Skip to main content

previous disabled Page of 2
and
  1. Chapter and Conference Paper

    Design and Security Analysis of Anonymous Group Identification Protocols

    Two provably secure group identification schemes are presented in this report: 1) we extend De Santis, Crescenzo and Persiano’s (SCP) anonymous group identification scheme to the discrete logarithm based case;...

    Chan H. Lee, **aotie Deng, Huafei Zhu in Public Key Cryptography (2002)

  2. No Access

    Chapter and Conference Paper

    A Novel Two-Level Trust Model for Grid

    Trust is hard to establish in a service-oriented grid architecture because of the need to support end user single sign-on and dynamic transient service. In order to enhance the security by the Grid Security In...

    Tie-Yan Li, HuaFei Zhu, Kwok-Yan Lam in Information and Communications Security (2003)

  3. No Access

    Chapter and Conference Paper

    Variations of Diffie-Hellman Problem

    This paper studies various computational and decisional Diffie-Hellman problems by providing reductions among them in the high granularity setting. We show that all three variations of computational Diffie-Hel...

    Feng Bao, Robert H. Deng, HuaFei Zhu in Information and Communications Security (2003)

  4. Chapter and Conference Paper

    Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model

    In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construction is that given any valid partial sig...

    Huafei Zhu in Public Key Cryptography – PKC 2004 (2004)

  5. No Access

    Chapter and Conference Paper

    Analysis and Improvement of Micali’s Fair Contract Signing Protocol

    In PODC 2003, Micali presented a fair electronic exchange protocol for contract signing with an invisible trusted party [17]. The protocol was filed as a US patent No 5666420 in 1997 [16]. In the protocol, two...

    Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu in Information Security and Privacy (2004)

  6. No Access

    Chapter and Conference Paper

    Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN

    The current packet based stream authentication schemes provide effective and efficient authentication over a group of packets transmitted on erasure channels. However, by fixing the packets in transmission, an...

    Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu in Information and Communications Security (2004)

  7. Chapter and Conference Paper

    Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks

    In this paper, a refined sequential aggregate signature scheme from RSA that works for any modulus is presented, then a compact stimulation mechanism without a central, trusted authority for routing discovery ...

    Huafei Zhu, Feng Bao, Tieyan Li in Communications and Multimedia Security (2005)

  8. Chapter and Conference Paper

    Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream

    Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may consist of multiple sources and be trans...

    Tieyan Li, Huafei Zhu, Yongdong Wu in Information and Communications Security (2005)

  9. Chapter and Conference Paper

    Augmented Oblivious Polynomial Evaluation Protocol and Its Applications

    In this paper, we first introduce a new notion called augmented oblivious polynomial evaluation (AOPE), a useful notion to deal with the general oblivious polynomial evaluation protocol. And then we propose a ...

    Huafei Zhu, Feng Bao in Computer Security – ESORICS 2005 (2005)

  10. No Access

    Chapter and Conference Paper

    A Novel Construction of Two-Party Private Bidding Protocols from Yao’s Millionaires Problem

    In this paper, a new bidding protocol (in essence, it is Yao’s millionaires problem) is implemented. We show that our implementation is provably secure in the common reference string model assuming that a stat...

    Huafei Zhu, Feng Bao in Trust, Privacy, and Security in Digital Business (2005)

  11. No Access

    Chapter and Conference Paper

    Efficient Group Signatures from Bilinear Pairing

    This paper presents two types of group signature schemes from bilinear pairings: the mini type and the improved type. The size of the group public keys and the length of the signatures in both schemes are constan...

    **angguo Cheng, Huafei Zhu, Ying Qiu, **nmei Wang in Information Security and Cryptology (2005)

  12. No Access

    Chapter and Conference Paper

    A MPC and Genetic Algorithm Based Approach for Multiple UAVs Cooperative Search

    This paper focuses on the problem of cooperative search using a team of Unmanned Aerial vehicles (UAVs). The objective is to visit as many unknown area as possible, while avoiding collision. We present an appr...

    **g Tian, Yanxing Zheng, Huayong Zhu in Computational Intelligence and Security (2005)

  13. Chapter and Conference Paper

    Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains

    The contribution of this paper has two folds. In the first fold, we propose a generic construction of sequential aggregate signatures from families of certificated trapdoor one-way permutations. We show that o...

    Huafei Zhu, Feng Bao, Robert H. Deng in Information and Communications Security (2005)

  14. No Access

    Chapter and Conference Paper

    More on Shared-Scalar-Product Protocols

    Secure scalar product protocols provide fundamental security components for distributed data mining with privacy concerns. This paper makes two contributions in the shared-scalar-product protocols. In the firs...

    Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu in Information Security Practice and Experience (2006)

  15. No Access

    Chapter and Conference Paper

    Stand-Alone and Setup-Free Verifiably Committed Signatures

    In this paper, a novel construction of stand-alone and setup-free verifiably committed signatures from RSA – an open problem advertised by Dodis and Reyzin in their speech [16] is presented. The methodology us...

    Huafei Zhu, Feng Bao in Topics in Cryptology – CT-RSA 2006 (2006)

  16. Chapter and Conference Paper

    Computing of Trust in Ad-Hoc Networks

    Although, the notion of trust has been considered as a primitive for establishing relationships among nodes in ad-hoc networks, syntax and metrics of trust are not well defined. This paper studies computing of...

    Huafei Zhu, Feng Bao, Jianwei Liu in Communications and Multimedia Security (2006)

  17. Chapter and Conference Paper

    Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper)

    At PODC’05, Subramanian, Katz, Roth, Shenker and Stoica (SKRSS) introduced and formulated a new theoretical problem called reliable broadcast problems in unknown fixed-identity networks [3] and further propose...

    Huafei Zhu, Jianying Zhou in Information and Communications Security (2006)

  18. No Access

    Chapter and Conference Paper

    Oblivious Scalar-Product Protocols

    In this paper, a new notion which we call oblivious scalar-product protocols is introduced and formalized. We then propose an efficient implementation of oblivious scalar-product protocols based on homomorphic...

    Huafei Zhu, Feng Bao in Information Security and Privacy (2006)

  19. No Access

    Chapter and Conference Paper

    More on Stand-Alone and Setup-Free Verifiably Committed Signatures

    Two notions regarding fair exchange protocols have been introduced and formalized in the literature – one is verifiably encrypted signatures; the other is verifiably committed signatures. Thus it is always int...

    Huafei Zhu, Feng Bao in Information Security and Privacy (2006)

  20. Chapter and Conference Paper

    Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures

    In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signatures in the multi-party setting. We the...

    Huafei Zhu, Willy Susilo, Yi Mu in Public Key Cryptography – PKC 2007 (2007)

previous disabled Page of 2