Long Chen
Cited by
Cited by
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
H Jiang, Z Zhang, L Chen, H Wang, Z Ma
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension
L Chen, Z Zhang, X Wang
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
Proof of storage-time: Efficiently checking continuous data availability
G Ateniese, L Chen, M Etemad, Q Tang
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
CCA updatable encryption against malicious re-encryption attacks
L Chen, Y Li, Q Tang
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
People who live in glass houses should not throw stones: targeted opening message franking schemes
L Chen, Q Tang
Cryptology ePrint Archive, 2018
On the hardness of the computational Ring-LWR problem and its applications
L Chen, Z Zhang, Z Zhang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise
L Chen, Z Zhang
International Conference on Provable Security, 285-304, 2017
Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertexts
T Zhou, L Chen, X Che, W Liu, Z Zhang, X Yang
Cryptology ePrint Archive, 2021
{End-to-Same-End} Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
L Chen, YN Li, Q Tang, M Yung
31st USENIX Security Symposium (USENIX Security 22), 2353-2370, 2022
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity: (Revisiting Space-Based Security in the Adaptive Setting)
G Ateniese, L Chen, D Francati, D Papadopoulos, Q Tang
IACR International Conference on Public-Key Cryptography, 63-93, 2023
Efficient Lattice-Based Threshold Signatures With Functional Interchangeability
G Tang, B Pang, L Chen, Z Zhang
IEEE Transactions on Information Forensics and Security, 2023
Multi-input laconic function evaluation
B Pang, L Chen, X Fan, Q Tang
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
Efficient Secure Storage with Version Control and Key Rotation
L Chen, H Guo, YN Li, Q Tang
Cryptology ePrint Archive, 2023
The system can't perform the operation now. Try again later.
Articles 1–13