关注
Sha Ma
Sha Ma
在 scau.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Efficient public key encryption with equality test supporting flexible authorization
S Ma, Q Huang, M Zhang, B Yang
IEEE Transactions on Information Forensics and Security 10 (3), 458-470, 2014
1992014
Identity-based encryption with outsourced equality test in cloud computing
S Ma
Information Sciences 328, 389-402, 2016
1862016
Public key encryption with delegated equality test in a multi-user setting
S Ma, M Zhang, Q Huang, B Yang
The Computer Journal 58 (4), 986-1002, 2015
1182015
ID-based encryption with equality test against insider attack
T Wu, S Ma, Y Mu, S Zeng
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
532017
Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage
H Li, Q Huang, S Ma, J Shen, W Susilo
IEEE Access 7, 25409-25421, 2019
382019
Group public key encryption with equality test against offline message recovery attack
Y Ling, S Ma, Q Huang, X Li, Y Ling
Information Sciences 510, 16-32, 2020
322020
A generic scheme of plaintext-checkable database encryption
S Ma, Y Mu, W Susilo
Information Sciences 429, 88-101, 2018
242018
Group id-based encryption with equality test
Y Ling, S Ma, Q Huang, R Xiang, X Li
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
202019
Private set intersection with authorization over outsourced encrypted datasets
Y Wang, Q Huang, H Li, M Xiao, S Ma, W Susilo
IEEE Transactions on Information Forensics and Security 16, 4050-4062, 2021
192021
Efficient group ID-based encryption with equality test against insider attack
Y Ling, S Ma, Q Huang, X Li, Y Zhong, Y Ling
The Computer Journal 64 (4), 661-674, 2021
162021
Identity-based broadcast encryption for inner products
J Lai, Y Mu, F Guo, P Jiang, S Ma
The Computer Journal 61 (8), 1240-1251, 2018
162018
Witness-based searchable encryption
S Ma, Y Mu, W Susilo, B Yang
Information Sciences 453, 364-378, 2018
152018
A general two-server framework for ciphertext-checkable encryption against offline message recovery attack
Y Ling, S Ma, Q Huang, X Li
International Conference on Cloud Computing and Security, 370-382, 2018
142018
A general two-server cryptosystem supporting complex queries
S Ma, Y Ling
Information Security Applications: 18th International Conference, WISA 2017 …, 2018
142018
Lattice-based proxy signature scheme
夏峰, 杨波, 马莎, 孙微微, 张明武
Journal of Hunan University 38 (6), 84-88, 2011
142011
Efficient public key encryption with outsourced equality test for cloud-based IoT environments
S Ma, Y Zhong, Q Huang
IEEE Transactions on Information Forensics and Security 17, 3758-3772, 2022
122022
Authorized equality test of encrypted data for secure cloud databases
S Ma
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
122018
Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost
J Lai, Y Mu, F Guo, R Chen, S Ma
Theoretical Computer Science 714, 15-26, 2018
112018
An efficient identity-based signature from lattice in the random oracle model
F Xia, B Yang, W Sun
Journal of Computational Information Systems 7 (11), 3963-3971, 2011
92011
A privacy-preserving join on outsourced database
S Ma, B Yang, K Li, F Xia
Information Security: 14th International Conference, ISC 2011, Xi’an, China …, 2011
92011
系统目前无法执行此操作,请稍后再试。
文章 1–20