This work is supported by the National Natural Science Foundation of China (No.60873229, No.60673077, No.60673076, No.60573030, No.60703031), the National 863 High-Technology Project (No.2006AA01Z422) and 973 Program (No.2007CB311201).
We present a new public key trace and revoke scheme, which is suitable for scenarios where users need to join or leave the system frequently. The proposed scheme supports public traceability and dynamic registration a...
the National Laboratory for Modern Communications(No.51436050304JW0317);the National Natural Science Foundation of China(No.60573030)
Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity co...
The National Natural Science Foundation of China (No. 90704003, 60573030, 60673077, 60703030)
To deal with the key-exposure problem in signature systems, a new framework named parallel key-insulated signature (PKIS) was introduced, and a concrete PKIS scheme was proposed. Compared with traditional key-insulate...
the National Natural Science Foundation of China (Grant Nos. 60303026, 60573030, and 60673077)
In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they giv...
This work is partially supported by the National Natural Science Foundation of China (No.60473020, No.60573030) and by NLMCSFC (No.9140C1103010602).
To reduce the key sizes and bandwidth, public-key cryptographic systems have been proposed using d-th order characteristic sequences generated by a Linear feedback shift register (LFSR). The paper proposes an LFSR-b...
Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) ;the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC...
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext...