scispace - formally typeset
J

Jian Weng

Researcher at Jinan University

Publications -  319
Citations -  9039

Jian Weng is an academic researcher from Jinan University. The author has contributed to research in topics: Encryption & Computer science. The author has an hindex of 40, co-authored 267 publications receiving 6093 citations. Previous affiliations of Jian Weng include Shenzhen University & Chinese Academy of Sciences.

Papers
More filters
Journal ArticleDOI

CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing

TL;DR: A blockchain-based decentralized framework for crowdsourcing named CrowdBC is conceptualized, in which a requester's task can be solved by a crowd of workers without relying on any third trusted institution, users’ privacy can be guaranteed and only low transaction fees are required.
Journal ArticleDOI

Attribute-Based Encryption With Verifiable Outsourced Decryption

TL;DR: This paper gives the formal model of ABE with verifiable outsourced decryption and proposes a concrete scheme that is both secure and verifiable, without relying on random oracles and shows an implementation of the scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users.
Book ChapterDOI

Efficient unidirectional proxy re-encryption

TL;DR: Wang et al. as mentioned in this paper proposed an efficient unidirectional proxy re-encryption scheme without resorting to pairings and showed that it is vulnerable to chosen-ciphertext attack (CCA).
Book ChapterDOI

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings

TL;DR: In this article, a new proxy re-encryption scheme without resorting to bilinear pairings is proposed, and the chosen-ciphertext security of the proposed scheme is proved in the random oracle model.
Journal ArticleDOI

Verifiable Computation over Large Database with Incremental Updates

TL;DR: A general Inc-VDB framework is proposed by incorporating the primitive of vector commitment and the encrypt-then-incremental MAC mode of encryption and it is proved that the construction can achieve the desired security properties.