default search action
Zhedong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang, Mingsheng Wang:
Shorter ZK-SNARKs from square span programs over ideal lattices. Cybersecur. 7(1): 33 (2024) - [j3]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Leakage-resilient sf IBE/sf ABE with optimal leakage rates from lattices. Des. Codes Cryptogr. 92(6): 1541-1597 (2024) - [c12]Zhilong Luo, Shifeng Sun, Zhedong Wang, Dawu Gu:
Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy. ACISP (1) 2024: 281-302 - [c11]Zhedong Wang, Qiqi Lai, Feng-Hao Liu:
Ring/Module Learning with Errors Under Linear Leakage - Hardness and Applications. Public Key Cryptography (2) 2024: 275-304 - [i10]Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, Dawu Gu:
Identity-Based Encryption from Lattices with More Compactness in the Standard Model. IACR Cryptol. ePrint Arch. 2024: 1295 (2024) - [i9]Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Dawu Gu:
Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians. IACR Cryptol. ePrint Arch. 2024: 1695 (2024) - [i8]Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Yang Yu, Dawu Gu:
Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security. IACR Cryptol. ePrint Arch. 2024: 1696 (2024) - 2023
- [c10]Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu:
Almost Tight Multi-user Security Under Adaptive Corruptions from LWE in the Standard Model. CRYPTO (5) 2023: 682-715 - [c9]Geng Wang, Shi-Feng Sun, Zhedong Wang, Dawu Gu:
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications. Public Key Cryptography (2) 2023: 429-458 - [i7]Qiqi Lai, Feng-Hao Liu, Anna Lysyanskaya, Zhedong Wang:
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials. IACR Cryptol. ePrint Arch. 2023: 766 (2023) - [i6]Zhedong Wang, Qiqi Lai, Feng-Hao Liu:
Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications. IACR Cryptol. ePrint Arch. 2023: 826 (2023) - [i5]Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model. IACR Cryptol. ePrint Arch. 2023: 1230 (2023) - 2022
- [c8]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices. Public Key Cryptography (2) 2022: 225-255 - [i4]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts. IACR Cryptol. ePrint Arch. 2022: 779 (2022) - 2021
- [j2]Zhedong Wang, Chao Qian, Tong Cai, Longwei Tian, Zhixiang Fan, Jian Liu, Yichen Shen, Li Jing, Jianming Jin, Er-Ping Li, Bin Zheng, Hongsheng Chen:
Demonstration of Spider-Eyes-Like Intelligent Antennas for Dynamically Perceiving Incoming Waves. Adv. Intell. Syst. 3(9): 2100066 (2021) - [c7]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts. EUROCRYPT (1) 2021: 498-527 - [c6]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks. Public Key Cryptography (1) 2021: 421-450 - [c5]Parhat Abla, Feng-Hao Liu, Han Wang, Zhedong Wang:
Ring-Based Identity Based Encryption - Asymptotically Shorter MPK and Tighter Security. TCC (3) 2021: 157-187 - [i3]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks. IACR Cryptol. ePrint Arch. 2021: 227 (2021) - [i2]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices. IACR Cryptol. ePrint Arch. 2021: 1665 (2021) - 2020
- [c4]Feng-Hao Liu, Zhedong Wang:
Rounding in the Rings. CRYPTO (2) 2020: 296-326 - [c3]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More. Public Key Cryptography (1) 2020: 652-681
2010 – 2019
- 2019
- [j1]Yuan Chen, Qingkuan Dong, Yannan Li, Qiqi Lai, Zhedong Wang:
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms. J. Univers. Comput. Sci. 25(3): 158-181 (2019) - [c2]Zhedong Wang, Xiong Fan, Feng-Hao Liu:
FE for Inner Products and Its Application to Decentralized ABE. Public Key Cryptography (2) 2019: 97-127 - [i1]Zhedong Wang, Xiong Fan, Feng-Hao Liu:
FE for Inner Products and Its Application to Decentralized ABE. IACR Cryptol. ePrint Arch. 2019: 33 (2019) - 2017
- [c1]Zhedong Wang, Xiong Fan, Mingsheng Wang:
Compact Inner Product Encryption from LWE. ICICS 2017: 141-153
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint