


default search action
Junzuo Lai
- > Home > Persons > Junzuo Lai
Publications
- 2025
[j36]Meng Sun
, Junzuo Lai
, Xiaohan Mo
, Chi Wu
, Peng Li
, Cheng-Kang Chu
, Robert H. Deng
:
Delegatable Multi-Authority Attribute-Based Anonymous Credentials. IEEE Trans. Cloud Comput. 13(2): 655-666 (2025)
[j35]Meng Sun
, Junzuo Lai
, Wei Wu
, Ye Yang
, Cheng-Kang Chu
, Robert H. Deng
:
How to Securely Delegate and Revoke Partial Authorization Credentials. IEEE Trans. Dependable Secur. Comput. 22(2): 979-996 (2025)
[j34]Yanling Li
, Junzuo Lai
, Meng Sun
, Beibei Song, Robert H. Deng
:
Privacy-Preserving Ridge Regression Over Encrypted Data Under Multiple Keys. IEEE Trans. Dependable Secur. Comput. 22(5): 4847-4860 (2025)
[j33]Yuxian Li
, Jian Weng
, Junzuo Lai
, Yingjiu Li
, Jiahe Wu, Ming Li
, Jianfei Sun, Pengfei Wu
, Robert H. Deng
:
AuditPCH: Auditable Payment Channel Hub With Privacy Protection. IEEE Trans. Inf. Forensics Secur. 20: 1251-1261 (2025)
[c46]Ming Li, Yuxian Li, Jian Weng, Yingjiu Li, Jia-Si Weng, Junzuo Lai, Robert H. Deng:
IvyAPC: Auditable Generalized Payment Channels. FC 2025: 39-55- 2018
[j13]Hui Cui
, Robert H. Deng
, Junzuo Lai, Xun Yi, Surya Nepal
:
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. Comput. Networks 133: 157-165 (2018)- 2017
[j11]Siqi Ma
, Junzuo Lai, Robert H. Deng
, Xuhua Ding
:
Adaptable key-policy attribute-based encryption with time interval. Soft Comput. 21(20): 6191-6200 (2017)- 2016
[j9]Lixian Liu, Junzuo Lai, Robert H. Deng
, Yingjiu Li:
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Secur. Commun. Networks 9(18): 4897-4913 (2016)
[c21]Junzuo Lai, Robert H. Deng
, Changshe Ma, Kouichi Sakurai, Jian Weng
:
CCA-Secure Keyed-Fully Homomorphic Encryption. Public Key Cryptography (1) 2016: 70-98
[c20]Hui Cui
, Robert H. Deng
, Guowei Wu, Junzuo Lai:
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures. ProvSec 2016: 19-38- 2015
[i2]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. IACR Cryptol. ePrint Arch. 2015: 297 (2015)- 2014
[j6]Junzuo Lai, Yingjiu Li, Robert H. Deng
, Jian Weng
, Chaowen Guan
, Qiang Yan:
Towards semantically secure outsourcing of association rule mining on categorical data. Inf. Sci. 267: 267-286 (2014)
[c19]Junzuo Lai, Robert H. Deng
, Yingjiu Li, Jian Weng
:
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. AsiaCCS 2014: 239-248
[c18]Junzuo Lai, Robert H. Deng
, HweeHwa Pang
, Jian Weng
:
Verifiable Computation on Outsourced Encrypted Data. ESORICS (1) 2014: 273-291
[c17]Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng
, Jian Weng
:
Authorized Keyword Search on Encrypted Data. ESORICS (1) 2014: 419-435
[c16]Junzuo Lai, Robert H. Deng
, Shengli Liu, Jian Weng
, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. EUROCRYPT 2014: 77-92- 2013
[j5]Junzuo Lai, Robert H. Deng
, Chaowen Guan
, Jian Weng
:
Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 8(8): 1343-1354 (2013)
[c15]Junzuo Lai, Xuhua Zhou, Robert Huijie Deng
, Yingjiu Li, Kefei Chen:
Expressive search on encrypted data. AsiaCCS 2013: 243-252
[c13]Junzuo Lai, Robert H. Deng
, Yunlei Zhao, Jian Weng
:
Accountable Authority Identity-Based Encryption with Public Traceability. CT-RSA 2013: 326-342
[c11]Junzuo Lai, Robert H. Deng
, Yanjiang Yang, Jian Weng
:
Adaptable Ciphertext-Policy Attribute-Based Encryption. Pairing 2013: 199-214- 2012
[c10]Junzuo Lai, Robert H. Deng
, Yingjiu Li:
Expressive CP-ABE with partially hidden access structures. AsiaCCS 2012: 18-19- 2011
[j3]Shengli Liu, Junzuo Lai, Robert H. Deng:
General Construction of Chameleon All-But-One Trapdoor Functions. J. Internet Serv. Inf. Secur. 1(2/3): 74-88 (2011)
[j2]Yingjiu Li, Robert H. Deng
, Junzuo Lai, Changshe Ma:
On two RFID privacy notions and their relations. ACM Trans. Inf. Syst. Secur. 14(4): 30:1-30:23 (2011)
[c9]Feng Bao, Robert H. Deng
, Xuhua Ding
, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. ACNS 2011: 201-219
[c8]Junzuo Lai, Robert H. Deng
, Yingjiu Li:
Fully Secure Cipertext-Policy Hiding CP-ABE. ISPEC 2011: 24-39
[c7]Junzuo Lai, Robert H. Deng
, Shengli Liu:
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security. Public Key Cryptography 2011: 228-245
[c6]Shengli Liu, Junzuo Lai, Robert H. Deng
:
General Construction of Chameleon All-But-One Trapdoor Functions. ProvSec 2011: 257-265- 2010
[j1]Junzuo Lai, Wen Tao Zhu, Robert H. Deng
, Shengli Liu, Weidong Kou:
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption. J. Comput. Sci. Technol. 25(4): 793-806 (2010)
[c5]Junzuo Lai, Robert H. Deng
, Yingjiu Li:
Revisiting Unpredictability-Based RFID Privacy Models. ACNS 2010: 475-492
[c4]Junzuo Lai, Robert H. Deng
, Shengli Liu, Weidong Kou:
Efficient CCA-Secure PKE from Identity-Based Techniques. CT-RSA 2010: 132-147- 2009
[c3]Jian Weng
, Robert H. Deng
, Xuhua Ding
, Cheng-Kang Chu, Junzuo Lai:
Conditional proxy re-encryption secure against chosen-ciphertext attack. AsiaCCS 2009: 322-332
[c2]Junzuo Lai, Robert H. Deng
, Shengli Liu, Weidong Kou:
RSA-Based Certificateless Public Key Encryption. ISPEC 2009: 24-34- 2008
[i1]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xu An Wang:
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. IACR Cryptol. ePrint Arch. 2008: 509 (2008)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-13 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






