default search action
Qiqi Lai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Leakage-resilient sf IBE/sf ABE with optimal leakage rates from lattices. Des. Codes Cryptogr. 92(6): 1541-1597 (2024) - [c9]Chongshen Chen, Qiqi Lai, Yang Lu, Yong Yu:
More Efficient Two-Stage Sampling Technique and Its Applications. DSPP (2) 2024: 88-108 - [c8]Zhedong Wang, Qiqi Lai, Feng-Hao Liu:
Ring/Module Learning with Errors Under Linear Leakage - Hardness and Applications. Public Key Cryptography (2) 2024: 275-304 - [i11]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Analysis, modify and apply in IIOT form light-weight PSI in CM20. IACR Cryptol. ePrint Arch. 2024: 969 (2024) - [i10]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem. IACR Cryptol. ePrint Arch. 2024: 1179 (2024) - [i9]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai, Fuchun Guo:
Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR. IACR Cryptol. ePrint Arch. 2024: 1349 (2024) - [i8]Qiqi Lai, Feng-Hao Liu, Yang Lu, Haiyang Xue, Yong Yu:
Scalable Two-Round n-out-of-n and Multi-Signatures from Lattices in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2024: 1574 (2024) - 2023
- [i7]Qiqi Lai, Feng-Hao Liu, Anna Lysyanskaya, Zhedong Wang:
Lattice-based Commit-Transferrable Signatures and Applications to Anonymous Credentials. IACR Cryptol. ePrint Arch. 2023: 766 (2023) - [i6]Zhedong Wang, Qiqi Lai, Feng-Hao Liu:
Ring/Module Learning with Errors under Linear Leakage - Hardness and Applications. IACR Cryptol. ePrint Arch. 2023: 826 (2023) - [i5]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem. IACR Cryptol. ePrint Arch. 2023: 1412 (2023) - 2022
- [c7]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices. Public Key Cryptography (2) 2022: 225-255 - [i4]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts. IACR Cryptol. ePrint Arch. 2022: 779 (2022) - [i3]Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan:
Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices. IACR Cryptol. ePrint Arch. 2022: 1718 (2022) - 2021
- [j10]Tanping Zhou, Ningbo Li, Qiqi Lai, Xiaoyuan Yang, Yiliang Han, Wenchao Liu:
Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations. IET Inf. Secur. 15(6): 472-486 (2021) - [j9]Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Qiqi Lai:
Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. Int. J. Found. Comput. Sci. 32(1): 73-91 (2021) - [c6]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
New Lattice Two-Stage Sampling Technique and Its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts. EUROCRYPT (1) 2021: 498-527 - [c5]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor Against Correlated-Source Attacks. Public Key Cryptography (1) 2021: 421-450 - [i2]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks. IACR Cryptol. ePrint Arch. 2021: 227 (2021) - [i1]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices. IACR Cryptol. ePrint Arch. 2021: 1665 (2021) - 2020
- [c4]Qiqi Lai, Feng-Hao Liu, Zhedong Wang:
Almost Tight Security in Lattices with Polynomial Moduli - PRF, IBE, All-but-many LTF, and More. Public Key Cryptography (1) 2020: 652-681
2010 – 2019
- 2019
- [j8]Qiqi Lai, Bo Yang, Zhe Xia, Yannan Li, Yuan Chen, Zhenlong Li:
Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model. Int. J. Found. Comput. Sci. 30(4): 589-606 (2019) - [j7]Yuan Chen, Qingkuan Dong, Yannan Li, Qiqi Lai, Zhedong Wang:
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms. J. Univers. Comput. Sci. 25(3): 158-181 (2019) - [c3]En Zhang, Feng-Hao Liu, Qiqi Lai, Ganggang Jin, Yu Li:
Efficient Multi-Party Private Set Intersection Against Malicious Adversaries. CCSW 2019: 93-104 - 2018
- [j6]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Jian Bai:
Novel Smooth Hash Proof Systems Based on Lattices. Comput. J. 61(4): 561-574 (2018) - [j5]Qiqi Lai, Bo Yang, Yong Yu, Zhe Xia, Yanwei Zhou, Yuan Chen:
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes. J. Comput. Sci. Technol. 33(6): 1243-1260 (2018) - [c2]Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong:
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. ACISP 2018: 539-557 - 2017
- [c1]Yuan Chen, Qingkuan Dong, Qiqi Lai:
Natural sd-RCCA Secure Public-Key Encryptions. ProvSec 2017: 236-250 - 2015
- [j4]Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang, Fenghe Wang:
New method of key-dependent message security for asymmetric encryption. Secur. Commun. Networks 8(13): 2157-2170 (2015) - [j3]Mingming Jiang, Yupu Hu, Baocang Wang, F. H. Wang, Qiqi Lai:
Lattice-based multi-use unidirectional proxy re-encryption. Secur. Commun. Networks 8(18): 3796-3803 (2015) - 2014
- [j2]Qiqi Lai, Yuan Chen, Yupu Hu, Baocang Wang, Mingming Jiang:
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model. Frontiers Comput. Sci. 8(3): 469-477 (2014) - [j1]Mingming Jiang, Yupu Hu, Hao Lei, Baocang Wang, Qiqi Lai:
Lattice-based certificateless encryption scheme. Frontiers Comput. Sci. 8(5): 828-836 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint