supported by the Office of Research, Singapore Management University;supported by the National Natural Science Foundation of China (Grant Nos. 60903178,90704004,60703030,60873229);the National High-Tech Research & Development Program of China (Grants Nos.2009AA01Z418,2008AA01Z403,2007AA01Z456)
Up to now, it is still an open question of how to construct a chosen-ciphertext secure unidirectional proxy re-encryption scheme in the adaptive corruption model. To address this problem, we propose a new unidirection...
the National High Technology Research and Development Program(863)of China(No.2006AA01Z422);the National Natural Science Foundation of China(Nos.60573030,90704004)
Authentication is the basis of the security of IEEE 802.11i standard. The authentication process in 802.11i involves two important protocols: a 4-way handshake and a group key handshake. A formal analysis of authenti...
the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036,90704004)
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time ...
the National Natural Science Foundation of China (Nos. 60573030, 90704004);the National Basic Research Program (973) of China(No. 2007CB311201)
Recently some efforts were made towards capturing the security requirements within the composable security framework. This modeling has some significant advantages in designing and analyzing complex systems. The thres...