Jie Chen
Orcid: 0000-0001-6757-6416Affiliations:
- East China Normal University, School of Software Engineering, Shanghai Key Laboratory of Trustworthy Computing, Shanghai, China
- Tongji University, Shanghai Institute of Intelligent Science and Technology, Shanghai, China
- Nanyang Technological University, Department of Mathematics, Singapore (PhD 2013)
According to our database1,
Jie Chen
authored at least 59 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control.
Frontiers Comput. Sci., June, 2024
2023
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy.
Comput. J., October, 2023
IET Inf. Secur., July, 2023
IEEE Trans. Artif. Intell., June, 2023
IEEE Trans. Serv. Comput., 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage.
IEEE Trans. Cloud Comput., 2022
IACR Cryptol. ePrint Arch., 2022
Comput. J., 2022
2021
Secur. Commun. Networks, 2021
Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-Assisted E-Healthcare Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
Theor. Comput. Sci., 2020
Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data.
IEEE Access, 2020
2019
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
Comput. J., 2019
IEEE Access, 2019
IEEE Access, 2019
2018
Pervasive Mob. Comput., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Fundam. Informaticae, 2018
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings.
Des. Codes Cryptogr., 2018
2017
Secur. Commun. Networks, 2017
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups.
IACR Cryptol. ePrint Arch., 2017
Frontiers Comput. Sci., 2017
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
2016
New application of partitioning methodology: identity-based dual receiver encryption.
Secur. Commun. Networks, 2016
Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016
Comput. J., 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently.
Proceedings of the Computer Security - ESORICS 2016, 2016
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
The relation and transformation between hierarchical inner product encryption and spatial encryption.
Des. Codes Cryptogr., 2014
Des. Codes Cryptogr., 2014
2013
IACR Cryptol. ePrint Arch., 2013
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
CoRR, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
2011
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011