BibTeX records: Changshe Ma

download as .bib file

@article{DBLP:journals/corr/abs-2210-10244,
  author       = {Shaoying Cai and
                  Yingjiu Li and
                  Changshe Ma and
                  Sherman S. M. Chow and
                  Robert H. Deng},
  title        = {Prove You Owned Me: One Step beyond {RFID} Tag/Mutual Authentication},
  journal      = {CoRR},
  volume       = {abs/2210.10244},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.10244},
  doi          = {10.48550/ARXIV.2210.10244},
  eprinttype    = {arXiv},
  eprint       = {2210.10244},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-10244.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiM21,
  author       = {Xiaocong Li and
                  Changshe Ma},
  title        = {Redactable Blockchain based on Unforgeable Signatures for Supporting
                  Fast Verification},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {1202--1207},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00163},
  doi          = {10.1109/TRUSTCOM53373.2021.00163},
  timestamp    = {Sun, 13 Mar 2022 10:52:35 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaGL20,
  author       = {Changshe Ma and
                  Yiping Gu and
                  Hongfei Li},
  title        = {Practical Searchable Symmetric Encryption Supporting Conjunctive Queries
                  Without Keyword Pair Result Pattern Leakage},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {107510--107526},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3001014},
  doi          = {10.1109/ACCESS.2020.3001014},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaGL20,
  author       = {Changshe Ma and
                  Yiping Gu and
                  Hongfei Li},
  title        = {Practical Searchable Symmetric Encryption Supporting Conjunctive Queries
                  without Keyword Pair Result Pattern Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaJ19,
  author       = {Changshe Ma and
                  Mei Jiang},
  title        = {Practical Lattice-Based Multisignature Schemes for Blockchains},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {179765--179778},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2958816},
  doi          = {10.1109/ACCESS.2019.2958816},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiDMSW16,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Changshe Ma and
                  Kouichi Sakurai and
                  Jian Weng},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {CCA-Secure Keyed-Fully Homomorphic Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {70--98},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_4},
  doi          = {10.1007/978-3-662-49384-7\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiDMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2013a,
  editor       = {Changshe Ma and
                  Jian Weng},
  title        = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop
                  Proceedings, Guangzhou, China, November 27, 2013},
  series       = {Cryptology and Information Security Series},
  volume       = {11},
  publisher    = {{IOS} Press},
  year         = {2013},
  isbn         = {978-1-61499-327-8},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/2013a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/ChowMW12,
  author       = {Sherman S. M. Chow and
                  Changshe Ma and
                  Jian Weng},
  title        = {Zero-Knowledge Argument for Simultaneous Discrete Logarithms},
  journal      = {Algorithmica},
  volume       = {64},
  number       = {2},
  pages        = {246--266},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00453-011-9593-3},
  doi          = {10.1007/S00453-011-9593-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithmica/ChowMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LiDLM11,
  author       = {Yingjiu Li and
                  Robert H. Deng and
                  Junzuo Lai and
                  Changshe Ma},
  title        = {On two {RFID} privacy notions and their relations},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {30:1--30:23},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043628.2043631},
  doi          = {10.1145/2043628.2043631},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LiDLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PanWM11,
  author       = {Jiaxin Pan and
                  Libin Wang and
                  Changshe Ma},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {Analysis and Improvement of an Authenticated Key Exchange Protocol},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {417--431},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_31},
  doi          = {10.1007/978-3-642-21031-0\_31},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/PanWM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaWLD10,
  author       = {Changshe Ma and
                  Jian Weng and
                  Yingjiu Li and
                  Robert H. Deng},
  title        = {Efficient discrete logarithm based multi-signature scheme in the plain
                  public key model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {54},
  number       = {2},
  pages        = {121--133},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9313-z},
  doi          = {10.1007/S10623-009-9313-Z},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MaWLD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/ChowMW10,
  author       = {Sherman S. M. Chow and
                  Changshe Ma and
                  Jian Weng},
  editor       = {My T. Thai and
                  Sartaj Sahni},
  title        = {Zero-Knowledge Argument for Simultaneous Discrete Logarithms},
  booktitle    = {Computing and Combinatorics, 16th Annual International Conference,
                  {COCOON} 2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6196},
  pages        = {520--529},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14031-0\_55},
  doi          = {10.1007/978-3-642-14031-0\_55},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/ChowMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PanWM10,
  author       = {Jiaxin Pan and
                  Libin Wang and
                  Changshe Ma},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Security Enhancement and Modular Treatment towards Authenticated Key
                  Exchange},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {203--217},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_15},
  doi          = {10.1007/978-3-642-17650-0\_15},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/PanWM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaLDL09,
  author       = {Changshe Ma and
                  Yingjiu Li and
                  Robert H. Deng and
                  Tieyan Li},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {{RFID} privacy: relation between two notions, minimal condition, and
                  efficient construction},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {54--65},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653670},
  doi          = {10.1145/1653662.1653670},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaLDL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CaiLMLD09,
  author       = {Shaoying Cai and
                  Tieyan Li and
                  Changshe Ma and
                  Yingjiu Li and
                  Robert H. Deng},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Enabling Secure Secret Updating for Unidirectional Key Distribution
                  in RFID-Enabled Supply Chains},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {150--164},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_13},
  doi          = {10.1007/978-3-642-11145-7\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CaiLMLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiangLMLD09,
  author       = {Bing Liang and
                  Yingjiu Li and
                  Changshe Ma and
                  Tieyan Li and
                  Robert H. Deng},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {On the Untraceability of Anonymous {RFID} Authentication Protocol
                  with Constant Key-Lookup},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_7},
  doi          = {10.1007/978-3-642-10772-6\_7},
  timestamp    = {Wed, 12 May 2021 16:44:21 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/LiangLMLD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengLMCL08,
  author       = {Dong Zheng and
                  Xiangxue Li and
                  Changshe Ma and
                  Kefei Chen and
                  Jianhua Li},
  title        = {Democratic Group Signatures with Threshold Traceability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengLMCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaWZ07,
  author       = {Changshe Ma and
                  Jian Weng and
                  Dong Zheng},
  title        = {Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/019},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/MaLCL06,
  author       = {Changshe Ma and
                  Shiqun Li and
                  Kefei Chen and
                  Shengli Liu},
  title        = {Analysis and improvement of fair certified e-mail delivery protocol},
  journal      = {Comput. Stand. Interfaces},
  volume       = {28},
  number       = {4},
  pages        = {467--474},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.csi.2005.03.002},
  doi          = {10.1016/J.CSI.2005.03.002},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/MaLCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WengLCM06,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Changshe Ma},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {Identity-Based Key-Insulated Signature Without Random Oracles},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {470--480},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_50},
  doi          = {10.1007/978-3-540-74377-4\_50},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WengLCM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Ma06,
  author       = {Changshe Ma},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Efficient Short Signcryption Scheme with Public Verifiability},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {118--129},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_10},
  doi          = {10.1007/11937807\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Ma06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WengLCM06,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Changshe Ma},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Identity-Based Parallel Key-Insulated Encryption Without Random Oracles:
                  Security Notions and Construction},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {409--423},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_29},
  doi          = {10.1007/11941378\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WengLCM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MaCZL05,
  author       = {Changshe Ma and
                  Kefei Chen and
                  Dong Zheng and
                  Shengli Liu},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Efficient and Proactive Threshold Signcryption},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {233--243},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_17},
  doi          = {10.1007/11556992\_17},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/MaCZL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/MaCLZ05,
  author       = {Changshe Ma and
                  Kefei Chen and
                  Shengli Liu and
                  Dong Zheng},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Luis Javier Garc{\'{\i}}a Castro},
  title        = {Transitive Signatures Based on Bilinear Maps},
  booktitle    = {Security in Information Systems, Proceedings of the 3rd International
                  Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction
                  with ICEIS2005, Miami, USA, May 2005},
  pages        = {48--56},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sis/MaCLZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0504019,
  author       = {Guilin Wang and
                  Feng Bao and
                  Changshe Ma and
                  Kefei Chen},
  title        = {Efficient Authenticated Encryption Schemes with Public Verifiability},
  journal      = {CoRR},
  volume       = {abs/cs/0504019},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0504019},
  eprinttype    = {arXiv},
  eprint       = {cs/0504019},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0504019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics