Qiqi Lai

Orcid: 0000-0001-5265-1225

According to our database1, Qiqi Lai authored at least 28 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Leakage-resilient sf IBE/sf ABE with optimal leakage rates from lattices.
Des. Codes Cryptogr., June, 2024

Dual-Mode Encryption for UC-Secure String OT from Learning with Errors.
IET Inf. Secur., 2024

Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR.
IACR Cryptol. ePrint Arch., 2024

Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem.
IACR Cryptol. ePrint Arch., 2024

Analysis, modify and apply in IIOT form light-weight PSI in CM20.
IACR Cryptol. ePrint Arch., 2024

Scalable Two-Round n-out-of-n and Multi-Signatures from Lattices in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2024

More Efficient Two-Stage Sampling Technique and Its Applications.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

2023
Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications.
IACR Cryptol. ePrint Arch., 2023

Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem.
IACR Cryptol. ePrint Arch., 2023

Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023

2022
Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices.
IACR Cryptol. ePrint Arch., 2022

New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts.
IACR Cryptol. ePrint Arch., 2022

2021
Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Int. J. Found. Comput. Sci., 2021

Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations.
IET Inf. Secur., 2021

Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices.
IACR Cryptol. ePrint Arch., 2021

Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks.
IACR Cryptol. ePrint Arch., 2021

2020
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2019
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms.
J. Univers. Comput. Sci., 2019

Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model.
Int. J. Found. Comput. Sci., 2019

Efficient Multi-Party Private Set Intersection Against Malicious Adversaries.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes.
J. Comput. Sci. Technol., 2018

Novel Smooth Hash Proof Systems Based on Lattices.
Comput. J., 2018

Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Natural sd-RCCA Secure Public-Key Encryptions.
Proceedings of the Provable Security, 2017

2015
New method of key-dependent message security for asymmetric encryption.
Secur. Commun. Networks, 2015

Lattice-based multi-use unidirectional proxy re-encryption.
Secur. Commun. Networks, 2015

2014
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model.
Frontiers Comput. Sci., 2014

Lattice-based certificateless encryption scheme.
Frontiers Comput. Sci., 2014


  Loading...