Jianchang Lai

Orcid: 0000-0001-6533-1204

According to our database1, Jianchang Lai authored at least 31 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GAN-based image steganography by exploiting transform domain knowledge with deep networks.
Multim. Syst., August, 2024

Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance.
IEEE Trans. Ind. Informatics, March, 2024

SDSS: Sequential Data Sharing System in IoT.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Confidential Reporting System With Designated Reporters.
Comput. J., 2024

2023
Full black-box retrievable and accountable identity-based encryption.
Comput. Stand. Interfaces, August, 2023

Research Philosophy of Modern Cryptography.
IACR Cryptol. ePrint Arch., 2023

Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability.
CoRR, 2023

2022
Data Access Control in Cloud Computing: Flexible and Receiver Extendable.
IEEE Trans. Serv. Comput., 2022

Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022

Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022

Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9.
Comput. J., 2022

Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
PPFilter: Provider Privacy-Aware Encrypted Filtering System.
IEEE Trans. Serv. Comput., 2021

Generic construction for tightly-secure signatures from discrete log.
Theor. Comput. Sci., 2021

2020
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020

Searchain: Blockchain-based private keyword search in decentralized storage.
Future Gener. Comput. Syst., 2020

2019
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions.
J. Comput. Sci. Technol., 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019

Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019

2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018

Privacy-enhanced attribute-based private information retrieval.
Inf. Sci., 2018

Identity-Based Broadcast Encryption for Inner Products.
Comput. J., 2018

2017
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Pers. Ubiquitous Comput., 2017

Efficient identity-based online/offline encryption and signcryption with short ciphertext.
Int. J. Inf. Sec., 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017

Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.
Comput. J., 2017

2016
Centralized keyword search on encrypted data for cloud applications.
Secur. Commun. Networks, 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction.
IACR Cryptol. ePrint Arch., 2016

Oblivious Keyword Search with Authorization.
Proceedings of the Provable Security, 2016

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Improved Identity-Based Online/Offline Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015


  Loading...