Name
Affiliation
Papers
JUNZUO LAI
Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China and School of Information Systems, Singapore Management University, Singapore
47
Collaborators
Citations 
PageRank 
63
419
24.55
Referers 
Referees 
References 
893
866
964
Search Limit
100893
Title
Citations
PageRank
Year
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing00.342023
Anonymous Public Key Encryption under Corruptions.00.342022
Event-oriented linkable and traceable anonymous authentication and its application to voting00.342021
Publicly Traceable Attribute-Based Anonymous Authentication And Its Application To Voting00.342021
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation.00.342020
LaT-Voting - Traceable Anonymous E-Voting on Blockchain.00.342019
Practical public key encryption with selective opening security for receivers.00.342019
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.20.362019
Unforgeable Watermarking Schemes with Public Extraction.00.342018
Constant-Size Cca-Secure Multi-Hop Unidirectional Proxy Re-Encryption From Indistinguishability Obfuscation00.342018
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.40.372018
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks.00.342018
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.00.342018
Anonymous Attribute-Based Conditional Proxy Re-encryption.00.342018
Lattice-Based Universal Accumulator With Nonmembership Arguments00.342018
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.00.342017
Dual trapdoor identity-based encryption with keyword search30.392017
Adaptable key-policy attribute-based encryption with time interval.110.492017
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.50.392016
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.00.342016
CCA-Secure Keyed-Fully Homomorphic Encryption.20.362016
Secret Handshakes with Dynamic Expressive Matching Policy.00.342016
Fuzzy certificateless signature.10.372016
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption220.722016
Efficient revocable identity‐based encryption from multilinear maps00.342015
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.90.462014
Towards semantically secure outsourcing of association rule mining on categorical data30.402014
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption110.572014
Attribute-Based Encryption With Verifiable Outsourced Decryption852.372013
Adaptable Ciphertext-Policy Attribute-Based Encryption.80.532013
Expressive search on encrypted data80.452013
Verifiable and private top-k monitoring20.382013
Accountable Trapdoor Sanitizable Signatures.70.402013
Accountable authority identity-based encryption with public traceability20.362013
Expressive CP-ABE with partially hidden access structures360.942012
General construction of chameleon all-but-one trapdoor functions10.362011
Fully secure cipertext-policy hiding CP-ABE180.632011
On two RFID privacy notions and their relations90.572011
Self-generated-certificate public key encryption without pairing and its application80.552011
Hierarchical identity-based chameleon hash and its applications60.412011
Chameleon all-but-one TDFs and their application to chosen-ciphertext security60.472011
New constructions for identity-based unidirectional proxy re-encryption110.572010
Revisiting unpredictability-based RFID privacy models90.512010
Efficient CCA-Secure PKE from identity-based techniques300.952010
Conditional proxy re-encryption secure against chosen-ciphertext attack752.092009
RSA-Based Certificateless Public Key Encryption40.422009
Self-generated-certificate public key encryption without pairing210.952007