This work was supported by the National Natural Science Foundation of China under Grant Nos. 61502086 and 61572115.
Data sharing and searching are important functionalities in cloud storage. In this paper, we show how to securely and flexibly search and share cloud data among a group of users without a group manager. We formalize a...
supported by the National Natural Science Foundation of China under Grant No. 60473027;by Sun Yat-Sen University under Grant Nos. 35000-2910025 and 35000-3171912.
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmatio...
This work is supported by the National Natural Science Foundation of China under Grant Nos.60673077, 60503006, 60773202,and 60633030;the National Natural Science Foundation of China-Korea Science and Engineering Foundation Joint Research Project(Grant No.60611140543);the National Grand Fundamental Research 973 Program of China(Grant No.2006CB303104).
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPB...
This work is supported by the National Natural Science Foundation of China under Grant Nos.60503005 and 60673135;the Natural Science Foundation of Guangdong Province under Grant No.05200302;the Open Fund of Guangdong Province Information Security Key Laboratory and the State Key Laboratory of Information Security.
ID-based public key cryptography (ID-PKC) has many advantages over certificate-based public key cryptography (CA-PKC), and has drawn researchers' extensive attention in recent years. However, the existing electro...
This work is supported by the National Natural Science Foundation of China for Distinguished Young Scholars under Grant No. 60225007, the National Natural Science Foundation of China under Grant Nos. 60572155 and 60673079, and the Special Research Funnds of Huawei.
Multi-decrypter encryption is a typical application in multi-user cryptographic branches. In multi-decrypter encryption, a message is encrypted under multiple decrypters' public keys in the way that only when all the...
Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobilit...