scispace - formally typeset
L

Long Chen

Researcher at New Jersey Institute of Technology

Publications -  13
Citations -  220

Long Chen is an academic researcher from New Jersey Institute of Technology. The author has contributed to research in topics: Ciphertext & Encryption. The author has an hindex of 5, co-authored 12 publications receiving 121 citations. Previous affiliations of Long Chen include Chinese Academy of Sciences.

Papers
More filters
Book ChapterDOI

IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited

TL;DR: To fully assess the post-quantum security, security analysis in the quantum random oracle model (QROM) is preferred, but current works either lacked a QROM security proof or just followed Targhi and Unruh’s proof technique and modified the original transformations by adding an additional hash to the ciphertext to achieve the Q ROM security.
Book ChapterDOI

Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension

TL;DR: In this paper, a ring-LWE-based multi-hop fully homomorphic encryption (MKFHE) scheme was proposed, which is based on Brakerski-Gentry-Vaikuntanathan (BGV) FHE.
Posted Content

Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension.

TL;DR: This work focuses on MKFHE constructions from standard assumptions and proposes a new construction of ring-LWE-based multi-hop MKF HE scheme based on Brakerski-Gentry-Vaikuntanathan (BGV) FHE scheme, which can encrypt a ring element rather than a single bit and naturally inherits the advantages of the ciphertext/plaintext ratio and the complexity of homomorphic operations.
Proceedings ArticleDOI

Proof of Storage-Time: Efficiently Checking Continuous Data Availability.

TL;DR: This work formally study the Proof of Storage-Time (PoSt), the notion initially proposed in the Filecoin whitepaper, which enables a verifier to audit the continuous data availability of an outsourced storage service.
Book ChapterDOI

CCA Updatable Encryption Against Malicious Re-encryption Attacks

TL;DR: In this article, the authors notice several major issues in existing security models of (ciphertext dependent) updatable encryption, in particular, integrity and CCA security, in practice, an attacker could try to inject arbitrary ciphertexts into the server as she wishes.