default search action
Junzuo Lai
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Peng Li, Junzuo Lai, Dehua Zhou, Lianguan Huang, Meng Sun, Wei Wu, Ye Yang:
Linkable and traceable anonymous authentication with fine-grained access control. Frontiers Comput. Sci. 19(2): 192801 (2025) - 2024
- [j31]Shanxiang Lyu, Ling Liu, Cong Ling, Junzuo Lai, Hao Chen:
Lattice codes for lattice-based PKE. Des. Codes Cryptogr. 92(4): 917-939 (2024) - [j30]Yanling Li, Junzuo Lai, Rong Zhang, Meng Sun:
Secure and efficient multi-key aggregation for federated learning. Inf. Sci. 654: 119830 (2024) - [j29]Peng Li, Dehua Zhou, Haobin Ma, Junzuo Lai:
Flexible and secure access control for EHR sharing based on blockchain. J. Syst. Archit. 146: 103033 (2024) - [j28]Lulu Han, Weiqi Luo, Rongxing Lu, Yandong Zheng, Anjia Yang, Junzuo Lai, Yudan Cheng, Yongxin Zhang:
Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data. IEEE Trans. Intell. Transp. Syst. 25(10): 12999-13013 (2024) - [c43]Xin Mu, Yu Wang, Zhengan Huang, Junzuo Lai, Yehong Zhang, Hui Wang, Yue Yu:
EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection. AAAI 2024: 21438-21445 - [c42]Zhengan Huang, Junzuo Lai, Gongxian Zeng, Jian Weng:
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation. ASIACRYPT (2) 2024: 266-295 - [i17]Zhengan Huang, Junzuo Lai, Gongxian Zeng, Jian Weng:
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation. IACR Cryptol. ePrint Arch. 2024: 1608 (2024) - 2023
- [j27]Lulu Han, Weiqi Luo, Anjia Yang, Yandong Zheng, Rongxing Lu, Junzuo Lai, Yudan Cheng:
Fully privacy-preserving location recommendation in outsourced environments. Ad Hoc Networks 141: 103077 (2023) - [j26]Xiuyuan Chen, Chao Lin, Wei Wu, Jianting Ning, Junzuo Lai, Debiao He:
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions. IEEE Commun. Mag. 61(8): 130-136 (2023) - [j25]Peng Li, Junzuo Lai, Dehua Zhou, Ye Yang, Wei Wu, Junbin Fang:
Multi-authority anonymous authentication with public accountability for incentive-based applications. Comput. Networks 231: 109828 (2023) - [j24]Peng Li, Junzuo Lai, Ye Yang, Meng Sun, Chi Wu, Wei Wu, Xiaowei Yuan:
Attribute-based anonymous credential: Delegation, traceability, and revocation. Comput. Networks 237: 110086 (2023) - [j23]Zhengan Huang, Junzuo Lai, Gongxian Zeng, Xin Mu:
Receiver selective opening security for identity-based encryption in the multi-challenge setting. Des. Codes Cryptogr. 91(4): 1233-1259 (2023) - [j22]Peng Li, Junzuo Lai, Yongdong Wu:
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing. Frontiers Comput. Sci. 17(1): 171802 (2023) - [j21]Yongdong Wu, Jian Weng, Zhengxia Wang, Kaimin Wei, Jinming Wen, Junzuo Lai, Xin Li:
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes. IEEE Trans. Dependable Secur. Comput. 20(2): 1744-1755 (2023) - [j20]Lulu Han, Weiqi Luo, Yaxi Yang, Anjia Yang, Rongxing Lu, Junzuo Lai, Yandong Zheng:
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments. IEEE Trans. Serv. Comput. 16(5): 3564-3577 (2023) - [c41]Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng:
Non-interactive Zero-Knowledge Functional Proofs. ASIACRYPT (5) 2023: 236-268 - [c40]Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. ASIACRYPT (1) 2023: 272-301 - [c39]Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng:
Asymmetric Group Message Franking: Definitions and Constructions. EUROCRYPT (5) 2023: 67-97 - [i16]Xin Mu, Yu Wang, Zhengan Huang, Junzuo Lai, Yehong Zhang, Hui Wang, Yue Yu:
EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection. CoRR abs/2312.12049 (2023) - [i15]Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng:
Asymmetric Group Message Franking: Definitions & Constructions. IACR Cryptol. ePrint Arch. 2023: 332 (2023) - [i14]Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. IACR Cryptol. ePrint Arch. 2023: 1392 (2023) - [i13]Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng:
Non-Interactive Zero-Knowledge Functional Proofs. IACR Cryptol. ePrint Arch. 2023: 1759 (2023) - 2022
- [c38]Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng:
DAG-Σ: A DAG-Based Sigma Protocol for Relations in CNF. ASIACRYPT (2) 2022: 340-370 - [c37]Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng:
Anonymous Public Key Encryption Under Corruptions. ASIACRYPT (3) 2022: 423-453 - [c36]Yu Li, Junzuo Lai, Xiaowei Yuan, Beibei Song:
Practical Federated Learning for Samples with Different IDs. ProvSec 2022: 176-195 - [i12]Shanxiang Lyu, Ling Liu, Junzuo Lai, Cong Ling, Hao Chen:
Lattice Codes for Lattice-Based PKE. CoRR abs/2208.13325 (2022) - [i11]Shanxiang Lyu, Ling Liu, Junzuo Lai, Cong Ling, Hao Chen:
