Dingding Jia
Chinese Academy of Sciences
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dingding Jia.
public key cryptography | 2011
Qixiang Mei; Bao Li; Xianhui Lu; Dingding Jia
In Eurocrypt 2009, Hofheinz and Kiltz proposed a practical chosen ciphertext (CCA) secure public key encryption under factoring assumption based on Rabin trapdoor one-way permutation. We show that when the modulus is special such that ZN* has semi-smooth order, the instantiation of Hofheinz-Kiltz 09 scheme (HK09) over a much smaller subgroup of quadratic residue group (Semi-smooth Subgroup) is CCA secure as long as this type of modulus is hard to be factored. Since the exponent domain of this instantiation is much smaller than the original one, the efficiency is substantially improved. In addition, we show how to construct a practical CCA secure encryption scheme from ElGamal trapdoor one-way function under factoring assumption.When instantiated over Semi-smooth Subgroup, this scheme has even better decryption efficiency than HK09 instantiation.
cryptology and network security | 2013
Haiyang Xue; Bao Li; Xianhui Lu; Dingding Jia; Yamin Liu
We propose a generic construction of lossy trapdoor function from the subgroup membership assumption. We present three concrete constructions based on the k-DCR assumption over
provable security | 2013
Dingding Jia; Xianhui Lu; Bao Li; Qixiang Mei
\mathbb{Z}^*_{N^2}
theory and application of cryptographic techniques | 2015
Xianhui Lu; Bao Li; Dingding Jia
, the extended p-subgroup assumption over
international conference on information security | 2014
Xianhui Lu; Bao Li; Dingding Jia
\mathbb{Z}^*_{N^2}
international workshop on security | 2014
Dingding Jia; Bao Li; Xianhui Lu; Qixiang Mei
, and the decisional RSA subgroup membership assumption over
the cryptographers’ track at the rsa conference | 2017
Dingding Jia; Xianhui Lu; Bao Li
\mathbb{Z}^*_{N}
australasian conference on information security and privacy | 2011
Yamin Liu; Bao Li; Xianhui Lu; Dingding Jia
. Our constructions are more efficient than the previous construction from the DCR assumption over
international conference on cryptology in india | 2016
Dingding Jia; Xianhui Lu; Bao Li
\mathbb{Z}^*_{N^{s}}
computer and communications security | 2016
Fuyang Fang; Bao Li; Xianhui Lu; Yamin Liu; Dingding Jia; Haiyang Xue
(s ≤ 3).