supported by the National Natural Science Foundation of China (Grant Nos.60970110,60972034);the State Key Program of National Natural Science of China (Grant No.61033014)
We propose a novel method to compute a cubic root of a cubic residue in Eisenstein ring. By applying our method, a new identity based signature scheme is proposed based on cubic residues. We formally prove that our sc...
the National Natural Science Foundation of China(No.60972034)
Distributed information systems require complex access control which depends upon attributes of protected data and access policies.Traditionally,to enforce the access control,a file server is used to store all data an...
supported in part by the National Natural Science Foundation of China (Grant Nos.60970110,60972034,61033014);the National Basic Research Program of China (Grant No.2007CB311201);Zhejiang Provincial Natural Science Foundation of China (Grant No.Y1110157);Science Foundation of Zhejiang Sci-Tech University (Grant No.1007827-Y)
In this paper, we investigate the famous Blake-Wilson, Johnson & Menezes (BJM) authenticated key exchange protocols. We observe that the BJM model fails to model the adversary's capability in the public setting we...
the National Natural Science Foundation of China (Nos. 60970110, 60972034 and 60773086);the National Basic Research Program (973) of China(No. 2007CB311201) ;the Shanghai Leading Academic Discipline Project(No. B412)
A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo's sch...
the National Natural Science Foundation of China (Nos. 60970110, 60972034 and 60773086);the National Basic Research Program (973) of China(No. 2007CB311201);the Shanghai Leading Academic Discipline Project (No. B412)
Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocol...
supported by the National Natural Science Foundation of China (Grant Nos. 90718001, 60973159,60972034, 60773086, 60821001);the National High-Tech Research & Development Program of China (Grant No.2009AA01Z439);the National Basic Research Program of China (Grant No. 2007CB310704);(Japan) NICT International Exchange Program (Grant No. 2009-002)
The development of quantum computation casts serious threats to the securities of most existing public-key cryptosystems. Braid-based cryptography is one of the alternatives that have potential advantages in resisting...