Chong-zhi Gao

According to our database1, Chong-zhi Gao
  • authored at least 16 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures.
J. Network and Computer Applications, 2018

Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack.
Inf. Sci., 2018

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise.
IEEE Access, 2018

2017
Multi-key privacy-preserving deep learning in cloud computing.
Future Generation Comp. Syst., 2017

Towards secure and flexible EHR sharing in mobile health cloud under static assumptions.
Cluster Computing, 2017

A Cloud Aided Privacy-Preserving Profile Matching Scheme in Mobile Social Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2014
Identity Based Threshold Ring Signature from Lattices.
Proceedings of the Network and System Security - 8th International Conference, 2014

2012
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Information Security Practice and Experience, 2012

Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2009
A Further Improved Online/Offline Signature Scheme.
Fundam. Inform., 2009

How to construct efficient on-line/off-line threshold signature schemes through the simulation approach.
Concurrency and Computation: Practice and Experience, 2009

Improved Implementations of Cryptosystems Based on Tate Pairing.
Proceedings of the Advances in Information Security and Assurance, 2009

Divisible On-Line/Off-Line Signatures.
Proceedings of the Topics in Cryptology, 2009

2008
Divisible On-line/Off-line Signatures.
IACR Cryptology ePrint Archive, 2008

2005
How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2003
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...