What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Junzuo Lai
Google Scholar
39
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
AuditPCH: Auditable Payment Channel Hub With Privacy Protection.
Yuxian Li
Jian Weng
Junzuo Lai
Yingjiu Li
Jiahe Wu
Ming Li
Jianfei Sun
Pengfei Wu
Robert H. Deng
2025
conf/sp
Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound.
Yi Liu
Junzuo Lai
Peng Yang
Qi Wang
Anjia Yang
Siu-Ming Yiu
Jian Weng
2025
conf/icics
Zero-Knowledge Protocols with PVC Security: Striking the Balance Between Security and Efficiency.
Yi Liu
Yipeng Song
Anjia Yang
Junzuo Lai
2024
conf/asiacrypt
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation.
Zhengan Huang
Junzuo Lai
Gongxian Zeng
Jian Weng
2023
conf/eurocrypt
Asymmetric Group Message Franking: Definitions and Constructions.
Junzuo Lai
Gongxian Zeng
Zhengan Huang
Siu Ming Yiu
Xin Mu
Jian Weng
2023
conf/asiacrypt
Non-interactive Zero-Knowledge Functional Proofs.
Gongxian Zeng
Junzuo Lai
Zhengan Huang
Linru Zhang
Xiangning Wang
Kwok-Yan Lam
Huaxiong Wang
Jian Weng
2023
conf/asiacrypt
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead.
Yi Liu
Junzuo Lai
Qi Wang
Xianrui Qin
Anjia Yang
Jian Weng
2022
conf/provsec
Practical Federated Learning for Samples with Different IDs.
Yu Li
Junzuo Lai
Xiaowei Yuan
Beibei Song
2022
conf/asiacrypt
DAG-Σ: A DAG-Based Sigma Protocol for Relations in CNF.
Gongxian Zeng
Junzuo Lai
Zhengan Huang
Yu Wang
Zhiming Zheng
2022
conf/asiacrypt
Anonymous Public Key Encryption Under Corruptions.
Zhengan Huang
Junzuo Lai
Shuai Han
Lin Lyu
Jian Weng
2021
journals/istr
Event-oriented linkable and traceable anonymous authentication and its application to voting.
Peng Li
Junzuo Lai
Yongdong Wu
2021
conf/asiacrypt
Simulation-Based Bi-Selective Opening Security for Public Key Encryption.
Junzuo Lai
Rupeng Yang
Zhengan Huang
Jian Weng
2020
conf/asiacrypt
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting.
Rupeng Yang
Junzuo Lai
Zhengan Huang
Man Ho Au
Qiuliang Xu
Willy Susilo
2019
conf/asiacrypt
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities.
Rupeng Yang
Man Ho Au
Junzuo Lai
Qiuliang Xu
Zuoxia Yu
2018
conf/ccs
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.
Zuoxia Yu
Man Ho Au
Rupeng Yang
Junzuo Lai
Qiuliang Xu
2018
conf/acisp
Lattice-Based Universal Accumulator with Nonmembership Arguments.
Zuoxia Yu
Man Ho Au
Rupeng Yang
Junzuo Lai
Qiuliang Xu
2018
conf/acisp
Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation.
Junzuo Lai
Zhengan Huang
Man Ho Au
Xianping Mao
2018
conf/esorics
Making Any Attribute-Based Encryption Accountable, Efficiently.
Junzuo Lai
Qiang Tang
2018
conf/pkc
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures.
Zhengan Huang
Junzuo Lai
Wenbin Chen
Man Ho Au
Zhen Peng
Jin Li
2017
conf/provsec
A Secure Cloud Backup System with Deduplication and Assured Deletion.
Junzuo Lai
Jie Xiong
Chuansheng Wang
Guangzheng Wu
Yanling Li
2016
conf/acisp
Secret Handshakes with Dynamic Expressive Matching Policy.
Lin Hou
Junzuo Lai
Lixian Liu
2016
conf/provsec
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Hui Cui
Robert H. Deng
Guowei Wu
Junzuo Lai
2016
conf/pkc
CCA-Secure Keyed-Fully Homomorphic Encryption.
Junzuo Lai
Robert H. Deng
Changshe Ma
Kouichi Sakurai
Jian Weng
2014
conf/ccs
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Junzuo Lai
Robert H. Deng
Yingjiu Li
Jian Weng
2014
conf/esorics
Authorized Keyword Search on Encrypted Data.
Jie Shi
Junzuo Lai
Yingjiu Li
Robert H. Deng
Jian Weng
2014
conf/esorics
Verifiable Computation on Outsourced Encrypted Data.
Junzuo Lai
Robert H. Deng
HweeHwa Pang
Jian Weng
2014
conf/eurocrypt
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack.
Junzuo Lai
Robert H. Deng
Shengli Liu
Jian Weng
Yunlei Zhao
2013
journals/tifs
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Junzuo Lai
Robert H. Deng
Chaowen Guan
Jian Weng
2013
conf/ccs
Expressive search on encrypted data.
Junzuo Lai
Xuhua Zhou
Robert Huijie Deng
Yingjiu Li
Kefei Chen
2013
conf/ccs
Verifiable and private top-k monitoring.
Xuhua Ding
HweeHwa Pang
Junzuo Lai
2013
conf/ctrsa
Accountable Authority Identity-Based Encryption with Public Traceability.
Junzuo Lai
Robert H. Deng
Yunlei Zhao
Jian Weng
2012
conf/ccs
Expressive CP-ABE with partially hidden access structures.
Junzuo Lai
Robert H. Deng
Yingjiu Li
2011
conf/acns
Hierarchical Identity-Based Chameleon Hash and Its Applications.
Feng Bao
Robert H. Deng
Xuhua Ding
Junzuo Lai
Yunlei Zhao
2011
conf/provsec
General Construction of Chameleon All-But-One Trapdoor Functions.
Shengli Liu
Junzuo Lai
Robert H. Deng
2011
conf/pkc
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security.
Junzuo Lai
Robert H. Deng
Shengli Liu
2010
conf/acns
Revisiting Unpredictability-Based RFID Privacy Models.
Junzuo Lai
Robert H. Deng
Yingjiu Li
2010
conf/ctrsa
Efficient CCA-Secure PKE from Identity-Based Techniques.
Junzuo Lai
Robert H. Deng
Shengli Liu
Weidong Kou
2009
conf/ccs
Conditional proxy re-encryption secure against chosen-ciphertext attack.
Jian Weng
Robert H. Deng
Xuhua Ding
Cheng-Kang Chu
Junzuo Lai
2007
conf/pkc
Self-Generated-Certificate Public Key Encryption Without Pairing.
Junzuo Lai
Weidong Kou
Coauthors
Anjia Yang
(3)
Beibei Song
(1)
Changshe Ma
(1)
Chaowen Guan
(1)
Cheng-Kang Chu
(1)
Chuansheng Wang
(1)
Feng Bao
(1)
Gongxian Zeng
(4)
Guangzheng Wu
(1)
Guowei Wu
(1)
Huaxiong Wang
(1)
Hui Cui
(1)
HweeHwa Pang
(2)
Jiahe Wu
(1)
Jian Weng
(16)
Jianfei Sun
(1)
Jie Shi
(1)
Jie Xiong
(1)
Jin Li
(1)
Junzuo Lai
(39)
Kefei Chen
(1)
Kouichi Sakurai
(1)
Kwok-Yan Lam
(1)
Lin Hou
(1)
Lin Lyu
(1)
Linru Zhang
(1)
Lixian Liu
(1)
Man Ho Au
(6)
Ming Li
(1)
Peng Li
(1)
Peng Yang
(1)
Pengfei Wu
(1)
Qi Wang
(2)
Qiang Tang
(1)
Qiuliang Xu
(4)
Robert H. Deng
(16)
Robert Huijie Deng
(1)
Rupeng Yang
(5)
Shengli Liu
(4)
Shuai Han
(1)
Siu Ming Yiu
(1)
Siu-Ming Yiu
(1)
Weidong Kou
(2)
Wenbin Chen
(1)
Willy Susilo
(1)
Xiangning Wang
(1)
Xianping Mao
(1)
Xianrui Qin
(1)
Xiaowei Yuan
(1)
Xin Mu
(1)
Xuhua Ding
(3)
Xuhua Zhou
(1)
Yanling Li
(1)
Yi Liu
(3)
Yingjiu Li
(6)
Yipeng Song
(1)
Yongdong Wu
(1)
Yu Li
(1)
Yu Wang
(1)
Yunlei Zhao
(3)
Yuxian Li
(1)
Zhen Peng
(1)
Zhengan Huang
(9)
Zhiming Zheng
(1)
Zuoxia Yu
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to