Li, Yiming; Liu, Shengli; Han, Shuai; Gu, Dawu; Weng, Jian Simulatable verifiable random function from the LWE assumption. (English) Zbl 1521.94053 Theor. Comput. Sci. 957, Article ID 113826, 32 p. (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Li} et al., Theor. Comput. Sci. 957, Article ID 113826, 32 p. (2023; Zbl 1521.94053) Full Text: DOI
Cui, Nan; Liu, Shengli; Gu, Dawu; Weng, Jian Robustly reusable fuzzy extractor with imperfect randomness. (English) Zbl 1462.94034 Des. Codes Cryptography 89, No. 5, 1017-1059 (2021). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. Cui} et al., Des. Codes Cryptography 89, No. 5, 1017--1059 (2021; Zbl 1462.94034) Full Text: DOI
Liu, Xiangyu; Liu, Shengli; Gu, Dawu; Weng, Jian Two-pass authenticated key exchange with explicit authentication and tight security. (English) Zbl 1511.94184 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 785-814 (2020). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{X. Liu} et al., Lect. Notes Comput. Sci. 12492, 785--814 (2020; Zbl 1511.94184) Full Text: DOI
Weng, Jian; Zhao, Yunlei; Deng, Robert H.; Liu, Shengli; Yang, Yanjiang; Sakurai, Kouichi A note on the security of KHL scheme. (English) Zbl 1336.94075 Theor. Comput. Sci. 602, 1-6 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Weng} et al., Theor. Comput. Sci. 602, 1--6 (2015; Zbl 1336.94075) Full Text: DOI
Liu, Shengli; Sakurai, Kouichi; Weng, Jian; Zhang, Fangguo; Zhao, Yunlei Security model and analysis of FHMQV, revisited. (English) Zbl 1347.94048 Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 255-269 (2014). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{S. Liu} et al., Lect. Notes Comput. Sci. 8567, 255--269 (2014; Zbl 1347.94048) Full Text: DOI
Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Weng, Jian; Zhao, Yunlei Identity-based encryption secure against selective opening chosen-ciphertext attack. (English) Zbl 1326.94107 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 77-92 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lai} et al., Lect. Notes Comput. Sci. 8441, 77--92 (2014; Zbl 1326.94107) Full Text: DOI
Liu, Shengli; Weng, Jian; Zhao, Yunlei Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks. (English) Zbl 1312.94071 Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 84-100 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Liu} et al., Lect. Notes Comput. Sci. 7779, 84--100 (2013; Zbl 1312.94071) Full Text: DOI
Weng, Jian; Deng, Robert H.; Liu, Shengli; Chen, Kefei Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. (English) Zbl 1204.94078 Inf. Sci. 180, No. 24, 5077-5089 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Weng} et al., Inf. Sci. 180, No. 24, 5077--5089 (2010; Zbl 1204.94078) Full Text: DOI Link
Wan, Zhong-mei; Lai, Xue-jia; Weng, Jian; Liu, Sheng-li; Long, Yu; Hong, Xuan Strong key-insulated signature in the standard model. (English) Zbl 1218.94046 J. Shanghai Jiaotong Univ., Sci. 15, No. 6, 657-661 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{Z.-m. Wan} et al., J. Shanghai Jiaotong Univ., Sci. 15, No. 6, 657--661 (2010; Zbl 1218.94046) Full Text: DOI
Wan, Zhong-Mei; Lai, Xue-Jia; Weng, Jian; Liu, Sheng-Li; Long, Yu Certificateless key-insulated signature without random oracles. (English) Zbl 1209.94051 J. Zhejiang Univ., Sci. A 10, No. 12, 1790-1800 (2009). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Z.-M. Wan} et al., J. Zhejiang Univ., Sci. A 10, No. 12, 1790--1800 (2009; Zbl 1209.94051) Full Text: DOI
Weng, Jian; Chen, Kefei; Liu, Shengli; Li, Xiangxue Identity-based strong key-insulated signature without random oracles. (English) Zbl 1199.68150 J. Softw. 19, No. 6, 1555-1564 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Weng} et al., J. Softw. 19, No. 6, 1555--1564 (2008; Zbl 1199.68150) Full Text: DOI
Deng, Robert H.; Weng, Jian; Liu, Shengli; Chen, Kefei Chosen-ciphertext secure proxy re-encryption without pairings. (English) Zbl 1362.94026 Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 1-17 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{R. H. Deng} et al., Lect. Notes Comput. Sci. 5339, 1--17 (2008; Zbl 1362.94026) Full Text: DOI
Weng, Jian; Liu, Shengli; Chen, Kefei; Zheng, Dong; Qiu, Weidong Identity-based threshold key-insulated encryption without random oracles. (English) Zbl 1153.94437 Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 203-220 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Weng} et al., Lect. Notes Comput. Sci. 4964, 203--220 (2008; Zbl 1153.94437) Full Text: DOI
Weng, Jian; Liu, Shengli; Chen, Kefei Pirate decoder for the broadcast encryption schemes from Crypto 2005. (English) Zbl 1142.94014 Sci. China, Ser. F. 50, No. 3, 318-323 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Weng} et al., Sci. China, Ser. F 50, No. 3, 318--323 (2007; Zbl 1142.94014) Full Text: DOI
Weng, Jian; Liu, Shengli; Chen, Kefei; Li, Xiangxue Identity-based key-insulated signature with secure key-updates. (English) Zbl 1172.94629 Lipmaa, Helger (ed.) et al., Information security and cryptology. Second SKLOIS conference, Inscrypt 2006, Beijing, China, November 29–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49608-3/pbk). Lecture Notes in Computer Science 4318, 13-26 (2006). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Weng} et al., Lect. Notes Comput. Sci. 4318, 13--26 (2006; Zbl 1172.94629) Full Text: DOI
Weng, Jian; Liu, Shengli; Chen, Kefei; Ma, Changshe Identity-based parallel key-insulated encryption without random oracles: Security notions and construction. (English) Zbl 1175.94120 Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 409-423 (2006). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Weng} et al., Lect. Notes Comput. Sci. 4329, 409--423 (2006; Zbl 1175.94120) Full Text: DOI