| Logarithmic-size ring signatures with tight security from the DDH assumption B Libert, T Peters, C Qian European Symposium on Research in Computer Security, 288-308, 2018 | 38 | 2018 |
| Signed (group) diffie–hellman key exchange with tight security J Pan, C Qian, M Ringerud Journal of Cryptology 35 (4), 26, 2022 | 32 | 2022 |
| Binary elligator squared DF Aranha, PA Fouque, C Qian, M Tibouchi, JC Zapalowicz International Conference on Selected Areas in Cryptography, 20-37, 2014 | 29 | 2014 |
| Structure-preserving chosen-ciphertext security with shorter verifiable ciphertexts B Libert, T Peters, C Qian IACR International Workshop on Public Key Cryptography, 247-276, 2017 | 25 | 2017 |
| Transferable E-cash: A cleaner model and the first practical instantiation B Bauer, G Fuchsbauer, C Qian IACR International Conference on Public-Key Cryptography, 559-590, 2021 | 24 | 2021 |
| Signed Diffie-Hellman key exchange with tight security J Pan, C Qian, M Ringerud Cryptographers’ Track at the RSA Conference, 201-226, 2021 | 17 | 2021 |
| A generic transform from multi-round interactive proof to NIZK PA Fouque, A Georgescu, C Qian, A Roux-Langlois, W Wen IACR International Conference on Public-Key Cryptography, 461-481, 2023 | 6 | 2023 |
| Lossy algebraic filters with short tags B Libert, C Qian IACR International Workshop on Public Key Cryptography, 34-65, 2019 | 6 | 2019 |
| Fault attacks on efficient pairing implementations PA Fouque, C Qian Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 4 | 2016 |
| Extending updatable encryption: public key, tighter security and signed ciphertexts C Qian, YJ Galteland, GT Davies Cryptology ePrint Archive, 2023 | 3 | 2023 |
| Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing J Yan, J Chen, C Qian, A Fu, H Qian Journal of Systems Architecture 153, 103190, 2024 | 2 | 2024 |
| Universal witness signatures C Qian, M Tibouchi, R Géraud International Workshop on Security, 313-329, 2018 | 2 | 2018 |
| Fully Dynamic Verifiable Secret Sharing and its Application to DPSS J Li, M Zou, C Qian, G Zhang Cryptology ePrint Archive, 2026 | | 2026 |
| Generic constructions of master-key KDM secure attribute-based encryption J Pan, C Qian, B Wagner Designs, Codes and Cryptography 92 (1), 51-92, 2024 | | 2024 |
| Lossy trapdoor primitives, zero-knowledge proofs and applications C Qian Université de Rennes, 2019 | | 2019 |