secur. Commun. Networks 9(18): 5064-5084 (2016)
Conference and Workshop Papers
- 2022
- [c6]Willy Susilo, Yannan Li, Fuchun Guo, Jianchang Lai, Ge Wu:
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost. ESORICS (2) 2022: 65-85 - 2017
- [c5]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547 - 2016
- [c4]Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen:
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. ACISP (2) 2016: 223-239 - [c3]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. ASIACRYPT (2) 2016: 745-776 - [c2]Peng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen:
Oblivious Keyword Search with Authorization. ProvSec 2016: 173-190 - 2015
- [c1]Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo:
Improved Identity-Based Online/Offline Encryption. ACISP 2015: 160-173
Informal and Other Publications
- 2023
- [i4]Yue Han, Jinguang Han, Weizhi Meng, Jianchang Lai, Ge Wu:
Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability. CoRR abs/2312.16954 (2023) - [i3]Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. IACR Cryptol. ePrint Arch. 2023: 715 (2023) - 2017
- [i2]Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu:
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. IACR Cryptol. ePrint Arch. 2017: 499 (2017) - 2016
- [i1]Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang:
Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. IACR Cryptol. ePrint Arch. 2016: 872 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint