Skip to main content

and
  1. No Access

    Article

    Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network

    Making new friends by measuring the proximity of people’s profile is a crucial service in mobile social networks. With the rapid development of cloud computing, outsourcing computing and storage to the cloud i...

    Chong-zhi Gao, Qiong Cheng, Xuan Li, Shi-bing **a in Cluster Computing (2019)

  2. No Access

    Article

    Privacy-preserving outsourced classification in cloud computing

    Classifier has been widely applied in machine learning, such as pattern recognition, medical diagnosis, credit scoring, banking and weather prediction. Because of the limited local storage at user side, data a...

    ** Li, ** Li, Zhengan Huang, Chong-Zhi Gao, Wen-Bin Chen, Kai Chen in Cluster Computing (2018)

  3. No Access

    Chapter and Conference Paper

    Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack

    The deniable encryption is a type of encryption which can hide the true message while revealing a fake one. Even if the sender or the receiver is coerced to show the plaintext and the used random numbers in en...

    Chong-zhi Gao, Dongqing **e, Baodian Wei in Information Security Practice and Experience (2012)

  4. No Access

    Chapter and Conference Paper

    Improved Implementations of Cryptosystems Based on Tate Pairing

    Hu et al. first studied pairing computations on supersingular elliptic curve with odd embedding degree k = 3 and applied them to Identity-based cryptosystems. In this paper, a careful analysis of the pairing comp...

    Chang-An Zhao, Dongqing **e, Fangguo Zhang in Advances in Information Security and Assur… (2009)

  5. No Access

    Chapter and Conference Paper

    Divisible On-Line/Off-Line Signatures

    On-line/Off-line signatures are used in a particular scenario where the signer must respond quickly once the message to be signed is presented. The idea is to split the signing procedure into two phases: the o...

    Chong-zhi Gao, Baodian Wei, Dongqing **e in Topics in Cryptology – CT-RSA 2009 (2009)

  6. No Access

    Chapter and Conference Paper

    How to Authenticate Real Time Streams Using Improved Online/Offline Signatures

    Providing authentication protocols for real time streams is a challenging task. This is because the authentication rate is very important for real time streams, whereas it is usually a bottleneck. Using improv...

    Chong-zhi Gao, Zheng-an Yao in Cryptology and Network Security (2005)

  7. Chapter and Conference Paper

    A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme

    Ring signature allows to specify a set of possible signers without revealing which member actually produced the signature. This concept was first formalized in 2001 by Rivest, Shamir, and Tauman[3]. Authors of...

    Chong-zhi Gao, Zheng-an Yao, Lei Li in Applied Cryptography and Network Security (2003)