supported by the National Natural Science Foundation of China(No.61272398);National Social Science Foundation of China(No.13AXW010);Foundation of Science and Technology on Information Assurance Laboratory(No.KJ-14-008);Discipline Construction Foundation of Central University of Finance and Economics
Based on revisiting the RYY+Identitybased(ID-Based) key agreement protocol, we find it's vulnerable to Intermediate results leakage(IRL) and Keycompromise impersonation(KCI) attack. A novel protocol called RYY++is pro...
This work is supported by the National Natural Science Foundation of China (No.60803151, No.61103178).
Multi-recipient public-key encryption can be used to solve the security issue of One-To-Many com-munications such as secure broadcast. In a multi-recipient public-key encryption scheme, a ciphertext generated by the s...
Manuscript Received Mar. 2011; Accepted Apr. 2011. This work is jointly supported by the National Natural Science Foundation of China (NSFC) and Civil Aviation Administration of China (CAAC) (No.61079019).
Internet of Things (IoT) is attracting in- tensive attention. Currently, most existing IoT systems heavily rely on the identification (ID) number of each ob- ject/thing referred as ID-based IoTs. However, in many ...
In 2004, Libert and Quisquater proposed an identity based undeniable signature scheme using pairings over elliptic curves. In this paper, we show that the scheme is not secure. In other words, if a signer reveal a pai...
This work is supported by the National Natural Science Foundation of China(No.60403007 and No.60503006) and Natural Science Foundation of Guangdong Province, China (No.04205407).
Multi-proxy signature and blind multisignature are two important group-oriented signatures. Multi-proxy signature allows the original signer delegate his signing power to a group of proxy signers. Blind multisignature...
This work is supported by the National Grand Fundamental Research 973 Program of China (No.G1999035802), the National Natural Science Foundation of China (No.60373039), the National Science Fund of China for Distinguished Young Scholars (No.60025205).
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting' especially when efficient key management and moderate security are required, in a (t, n) thres...