Jie Chen
Jie Chen
East China Normal University
Verified email at e.ntu.edu.sg - Homepage
Cited by
Cited by
Fully,(almost) tightly secure IBE and dual system groups
J Chen, H Wee
Annual Cryptology Conference, 435-460, 2013
Improved dual system ABE in prime-order groups via predicate encodings
J Chen, R Gay, H Wee
Annual International Conference on the Theory and Applications of …, 2015
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Cryptographers’ Track at the RSA Conference, 50-67, 2013
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Australasian Conference on Information Security and Privacy, 390-403, 2012
Shorter identity-based encryption via asymmetric pairings
J Chen, HW Lim, S Ling, H Wang, H Wee
Designs, codes and cryptography 73 (3), 911-947, 2014
Semi-adaptive attribute-based encryption and improved delegation for boolean formula
J Chen, H Wee
International Conference on Security and Cryptography for Networks, 277-297, 2014
Combined public-key schemes: The case of ABE and ABS
C Chen, J Chen, HW Lim, Z Zhang, D Feng
International Conference on Provable Security, 53-69, 2012
Two-factor data access control with efficient revocation for multi-authority cloud storage systems
X Li, S Tang, L Xu, H Wang, J Chen
IEEE Access 5, 393-405, 2016
Unbounded ABE via bilinear entropy expansion, revisited
J Chen, J Gong, L Kowalczyk, H Wee
Annual International Conference on the Theory and Applications of …, 2018
Transcriptome profiling using pyrosequencing shows genes associated with bast fiber development in ramie (Boehmeria nivea L.)
J Chen, Z Pei, L Dai, B Wang, L Liu, X An, D Peng
BMC genomics 15 (1), 1-11, 2014
Extended nested dual system groups, revisited
J Gong, J Chen, X Dong, Z Cao, S Tang
Public-Key Cryptography–PKC 2016, 133-163, 2016
Transcriptome profiling and identification of transcription factors in ramie (Boehmeria nivea L. Gaud) in response to PEG treatment, using illumina paired-end sequencing technology
X An, J Chen, J Zhang, Y Liao, L Dai, B Wang, L Liu, D Peng
International journal of molecular sciences 16 (2), 3493-3511, 2015
The 2015 Mw 6.4 Pishan Earthquake: Seismic Hazards of an Active Blind Wedge Thrust System at the Western Kunlun Range Front, Northwest Tibetan Plateau
T Li, J Chen, L Fang, Z Chen, JA Thompson, C Jia
Seismological Research Letters 87 (3), 601-608, 2016
RouteGuardian: Constructing secure routing paths in software-defined networking
M Wang, J Liu, J Mao, H Cheng, J Chen, C Qi
Tsinghua Science and Technology 22 (4), 400-412, 2017
Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
J Gong, X Dong, J Chen, Z Cao
International Conference on the Theory and Application of Cryptology and …, 2016
Perm-guard: Authenticating the validity of flow rules in software defined networking
M Wang, J Liu, J Chen, X Liu, J Mao
Journal of Signal Processing Systems 86 (2-3), 157-173, 2017
Tightly secure IBE under constant-size master public key
J Chen, J Gong, J Weng
IACR International Workshop on Public Key Cryptography, 207-231, 2017
Efficient public key encryption with equality test in the standard model
K Zhang, J Chen, HT Lee, H Qian, H Wang
Theoretical Computer Science 755, 65-80, 2019
Genome-wide association studies of free amino acid levels by six multi-locus models in bread wheat
Y Peng, H Liu, J Chen, T Shi, C Zhang, D Sun, Z He, Y Hao, W Chen
Frontiers in plant science 9, 1196, 2018
Doubly spatial encryption from DBDH
J Chen, H Wee
Theoretical Computer Science 543, 79-89, 2014
The system can't perform the operation now. Try again later.
Articles 1–20