default search action
Chunsheng Gu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Zhengjun Jing
, Yongkang Zhu, Quanyu Zhao, Yuanjian Zhou, Chunsheng Gu, Weizhi Meng
:
Equipment failure data trends focused privacy preserving scheme for Machine-as-a-Service. J. Inf. Secur. Appl. 89: 104000 (2025) - [j15]Yan Zhang
, Chunsheng Gu
, Peizhong Shi
, Zhengjun Jing
, Bing Li
, Bo Liu
:
Bring Your Device Group (BYDG): Efficient and Privacy-Preserving User-Device Authentication Protocol in Multi-Access Edge Computing. IEEE Trans. Inf. Forensics Secur. 20: 3346-3361 (2025) - 2021
- [j14]Zhengjun Jing
, Chunsheng Gu, Chunpeng Ge, Peizhong Shi:
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment. Mob. Networks Appl. 26(4): 1609-1615 (2021) - 2020
- [j13]Zhengjun Jing
, Chunsheng Gu, Yong Li, Mengshi Zhang, Guangquan Xu, Alireza Jolfaei
, Peizhong Shi, Chenkai Tan
, James Xi Zheng
:
Security analysis of indistinguishable obfuscation for internet of medical things applications. Comput. Commun. 161: 202-211 (2020)
2010 – 2019
- 2019
- [j12]Peizhong Shi
, Chunsheng Gu, Chunpeng Ge, Zhengjun Jing
:
QoS Aware Routing Protocol Through Cross-layer Approach in Asynchronous Duty-Cycled WSNs. IEEE Access 7: 57574-57591 (2019) - [j11]Zhengjun Jing
, Chunsheng Gu, Zhimin Yu, Peizhong Shi, Chongzhi Gao:
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. Clust. Comput. 22(Suppl 1): 1717-1727 (2019) - [c3]Chunsheng Gu:
Integer Version of Ring-LWE and Its Applications. SocialSec 2019: 110-122 - 2018
- [j10]Zhengjun Jing
, Guoping Jiang, Chunsheng Gu:
A novel identity-based anonymous authentication scheme from multilinear maps. Int. J. Inf. Commun. Technol. 12(1/2): 16-30 (2018) - [j9]Zhimin Yu, Chunsheng Gu, Zhengjun Jing
, Qiu-ru Cai, Ye Luo, Yao Wang:
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem: revisited. Multim. Tools Appl. 77(9): 11307-11320 (2018) - [i16]Chunsheng Gu:
Multilinear maps via secret ring. IACR Cryptol. ePrint Arch. 2018: 312 (2018) - 2017
- [j8]Peizhong Shi, Chunsheng Gu, Zhengjun Jing, Zhimin Yu:
A Constraint-Based Forwarding for Multi-hop Broadcasts in Asynchronous Duty-Cycled WSNs. Ad Hoc Sens. Wirel. Networks 37(1-4): 1-34 (2017) - [j7]Zhimin Yu, Zhengjun Jing, Hua Yang, Chunsheng Gu:
ID-based multi-receiver signcryption scheme in the standard model. Int. J. Internet Protoc. Technol. 10(1): 4-12 (2017) - [i15]Chunsheng Gu:
Multilinear Maps Using a Variant of Ring-LWE. IACR Cryptol. ePrint Arch. 2017: 342 (2017) - [i14]Chunsheng Gu:
Integer Version of Ring-LWE and its Applications. IACR Cryptol. ePrint Arch. 2017: 641 (2017) - [i13]Chunsheng Gu:
Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals. IACR Cryptol. ePrint Arch. 2017: 1159 (2017) - 2016
- [j6]Zhengjun Jing
, Guoping Jiang, Chunsheng Gu, Zhimin Yu, Lingling Xu:
Anonymous authentication for circuits from correlation-relaxed two-to-one recoding. J. Ambient Intell. Humaniz. Comput. 7(2): 153-161 (2016) - [j5]Weifeng Yang, Xiaohong Xia, Baoliu Pan, Chunsheng Gu
, Jiangang Yue:
The fuzzy comprehensive evaluation of water and sand inrush risk during underground mining. J. Intell. Fuzzy Syst. 30(4): 2289-2295 (2016) - [i12]Chunsheng Gu:
Cryptanalysis of Simple Matrix Scheme for Encryption. IACR Cryptol. ePrint Arch. 2016: 1075 (2016) - 2015
- [j4]Chunsheng Gu:
An Improved Multilinear Map and its Applications. Int. J. Inf. Technol. Web Eng. 10(3): 64-81 (2015) - [j3]Chunde Piao, Jun Yuan, Bin Shi
, Haijun Lu, Guangqing Wei, Chunsheng Gu
:
Application of Distributed Optical Fiber Sensing Technology in the Anomaly Detection of Shaft Lining in Grouting. J. Sensors 2015: 678634:1-678634:8 (2015) - [j2]Zhimin Yu, Zhengjun Jing, Chunsheng Gu:
基于多线性映射的环签密广播公钥方案 (Ring Signcryption Broadcasting Scheme Based on Multilinear Maps). 计算机科学 42(3): 106-110 (2015) - [c2]Chunsheng Gu, Zhimin Yu, Zhengjun Jing
, Peizhong Shi, Jin Qian:
Improvement of GGH Multilinear Map. 3PGCIC 2015: 407-411 - [i11]Chunsheng Gu:
Multilinear Maps Using Ideal Lattices without Encodings of Zero. IACR Cryptol. ePrint Arch. 2015: 23 (2015) - [i10]Chunsheng Gu:
Ideal Multilinear Maps Based on Ideal Lattices. IACR Cryptol. ePrint Arch. 2015: 269 (2015) - [i9]Chunsheng Gu:
New multilinear maps from ideal lattices. IACR Cryptol. ePrint Arch. 2015: 737 (2015) - [i8]Chunsheng Gu:
Variation of GGH15 Multilinear Maps. IACR Cryptol. ePrint Arch. 2015: 1245 (2015) - 2014
- [j1]Chunsheng Gu, Jixing Gu:
Known-plaintext attack on secure kNN computation on encrypted databases. Secur. Commun. Networks 7(12): 2432-2441 (2014) - [c1]Zhengjun Jing
, Guoping Jiang, Chunsheng Gu:
A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps. 3PGCIC 2014: 151-156 - 2012
- [i7]Chunsheng Gu:
Attack on Fully Homomorphic Encryption over the Integers. CoRR abs/1202.3321 (2012) - [i6]Chunsheng Gu:
Attack on Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2012: 157 (2012) - 2011
- [i5]Chunsheng Gu:
Fully Homomorphic Encryption, Approximate Lattice Problem and LWE. IACR Cryptol. ePrint Arch. 2011: 114 (2011) - [i4]Chunsheng Gu:
New Fully Homomorphic Encryption over the Integers. IACR Cryptol. ePrint Arch. 2011: 118 (2011) - [i3]Chunsheng Gu:
More Practical Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2011: 121 (2011) - [i2]Chunsheng Gu:
Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2011: 328 (2011) - [i1]Chunsheng Gu:
New Fully Homomorphic Encryption without Bootstrapping. IACR Cryptol. ePrint Arch. 2011: 645 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-12 21:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint