Follow
Long Chen
Long Chen
Institue of Software Chinese Academy of Sciences
Verified email at iscas.ac.cn
Title
Cited by
Cited by
Year
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
H Jiang, Z Zhang, L Chen, H Wang, Z Ma
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
95*2018
Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension
L Chen, Z Zhang, X Wang
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
722017
Proof of storage-time: Efficiently checking continuous data availability
G Ateniese, L Chen, M Etemad, Q Tang
Cryptology ePrint Archive, 2020
202020
People who live in glass houses should not throw stones: targeted opening message franking schemes
L Chen, Q Tang
Cryptology ePrint Archive, 2018
132018
CCA updatable encryption against malicious re-encryption attacks
L Chen, Y Li, Q Tang
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
122020
On the hardness of the computational Ring-LWR problem and its applications
L Chen, Z Zhang, Z Zhang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
102018
Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise
L Chen, Z Zhang
Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017
72017
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts
T Zhou, L Chen, X Che, W Liu, Z Zhang, X Yang
Cryptology ePrint Archive, 2021
42021
Multi-input Laconic Function Evaluation
B Pang, L Chen, X Fan, Q Tang
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
12020
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting)
G Ateniese, L Chen, D Francati, D Papadopoulos, Q Tang
Public-Key Cryptography–PKC 2023: 26th IACR International Conference on …, 2023
2023
{End-to-Same-End} Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
L Chen, YN Li, Q Tang, M Yung
31st USENIX Security Symposium (USENIX Security 22), 2353-2370, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–11