Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dingding Jia is active.

Publication


Featured researches published by Dingding Jia.


public key cryptography | 2011

Chosen ciphertext secure encryption under factoring assumption revisited

Qixiang Mei; Bao Li; Xianhui Lu; Dingding Jia

In Eurocrypt 2009, Hofheinz and Kiltz proposed a practical chosen ciphertext (CCA) secure public key encryption under factoring assumption based on Rabin trapdoor one-way permutation. We show that when the modulus is special such that ZN* has semi-smooth order, the instantiation of Hofheinz-Kiltz 09 scheme (HK09) over a much smaller subgroup of quadratic residue group (Semi-smooth Subgroup) is CCA secure as long as this type of modulus is hard to be factored. Since the exponent domain of this instantiation is much smaller than the original one, the efficiency is substantially improved. In addition, we show how to construct a practical CCA secure encryption scheme from ElGamal trapdoor one-way function under factoring assumption.When instantiated over Semi-smooth Subgroup, this scheme has even better decryption efficiency than HK09 instantiation.


cryptology and network security | 2013

Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions

Haiyang Xue; Bao Li; Xianhui Lu; Dingding Jia; Yamin Liu

We propose a generic construction of lossy trapdoor function from the subgroup membership assumption. We present three concrete constructions based on the k-DCR assumption over


provable security | 2013

RKA Secure PKE Based on the DDH and HR Assumptions

Dingding Jia; Xianhui Lu; Bao Li; Qixiang Mei

\mathbb{Z}^*_{N^2}


theory and application of cryptographic techniques | 2015

KDM-CCA Security from RKA Secure Authenticated Encryption

Xianhui Lu; Bao Li; Dingding Jia

, the extended p-subgroup assumption over


international conference on information security | 2014

Related-Key Security for Hybrid Encryption

Xianhui Lu; Bao Li; Dingding Jia

\mathbb{Z}^*_{N^2}


international workshop on security | 2014

Related Key Secure PKE from Hash Proof Systems

Dingding Jia; Bao Li; Xianhui Lu; Qixiang Mei

, and the decisional RSA subgroup membership assumption over


the cryptographers’ track at the rsa conference | 2017

Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks

Dingding Jia; Xianhui Lu; Bao Li

\mathbb{Z}^*_{N}


australasian conference on information security and privacy | 2011

Efficient CCA-secure CDH based KEM balanced between ciphertext and key

Yamin Liu; Bao Li; Xianhui Lu; Dingding Jia

. Our constructions are more efficient than the previous construction from the DCR assumption over


international conference on cryptology in india | 2016

Receiver Selective Opening Security from Indistinguishability Obfuscation

Dingding Jia; Xianhui Lu; Bao Li

\mathbb{Z}^*_{N^{s}}


computer and communications security | 2016

(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus

Fuyang Fang; Bao Li; Xianhui Lu; Yamin Liu; Dingding Jia; Haiyang Xue

(s ≤ 3).

Collaboration


Dive into the Dingding Jia's collaboration.

Top Co-Authors

Avatar

Bao Li

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Xianhui Lu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Qixiang Mei

Guangdong Ocean University

View shared research outputs
Top Co-Authors

Avatar

Yamin Liu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Haiyang Xue

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jingnan He

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Wenpan Jing

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Dali Zhu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Daode Zhang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Fuyang Fang

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge