Huiwen Jia

Orcid: 0000-0002-9289-5918

According to our database1, Huiwen Jia authored at least 45 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Online Learning and Pricing for Service Systems with Reusable Resources.
Oper. Res., 2024

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption.
IET Inf. Secur., 2024

Dual-Mode Encryption for UC-Secure String OT from Learning with Errors.
IET Inf. Secur., 2024

Towards Compact Identity-based Encryption on Ideal Lattices.
IACR Cryptol. ePrint Arch., 2024

2023
Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices.
Int. J. Secur. Networks, 2023

Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures.
IACR Cryptol. ePrint Arch., 2023

2022
Verifier-local revocation group signatures with backward unlinkability from lattices.
Frontiers Inf. Technol. Electron. Eng., 2022

The University of Michigan Implements a Hub-and-Spoke Design to Accommodate Social Distancing in the Campus Bus System Under COVID-19 Restrictions.
INFORMS J. Appl. Anal., 2022

Lattice-based hash-and-sign signatures using approximate trapdoor, revisited.
IET Inf. Secur., 2022

Online Learning and Pricing for Network Revenue Management with Reusable Resources.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Online Learning and Pricing with Reusable Resources: Linear Bandits with Sub-Exponential Rewards.
Proceedings of the International Conference on Machine Learning, 2022

New Trapdoor and Preimage Sampling on NTRU Lattice.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
Benders Cut Classification via Support Vector Machines for Solving Two-Stage Stochastic Programs.
INFORMS J. Optim., July, 2021

Multi-armed bandit with sub-exponential rewards.
Oper. Res. Lett., 2021

Scenario Grouping and Decomposition Algorithms for Chance-Constrained Programs.
INFORMS J. Comput., 2021

Cryptanalysis of a non-interactive deniable ring signature scheme.
Int. J. Inf. Sec., 2021

Lattice-Based Logarithmic-Size Non-Interactive Deniable Ring Signatures.
Entropy, 2021

Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018.
Proceedings of the Network and System Security - 15th International Conference, 2021

On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices.
Proceedings of the Network and System Security - 15th International Conference, 2021

Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
An Optimization-and-Simulation Framework for Redesigning University Campus Bus System with Social Distancing.
CoRR, 2020

Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Context-aware Route Recommendation with Weight Learning through Deep Neural Networks.
Proceedings of the 2020 American Control Conference, 2020

On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe.
J. Inf. Secur. Appl., 2019

A new Gaussian sampling for trapdoor lattices with arbitrary modulus.
Des. Codes Cryptogr., 2019

Track Occupation Detection Based on a Maximum Posterior Probability Model Using Multisensor Data Fusion.
Comput. Sci. Eng., 2019

On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation.
Proceedings of the Information Security - 22nd International Conference, 2019

Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Attribute-Based Signatures for Inner-Product Predicate from Lattices.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Extensional schemes of multipartite non-interactive key exchange from multilinear maps and their applications.
Int. J. High Perform. Comput. Netw., 2018

Fuzzy Identity-Based Signature from Lattices for Identities in a Large Universe.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Attribute-Based VLR Group Signature Scheme from Lattices.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Efficient Lattice FIBS for Identities in a Small Universe.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
基于混淆的广播多重签名方案 (Obfuscation-based Broadcasting Multi-signature Scheme).
计算机科学, 2017

Cryptanalysis of multilinear maps from ideal lattices: revisited.
Des. Codes Cryptogr., 2017

2015
An Additively Homomorphic Encryption over Large Message Space.
Int. J. Inf. Technol. Web Eng., 2015

An Optimization of Gu Map-1.
IACR Cryptol. ePrint Arch., 2015

A Comment on Gu Map-1.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of GGH Map.
IACR Cryptol. ePrint Arch., 2015

Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps.
Proceedings of the 10th International Conference on P2P, 2015

An Additively Homomorphic Encryption from Ideal Lattices.
Proceedings of the 10th International Conference on P2P, 2015


  Loading...