Lattice Codes for Lattice-Based PKE. IACR Cryptol. ePrint Arch. 2022: 874 (2022) - [i10]Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng:
Anonymous Public Key Encryption under Corruptions. IACR Cryptol. ePrint Arch. 2022: 1176 (2022) - [i9]Gongxian Zeng, Junzuo Lai, Zhengan Huang, Yu Wang, Zhiming Zheng:
DAG-Σ: A DAG-based Sigma Protocol for Relations in CNF. IACR Cryptol. ePrint Arch. 2022: 1569 (2022) - 2021
- [j19]Peng Li, Junzuo Lai, Yongdong Wu:
Event-oriented linkable and traceable anonymous authentication and its application to voting. J. Inf. Secur. Appl. 60: 102865 (2021) - [j18]Peng Li, Junzuo Lai, Yongdong Wu:
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting. Secur. Commun. Networks 2021: 6611518:1-6611518:17 (2021) - [c35]Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng:
Simulation-Based Bi-Selective Opening Security for Public Key Encryption. ASIACRYPT (2) 2021: 456-482 - [i8]Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng:
Simulation-Based Bi-Selective Opening Security for Public Key Encryption. IACR Cryptol. ePrint Arch. 2021: 1268 (2021) - 2020
- [j17]Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao:
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation. Theor. Comput. Sci. 847: 1-16 (2020) - [c34]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. ASIACRYPT (1) 2020: 191-220 - [i7]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. IACR Cryptol. ePrint Arch. 2020: 1080 (2020)
2010 – 2019
- 2019
- [j16]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-based selective opening security for receivers under chosen-ciphertext attacks. Des. Codes Cryptogr. 87(6): 1345-1371 (2019) - [j15]Zhengan Huang, Junzuo Lai, Wenbin Chen, Tong Li, Yang Xiang:
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs. Inf. Sci. 471: 201-215 (2019) - [j14]Zhengan Huang, Junzuo Lai, Wenbin Chen, Muhammad Raees-ul-Haq, Liaoliang Jiang:
Practical public key encryption with selective opening security for receivers. Inf. Sci. 478: 15-27 (2019) - [c33]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. ASIACRYPT (1) 2019: 371-398 - [c32]Peng Li, Junzuo Lai:
LaT-Voting: Traceable Anonymous E-Voting on Blockchain. NSS 2019: 234-254 - 2018
- [j13]Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal:
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. Comput. Networks 133: 157-165 (2018) - [c31]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Lattice-Based Universal Accumulator with Nonmembership Arguments. ACISP 2018: 502-519 - [c30]Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao:
Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. ACISP 2018: 805-812 - [c29]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. AsiaCCS 2018: 659-672 - [c28]Junzuo Lai, Qiang Tang:
Making Any Attribute-Based Encryption Accountable, Efficiently. ESORICS (2) 2018: 527-547 - [c27]Xianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai:
Anonymous Attribute-Based Conditional Proxy Re-encryption. NSS 2018: 95-110 - [c26]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Public Key Cryptography (1) 2018: 253-279 - [c25]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Unforgeable Watermarking Schemes with Public Extraction. SCN 2018: 63-80 - [i6]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. IACR Cryptol. ePrint Arch. 2018: 25 (2018) - [i5]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2018: 755 (2018) - 2017
- [j12]Jia-Nan Liu, Junzuo Lai, Xinyi Huang:
Dual trapdoor identity-based encryption with keyword search. Soft Comput. 21(10): 2599-2607 (2017) - [j11]Siqi Ma, Junzuo Lai, Robert H. Deng, Xuhua Ding:
Adaptable key-policy attribute-based encryption with time interval. Soft Comput. 21(20): 6191-6200 (2017) - [c24]Yanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang, Jie Xiong:
Verifiable Range Query Processing for Cloud Computing. ISPEC 2017: 333-349 - [c23]Junzuo Lai, Jie Xiong, Chuansheng Wang, Guangzheng Wu, Yanling Li:
A Secure Cloud Backup System with Deduplication and Assured Deletion. ProvSec 2017: 74-83 - [i4]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR. IACR Cryptol. ePrint Arch. 2017: 781 (2017) - [i3]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. IACR Cryptol. ePrint Arch. 2017: 1201 (2017) - 2016
- [j10]Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long:
Fuzzy certificateless signature. Secur. Commun. Networks 9(16): 3658-3669 (2016) - [j9]Lixian Liu, Junzuo Lai, Robert H. Deng, Yingjiu Li:
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur. Commun. Networks 9(18): 4897-4913 (2016) - [j8]Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng:
