This work was supported in part by the National Natural Science Foundation of China(Nos.62072074,62076054,62027827,62002047);the Sichuan Science and Technology Innovation Platform and Talent Plan(Nos.2020JDJQ0020,2022JDJQ0039);the Sichuan Science and Technology Support Plan(Nos.2020YFSY0010,2022YFQ0045,2022YFS0220,2023YFG0148,2021YFG0131);the YIBIN Science and Technology Support Plan(No.2021CG003);the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar...
Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment...
in part by the National Natural Science Foundation of China under Grants No.61003230,No.61370026,No.61300191,and No.61202445
Certificateless encryption attracts a lot of attention so far by eliminating the key escrow problem in identity-based encryption and public key certificates in the traditional public key cryptography. By considering t...
supported by the National Natural Science Foundation of China under Grant No.61003230,No.61370026,No.61103206,and No.61300191;Chongqing Key Lab of Computer Network and Communication Technology under Grant No.CY-CNCL-2012-02
Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage cause...
This research was supported by the National Natural Science Foundation of China (Grant Nos. 61272425, 61170021, 61202475), Qingdao Science and Technology Development Project (12-1-4-2-(16)-jch, 13-1-4-151-jch), Huawei Technology Fund (YB2013120027), the Founda- tion of China Scholarship Council, Shandong Provincial Key Laboratory of Computer Network (SDKLCN-2013-03), the Open Research Fund from the State Key Laboratory of Information Security, the Open Project Foun- dation of Shandong Provincial Key Laboratory of Software Engineering (2013SE01), and China Postdoctoral Science Foundation (2014M551870).
In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulate...
Project(61100201) supported by National Natural Science Foundation of China;Project(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China;Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,China;Project(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...
Supported by the National Natural Science Foundation of China (No. 60970111, 61133014, 60903189, 60903020).
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ...
the National Natural Science Foundation of China (Nos.60970111,60903189 and 60903020);the National High Technology Research and Development Program (863) of China (No.2009AA01Z418);the National Basic Research Program (973) of China(No.2007CB311201)
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS scheme.For a TKIS system,at least...
the National Natural Science Foundation of China (Nos. 60970111, 60903189 and 60903020);the National High Technology Research and Development Program (863) of China (No. 2009AA01Z418);the National Basic Research Program (973) of China (No. 2007CB311201)
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are ...
the National Natural Science Foundation of China (Nos. 61003215, 61005049, 60903178 and 61103183);the Fundamental Research Funds for the Central Universities (No. 2010B09614);the Foundation of HoHai University (No. 2084/409265)
It is important to ensure the private key secure in cryptosystem. To reduce the underlying danger caused by the private key leakage, Dodis et al. (2003) introduced the notion of key-insulated security. To handle the p...