default search action
Changshe Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i5]Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng:
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication. CoRR abs/2210.10244 (2022) - 2021
- [c13]Xiaocong Li, Changshe Ma:
Redactable Blockchain based on Unforgeable Signatures for Supporting Fast Verification. TrustCom 2021: 1202-1207 - 2020
- [j6]Changshe Ma, Yiping Gu, Hongfei Li:
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries Without Keyword Pair Result Pattern Leakage. IEEE Access 8: 107510-107526 (2020) - [i4]Changshe Ma, Yiping Gu, Hongfei Li:
Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage. IACR Cryptol. ePrint Arch. 2020: 48 (2020)
2010 – 2019
- 2019
- [j5]Changshe Ma, Mei Jiang:
Practical Lattice-Based Multisignature Schemes for Blockchains. IEEE Access 7: 179765-179778 (2019) - 2016
- [c12]Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng:
CCA-Secure Keyed-Fully Homomorphic Encryption. Public Key Cryptography (1) 2016: 70-98 - 2013
- [e1]Changshe Ma, Jian Weng:
Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop Proceedings, Guangzhou, China, November 27, 2013. Cryptology and Information Security Series 11, IOS Press 2013, ISBN 978-1-61499-327-8 [contents] - 2012
- [j4]Sherman S. M. Chow, Changshe Ma, Jian Weng:
Zero-Knowledge Argument for Simultaneous Discrete Logarithms. Algorithmica 64(2): 246-266 (2012) - 2011
- [j3]Yingjiu Li, Robert H. Deng, Junzuo Lai, Changshe Ma:
On two RFID privacy notions and their relations. ACM Trans. Inf. Syst. Secur. 14(4): 30:1-30:23 (2011) - [c11]Jiaxin Pan, Libin Wang, Changshe Ma:
Analysis and Improvement of an Authenticated Key Exchange Protocol. ISPEC 2011: 417-431 - 2010
- [j2]Changshe Ma, Jian Weng, Yingjiu Li, Robert H. Deng:
Efficient discrete logarithm based multi-signature scheme in the plain public key model. Des. Codes Cryptogr. 54(2): 121-133 (2010) - [c10]Sherman S. M. Chow, Changshe Ma, Jian Weng:
Zero-Knowledge Argument for Simultaneous Discrete Logarithms. COCOON 2010: 520-529 - [c9]Jiaxin Pan, Libin Wang, Changshe Ma:
Security Enhancement and Modular Treatment towards Authenticated Key Exchange. ICICS 2010: 203-217
2000 – 2009
- 2009
- [c8]Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li:
RFID privacy: relation between two notions, minimal condition, and efficient construction. CCS 2009: 54-65 - [c7]Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng:
Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. ICICS 2009: 150-164 - [c6]Bing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng:
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup. ICISS 2009: 71-85 - 2008
- [i3]Dong Zheng, Xiangxue Li, Changshe Ma, Kefei Chen, Jianhua Li:
Democratic Group Signatures with Threshold Traceability. IACR Cryptol. ePrint Arch. 2008: 112 (2008) - 2007
- [i2]Changshe Ma, Jian Weng, Dong Zheng:
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions. IACR Cryptol. ePrint Arch. 2007: 19 (2007) - 2006
- [j1]Changshe Ma, Shiqun Li, Kefei Chen, Shengli Liu:
Analysis and improvement of fair certified e-mail delivery protocol. Comput. Stand. Interfaces 28(4): 467-474 (2006) - [c5]Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Key-Insulated Signature Without Random Oracles. CIS 2006: 470-480 - [c4]Changshe Ma:
Efficient Short Signcryption Scheme with Public Verifiability. Inscrypt 2006: 118-129 - [c3]Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. INDOCRYPT 2006: 409-423 - 2005
- [c2]Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu:
Efficient and Proactive Threshold Signcryption. ISC 2005: 233-243 - [c1]Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng:
Transitive Signatures Based on Bilinear Maps. WOSIS 2005: 48-56 - [i1]Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen:
Efficient Authenticated Encryption Schemes with Public Verifiability. CoRR abs/cs/0504019 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-22 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint