Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Changshe Ma"'
Publikováno v:
IEEE Access, Vol 8, Pp 107510-107526 (2020)
The research of searchable symmetric encryption (SSE) has been focused on the trade-off between security, performance, and functionality. Recently proposed Hidden Cross-Tags (HXT) protocol improves the Oblivious Cross-Tags (OXT) by avoiding the leaka
Externí odkaz:
https://doaj.org/article/f17143e0ce364e2cbf99093dc69b5e0b
Autor:
Changshe Ma, Mei Jiang
Publikováno v:
IEEE Access, Vol 7, Pp 179765-179778 (2019)
Compact multisignature is vital for shrinking the signature size of decentralized blockchain. All practical compact multisignature schemes have been constructed from the discrete logarithm problem which is potentially vulnerable to quantum computing
Externí odkaz:
https://doaj.org/article/83a147dfa6fd401db8f281e7d62fbc6c
Publikováno v:
网络与信息安全学报, Vol 10, Iss 3, Pp 175-187 (2024)
Structured encryption, a specialized form of searchable encryption, has been recognized for offering improved tradeoffs between performance, security, and expressiveness. It is designed to protect the privacy of cloud storage data and supports a vari
Externí odkaz:
https://doaj.org/article/68e56868d30e443da1b5ddc4fdd5d664
Autor:
Yuchen SU, Changshe MA
Publikováno v:
网络与信息安全学报, Vol 10, Iss 2, Pp 165-181 (2024)
Recently, the concept of partially precomputed indexing for Structured query language (SQL) join (PpSj), which was predicated on structured encryption, has been introduced. This approach employed partial precomputed index join and hash filter set tec
Externí odkaz:
https://doaj.org/article/1143cd3b750b4fcbb1f0ee5f22502157
Autor:
Xiaocong Li, Changshe Ma
Publikováno v:
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
Autor:
Mei Jiang, Changshe Ma
Publikováno v:
IEEE Access, Vol 7, Pp 179765-179778 (2019)
Compact multisignature is vital for shrinking the signature size of decentralized blockchain. All practical compact multisignature schemes have been constructed from the discrete logarithm problem which is potentially vulnerable to quantum computing
Publikováno v:
Proceedings of the 9th International Conference on Computer Engineering and Networks ISBN: 9789811537523
Digital certificates provided by PKI are commonly used for identification and authentication services. The corresponding private key can be protected by USB keys, TEE/SE, etc., in the hardware environment. But in the software environment, the private
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2adb2548b83ccfb6f6eeda856c97d550
https://doi.org/10.1007/978-981-15-3753-0_66
https://doi.org/10.1007/978-981-15-3753-0_66
Publikováno v:
Public-Key Cryptography – PKC 2016 ISBN: 9783662493830
Public Key Cryptography (1)
Public Key Cryptography (1)
To simultaneously achieve CCA security and homomorphic property for encryption, Emura et al. introduced a new cryptographic primitive named keyed-homomorphic encryption, in which homomorphic ciphertext manipulations can only be performed by someone h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::08da3c93e3d83906b211bafc2d8f8f2c
https://doi.org/10.1007/978-3-662-49384-7_4
https://doi.org/10.1007/978-3-662-49384-7_4
Publikováno v:
Algorithmica. 64:246-266
In Crypto 1992, Chaum and Pedersen introduced a protocol (CP protocol for short) for proving the equality of two discrete logarithms (EQDL) with unconditional soundness, which is widely used nowadays and plays a central role in DL-based cryptography.
Publikováno v:
Journal of Shanghai Jiaotong University (Science). 16:459-465
Password-based authenticated key exchange (PAKE) protocols are cryptographic primitives which enable two entities, who only share a memorable password, to identify each other and to communicate over a public unreliable network with a secure session k