Changshe Ma

Orcid: 0000-0002-7369-6788

According to our database1, Changshe Ma authored at least 22 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication.
CoRR, 2022

2021
Redactable Blockchain based on Unforgeable Signatures for Supporting Fast Verification.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries Without Keyword Pair Result Pattern Leakage.
IEEE Access, 2020

2019
Practical Lattice-Based Multisignature Schemes for Blockchains.
IEEE Access, 2019

2016
CCA-Secure Keyed-Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2012
Zero-Knowledge Argument for Simultaneous Discrete Logarithms.
Algorithmica, 2012

2011
On two RFID privacy notions and their relations.
ACM Trans. Inf. Syst. Secur., 2011

Analysis and Improvement of an Authenticated Key Exchange Protocol.
Proceedings of the Information Security Practice and Experience, 2011

2010
Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptogr., 2010

Security Enhancement and Modular Treatment towards Authenticated Key Exchange.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

RFID privacy: relation between two notions, minimal condition, and efficient construction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Democratic Group Signatures with Threshold Traceability.
IACR Cryptol. ePrint Arch., 2008

2007
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions.
IACR Cryptol. ePrint Arch., 2007

2006
Analysis and improvement of fair certified e-mail delivery protocol.
Comput. Stand. Interfaces, 2006

Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006

Efficient Short Signcryption Scheme with Public Verifiability.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Identity-Based Key-Insulated Signature Without Random Oracles.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Efficient Authenticated Encryption Schemes with Public Verifiability
CoRR, 2005

Transitive Signatures Based on Bilinear Maps.
Proceedings of the Security in Information Systems, 2005

Efficient and Proactive Threshold Signcryption.
Proceedings of the Information Security, 8th International Conference, 2005


  Loading...