L
Long Chen
Researcher at New Jersey Institute of Technology
Publications - 13
Citations - 220
Long Chen is an academic researcher from New Jersey Institute of Technology. The author has contributed to research in topics: Ciphertext & Encryption. The author has an hindex of 5, co-authored 12 publications receiving 121 citations. Previous affiliations of Long Chen include Chinese Academy of Sciences.
Papers
More filters
Book ChapterDOI
IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited
TL;DR: To fully assess the post-quantum security, security analysis in the quantum random oracle model (QROM) is preferred, but current works either lacked a QROM security proof or just followed Targhi and Unruh’s proof technique and modified the original transformations by adding an additional hash to the ciphertext to achieve the Q ROM security.
Book ChapterDOI
Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension
TL;DR: In this paper, a ring-LWE-based multi-hop fully homomorphic encryption (MKFHE) scheme was proposed, which is based on Brakerski-Gentry-Vaikuntanathan (BGV) FHE.
Posted Content
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension.
TL;DR: This work focuses on MKFHE constructions from standard assumptions and proposes a new construction of ring-LWE-based multi-hop MKF HE scheme based on Brakerski-Gentry-Vaikuntanathan (BGV) FHE scheme, which can encrypt a ring element rather than a single bit and naturally inherits the advantages of the ciphertext/plaintext ratio and the complexity of homomorphic operations.
Proceedings ArticleDOI
Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
TL;DR: This work formally study the Proof of Storage-Time (PoSt), the notion initially proposed in the Filecoin whitepaper, which enables a verifier to audit the continuous data availability of an outsourced storage service.
Book ChapterDOI
CCA Updatable Encryption Against Malicious Re-encryption Attacks
Long Chen,Yanan Li,Qiang Tang +2 more
TL;DR: In this article, the authors notice several major issues in existing security models of (ciphertext dependent) updatable encryption, in particular, integrity and CCA security, in practice, an attacker could try to inject arbitrary ciphertexts into the server as she wishes.