Jianchang Lai
Orcid: 0000-0001-6533-1204
According to our database1,
Jianchang Lai
authored at least 31 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
GAN-based image steganography by exploiting transform domain knowledge with deep networks.
Multim. Syst., August, 2024
Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance.
IEEE Trans. Ind. Informatics, March, 2024
Comput. J., 2024
2023
Comput. Stand. Interfaces, August, 2023
Blockchain-based Privacy-Preserving Public Key Searchable Encryption with Strong Traceability.
CoRR, 2023
2022
IEEE Trans. Serv. Comput., 2022
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022
Comput. J., 2022
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
IEEE Trans. Serv. Comput., 2021
Theor. Comput. Sci., 2021
2020
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020
Future Gener. Comput. Syst., 2020
2019
J. Comput. Sci. Technol., 2019
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019
2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018
2017
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Pers. Ubiquitous Comput., 2017
Efficient identity-based online/offline encryption and signcryption with short ciphertext.
Int. J. Inf. Sec., 2017
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017
Comput. J., 2017
2016
Secur. Commun. Networks, 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Provable Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015