Junzuo Lai
Orcid: 0000-0001-5780-8463
According to our database1,
Junzuo Lai
authored at least 77 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Frontiers Comput. Sci., February, 2025
2024
Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data.
IEEE Trans. Intell. Transp. Syst., October, 2024
J. Syst. Archit., January, 2024
Inf. Sci., January, 2024
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation.
IACR Cryptol. ePrint Arch., 2024
EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Comput. Networks, December, 2023
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions.
IEEE Commun. Mag., August, 2023
Multi-authority anonymous authentication with public accountability for incentive-based applications.
Comput. Networks, July, 2023
Receiver selective opening security for identity-based encryption in the multi-challenge setting.
Des. Codes Cryptogr., April, 2023
Ad Hoc Networks, March, 2023
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing.
Frontiers Comput. Sci., 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Provable and Practical Security, 2022
2021
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting.
Secur. Commun. Networks, 2021
Event-oriented linkable and traceable anonymous authentication and its application to voting.
J. Inf. Secur. Appl., 2021
IACR Cryptol. ePrint Arch., 2021
2020
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation.
Theor. Comput. Sci., 2020
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting.
IACR Cryptol. ePrint Arch., 2020
2019
Inf. Sci., 2019
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs.
Inf. Sci., 2019
Simulation-based selective opening security for receivers under chosen-ciphertext attacks.
Des. Codes Cryptogr., 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
2018
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptol. ePrint Arch., 2018
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited.
Comput. Networks, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Soft Comput., 2017
IACR Cryptol. ePrint Arch., 2017
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information Security Practice and Experience, 2017
2016
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Secur. Comput., 2016
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
Secur. Commun. Networks, 2016
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures.
Proceedings of the Provable Security, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Secur. Commun. Networks, 2015
IACR Cryptol. ePrint Arch., 2015
2014
Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
J. Internet Serv. Inf. Secur., 2011
Self-generated-certificate public key encryption without pairing and its application.
Inf. Sci., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
J. Comput. Sci. Technol., 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
IACR Cryptol. ePrint Arch., 2008
2007
Proceedings of the Public Key Cryptography, 2007