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. IEEE Trans. Dependable Secur. Comput. 13(5): 533-546 (2016) - [c22]Lin Hou, Junzuo Lai, Lixian Liu:
Secret Handshakes with Dynamic Expressive Matching Policy. ACISP (1) 2016: 461-476 - [c21]Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng:
CCA-Secure Keyed-Fully Homomorphic Encryption. Public Key Cryptography (1) 2016: 70-98 - [c20]Hui Cui, Robert H. Deng, Guowei Wu, Junzuo Lai:
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures. ProvSec 2016: 19-38 - 2015
- [j7]Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng, Qixiang Mei:
Efficient revocable identity-based encryption from multilinear maps. Secur. Commun. Networks 8(18): 3511-3522 (2015) - [i2]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. IACR Cryptol. ePrint Arch. 2015: 297 (2015) - 2014
- [j6]Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng, Chaowen Guan, Qiang Yan:
Towards semantically secure outsourcing of association rule mining on categorical data. Inf. Sci. 267: 267-286 (2014) - [c19]Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng:
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. AsiaCCS 2014: 239-248 - [c18]Junzuo Lai, Robert H. Deng, HweeHwa Pang, Jian Weng:
Verifiable Computation on Outsourced Encrypted Data. ESORICS (1) 2014: 273-291 - [c17]Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng:
Authorized Keyword Search on Encrypted Data. ESORICS (1) 2014: 419-435 - [c16]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. EUROCRYPT 2014: 77-92 - 2013
- [j5]Junzuo Lai, Robert H. Deng, Chaowen Guan, Jian Weng:
Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 8(8): 1343-1354 (2013) - [c15]Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen:
Expressive search on encrypted data. AsiaCCS 2013: 243-252 - [c14]Xuhua Ding, HweeHwa Pang, Junzuo Lai:
Verifiable and private top-k monitoring. AsiaCCS 2013: 553-558 - [c13]Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng:
Accountable Authority Identity-Based Encryption with Public Traceability. CT-RSA 2013: 326-342 - [c12]Junzuo Lai, Xuhua Ding, Yongdong Wu:
Accountable Trapdoor Sanitizable Signatures. ISPEC 2013: 117-131 - [c11]Junzuo Lai, Robert H. Deng, Yanjiang Yang, Jian Weng:
Adaptable Ciphertext-Policy Attribute-Based Encryption. Pairing 2013: 199-214 - 2012
- [c10]Junzuo Lai, Robert H. Deng, Yingjiu Li:
Expressive CP-ABE with partially hidden access structures. AsiaCCS 2012: 18-19 - 2011
- [j4]Junzuo Lai, Weidong Kou, Kefei Chen:
Self-generated-certificate public key encryption without pairing and its application. Inf. Sci. 181(11): 2422-2435 (2011) - [j3]Shengli Liu, Junzuo Lai, Robert H. Deng:
General Construction of Chameleon All-But-One Trapdoor Functions. J. Internet Serv. Inf. Secur. 1(2/3): 74-88 (2011) - [j2]Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma:
On two RFID privacy notions and their relations. ACM Trans. Inf. Syst. Secur. 14(4): 30:1-30:23 (2011) - [c9]Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. ACNS 2011: 201-219 - [c8]Junzuo Lai, Robert H. Deng, Yingjiu Li:
Fully Secure Cipertext-Policy Hiding CP-ABE. ISPEC 2011: 24-39 - [c7]Junzuo Lai, Robert H. Deng, Shengli Liu:
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. Public Key Cryptography 2011: 228-245 - [c6]Shengli Liu, Junzuo Lai, Robert H. Deng:
General Construction of Chameleon All-But-One Trapdoor Functions. ProvSec 2011: 257-265 - 2010
- [j1]Junzuo Lai, Wen Tao Zhu, Robert H. Deng, Shengli Liu, Weidong Kou:
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption. J. Comput. Sci. Technol. 25(4): 793-806 (2010) - [c5]Junzuo Lai, Robert H. Deng, Yingjiu Li:
Revisiting Unpredictability-Based RFID Privacy Models. ACNS 2010: 475-492 - [c4]Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou:
Efficient CCA-Secure PKE from Identity-Based Techniques. CT-RSA 2010: 132-147
2000 – 2009
- 2009
- [c3]Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai:
Conditional proxy re-encryption secure against chosen-ciphertext attack. AsiaCCS 2009: 322-332 - [c2]Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou:
RSA-Based Certificateless Public Key Encryption. ISPEC 2009: 24-34 - 2008
- [i1]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xu An Wang:
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. IACR Cryptol. ePrint Arch. 2008: 509 (2008) - 2007
- [c1]Junzuo Lai, Weidong Kou:
Self-Generated-Certificate Public Key Encryption Without Pairing. Public Key Cryptography 2007: 476-489
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint