Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Dan Graur
Barbara Aquilani
Kwang Chun Lee
Maximilian Dürr
Jhonathan Pinzon
François Charoy
Liangliang Shang
Chen Ma
Z. Liu
Home
/
Author
/
JUNZUO LAI
Author Info
Open Visualization
Name
Affiliation
Papers
JUNZUO LAI
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China and School of Information Systems, Singapore Management University, Singapore
47
Collaborators
Citations
PageRank
63
419
24.55
Referers
Referees
References
893
866
964
Search Limit
100
893
Publications (47 rows)
Collaborators (63 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing
0
0.34
2023
Anonymous Public Key Encryption under Corruptions.
0
0.34
2022
Event-oriented linkable and traceable anonymous authentication and its application to voting
0
0.34
2021
Publicly Traceable Attribute-Based Anonymous Authentication And Its Application To Voting
0
0.34
2021
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation.
0
0.34
2020
LaT-Voting - Traceable Anonymous E-Voting on Blockchain.
0
0.34
2019
Practical public key encryption with selective opening security for receivers.
0
0.34
2019
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
2
0.36
2019
Unforgeable Watermarking Schemes with Public Extraction.
0
0.34
2018
Constant-Size Cca-Secure Multi-Hop Unidirectional Proxy Re-Encryption From Indistinguishability Obfuscation
0
0.34
2018
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
4
0.37
2018
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks.
0
0.34
2018
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.
0
0.34
2018
Anonymous Attribute-Based Conditional Proxy Re-encryption.
0
0.34
2018
Lattice-Based Universal Accumulator With Nonmembership Arguments
0
0.34
2018
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
0
0.34
2017
Dual trapdoor identity-based encryption with keyword search
3
0.39
2017
Adaptable key-policy attribute-based encryption with time interval.
11
0.49
2017
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
5
0.39
2016
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
0
0.34
2016
CCA-Secure Keyed-Fully Homomorphic Encryption.
2
0.36
2016
Secret Handshakes with Dynamic Expressive Matching Policy.
0
0.34
2016
Fuzzy certificateless signature.
1
0.37
2016
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
22
0.72
2016
Efficient revocable identity‐based encryption from multilinear maps
0
0.34
2015
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.
9
0.46
2014
Towards semantically secure outsourcing of association rule mining on categorical data
3
0.40
2014
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption
11
0.57
2014
Attribute-Based Encryption With Verifiable Outsourced Decryption
85
2.37
2013
Adaptable Ciphertext-Policy Attribute-Based Encryption.
8
0.53
2013
Expressive search on encrypted data
8
0.45
2013
Verifiable and private top-k monitoring
2
0.38
2013
Accountable Trapdoor Sanitizable Signatures.
7
0.40
2013
Accountable authority identity-based encryption with public traceability
2
0.36
2013
Expressive CP-ABE with partially hidden access structures
36
0.94
2012
General construction of chameleon all-but-one trapdoor functions
1
0.36
2011
Fully secure cipertext-policy hiding CP-ABE
18
0.63
2011
On two RFID privacy notions and their relations
9
0.57
2011
Self-generated-certificate public key encryption without pairing and its application
8
0.55
2011
Hierarchical identity-based chameleon hash and its applications
6
0.41
2011
Chameleon all-but-one TDFs and their application to chosen-ciphertext security
6
0.47
2011
New constructions for identity-based unidirectional proxy re-encryption
11
0.57
2010
Revisiting unpredictability-based RFID privacy models
9
0.51
2010
Efficient CCA-Secure PKE from identity-based techniques
30
0.95
2010
Conditional proxy re-encryption secure against chosen-ciphertext attack
75
2.09
2009
RSA-Based Certificateless Public Key Encryption
4
0.42
2009
Self-generated-certificate public key encryption without pairing
21
0.95
2007
1