supported by the National Key R&D Program of China(2022YFB2701500);the National Natural Science Foun-dation of China(62272385,62202375);Shaanxi Distinguished Youth Project,China(2022JC-47);the Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Re-search,China under Grant(ZR2022ZD03);the Key Research and Development Program of Shaanxi,China(2024GX-ZDCYL-01-09,2024GX-ZDCYL-01-15);Young Talent Fund of Association for Science and Technology in Shaanxi,China(20220134).
Identity-based threshold signature(IDTHS)allows a threshold number of signers to generate signatures to improve the deterministic wallet in the blockchain.However,the IDTHS scheme cannot determine the identity of mali...
Rising-Star Program of Shanghai 2023 Science and Technology Innovation Action Plan(Yangfan Special Project),China(No.23YF1401000);Fundamental Research Funds for the Central Universities,China(No.2232022D-25)。
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However...
Project supported by the Special Project of Kunlun Talent Teaching Master of Qinghai Province,China(No.[2020]18)。
Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage.To solve these issues,we propose an identity-based searchable attribute signcryption in lattice for a block...
supported by the Henan Key Laboratory of Network Cryptography Technology(LNCT2022-A11);the Shaanxi Key Laboratory of Information Communication Network and Security(ICNS202006)。
Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-base...
support by the National Key R&D Program of China(No.2021YFB3100400);the National Natural Science Foundation of China(Grant Nos.62172216,U20A201092);the Jiangsu Provincial Key Research and Development Program(Nos.BE2022068,BE2022068-2);the Key R&D Program of Guangdong Province(No.2020B0101090002);the Natural Science Foundation of Jiangsu Province(No.BK20211180);the Research Fund of Guangxi Key Laboratory of Trusted Software(No.KX202034);the Research Fund of State Key Laboratory of Integrated Services Networks(Xidian University)(No.ISN23-20);the Fund of Prospective Layout of Scientific Research for NUAA(Nanjing University of Aeronautics and Astronautics);JSPS Postdoctoral Fellowships(No.P21073).
Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Neverthel...
supported by the National Natural Science Foundation of China(62272287,U2001205);the Sichuan Science and Technology Program(2020JDJQ0076);the Research Funds of Henan Key Laboratory of Network Cryptography Technology(LNCT2021-A04).
In the previous works,to further provide the continuous leakage resilience for the identity-based encryption scheme,a new cryptography primitive,called updatable identity-based hash proof system(U-IB-HPS),was proposed...
Beijing Postdoctoral Research Foundation(No.2021-ZZ-077,No.2020-YJ-006);Chongqing Industrial Control System Security Situational Awareness Platform,2019 Industrial Internet Innovation and Development Project-Provincial Industrial Control System Security Situational Awareness Platform,Center for Research and Innovation in Software Engineering,School of Computer and Information Science(Southwest University,Chongqing 400175,China);Chongqing Graduate Education Teaching Reform Research Project(yjg203032).
With the development of sensor technology and wireless communication technology,edge computing has a wider range of applications.The privacy protection of edge computing is of great significance.In the edge computing ...
supported by the National Key Research and Development Program of China(2020YFB1712101);the National Natural Science Foundation of China(61772070,61772477,61971380);the Key Technologies R&D Program of Henan Province(212102210089,212102210171,212102210075);the Collaborative Innovation Special Plan Project of Zhengzhou(2021ZDPY0206).
Edge-cloud collaborative application scenario is more complex,it involves collaborative operations among different security domains,frequently accessing and exiting application system of mobile terminals.A cross-domai...
supported by the Network and Data Security Key Laboratory of Sichuan Province under the Grant No.NDS2021-2;in part by Science and Technology Project of Educational Commission of Jiangxi Province under the Grant No.GJJ190464;in part by National Natural Science Foundation of China under the Grant No.71661012.
The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare data.Considering referral treatment for patients,the original signature ne...
This research is partially supported by the National Natural Science Foundation of China under Grant Nos.61672016;the Jiangsu Qing Lan Project,the Six Talent Peaks Project in Jiangsu Province under Grant RJFW-010;the Guangxi Key Laboratory of Cryptography and Information Security under Grant GCIS201815.
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secu...