According to our database1, Chong-zhi Gao
Legend:Book In proceedings Article PhD thesis Other
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures.
J. Network and Computer Applications, 2018
Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack.
Inf. Sci., 2018
Multi-key privacy-preserving deep learning in cloud computing.
Future Generation Comp. Syst., 2017
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions.
Cluster Computing, 2017
A Cloud Aided Privacy-Preserving Profile Matching Scheme in Mobile Social Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Identity Based Threshold Ring Signature from Lattices.
Proceedings of the Network and System Security - 8th International Conference, 2014
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Information Security Practice and Experience, 2012
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
A Further Improved Online/Offline Signature Scheme.
Fundam. Inform., 2009
How to construct efficient on-line/off-line threshold signature schemes through the simulation approach.
Concurrency and Computation: Practice and Experience, 2009
Improved Implementations of Cryptosystems Based on Tate Pairing.
Proceedings of the Advances in Information Security and Assurance, 2009
Divisible On-Line/Off-Line Signatures.
Proceedings of the Topics in Cryptology, 2009
Divisible On-line/Off-line Signatures.
IACR Cryptology ePrint Archive, 2008
How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.
Proceedings of the Applied Cryptography and Network Security, 2003