Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Efficient Tag Path Authentication Protocol with Less Tag Memory

    Logistical management has been advanced rapidly in these years, taking advantage of the broad connectivity of the Internet. As it becomes an important part of our lives, it also raises many challenging issues,...

    Hongbing Wang, Yingjiu Li, Zongyang Zhang in Information Security Practice and Experien… (2016)

  2. No Access

    Chapter and Conference Paper

    Practical Signature Scheme from \(\varGamma \) -Protocol

    Digital signature is fundamental to information security. Today many signature schemes based on discrete logarithm problem (DLP), including Schnorr, DSA and their variants, have been standardized and widely us...

    Zhoujun Ma, Li Yang, Yunlei Zhao in Information Security Practice and Experience (2016)

  3. No Access

    Chapter and Conference Paper

    Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model

    A popular methodology of designing cryptosystems with practical efficiency is to give a security proof in the random oracle (RO) model. The work of Fischlin and Fleischhacker (Eurocrypt ’13) investigated the c...

    Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka in Provable Security (2015)

  4. Chapter and Conference Paper

    A New Framework for Privacy of RFID Path Authentication

    RFID-based path authentication enables supply chain managers to verify the exact path that a tag has taken. In this paper, we introduce a new oracle Move that models a tag’s movement along a designed or an arbitr...

    Shaoying Cai, Robert H. Deng, Yingjiu Li in Applied Cryptography and Network Security (2012)

  5. Chapter and Conference Paper

    Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains

    In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, ou...

    Shaoying Cai, Yingjiu Li, Yunlei Zhao in Information Security and Privacy Research (2012)

  6. Chapter and Conference Paper

    On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010

    In ACM CCS 2007, Canetti and Hohenberger left an interesting open problem of how to construct a chosen-ciphertext secure proxy re-encryption (PRE) scheme without bilinear maps. This is a rather interesting pro...

    Jian Weng, Yunlei Zhao, Goichiro Hanaoka in Public Key Cryptography – PKC 2011 (2011)

  7. No Access

    Chapter and Conference Paper

    Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage

    SMQV authenticated key exchange scheme was stated to be secure against leakage of intermediate computations, i.e., secure in the seCK model. However, in this paper, we show errors in the security proof of SMQV...

    Kazuki Yoneyama, Yunlei Zhao in Provable Security (2011)

  8. Chapter and Conference Paper

    Hierarchical Identity-Based Chameleon Hash and Its Applications

    At ACNS 2008, Canard et al. introduced the notion of trapdoor sanitizable signature (TSS) based on identity-based chameleon hash (IBCH). Trapdoor sanitizable signatures allow the signer of a message to delegat...

    Feng Bao, Robert H. Deng, Xuhua Ding in Applied Cryptography and Network Security (2011)

  9. Chapter and Conference Paper

    Deniable Internet Key Exchange

    In this work, we develop a family of non-malleable and deniable Diffie-Hellman key-exchange (DHKE) protocols, named deniable Internet key-exchange (DIKE). The newly developed DIKE protocols are of conceptual clar...

    Andrew C. Yao, Yunlei Zhao in Applied Cryptography and Network Security (2010)

  10. Chapter and Conference Paper

    A New Framework for RFID Privacy

    Formal RFID security and privacy frameworks are fundamental to the design and analysis of robust RFID systems. In this paper, we develop a new definitional framework for RFID privacy in a rigorous and precise ...

    Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao in Computer Security – ESORICS 2010 (2010)

  11. Chapter and Conference Paper

    Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model

    We present a generic construction for constant-round concurrsound resettable zero-knowledge (rZK-CS) arguments for \(\mathcal{NP}\) ...

    Moti Yung, Yunlei Zhao in Advances in Cryptology - EUROCRYPT 2007 (2007)

  12. Chapter and Conference Paper

    Interactive Zero-Knowledge with Restricted Random Oracles

    We investigate the design and proofs of zero-knowledge (ZK) interactive systems under what we call the “restricted random oracle model” which restrains the usage of the oracle in the protocol design to that of...

    Moti Yung, Yunlei Zhao in Theory of Cryptography (2006)

  13. Chapter and Conference Paper

    Some Observations on Zap and Its Applications

    In this paper we make some observations on the zaps and their applications developed by Dwork and Naor [13]. We clarify the relations among public-coin witness indistinguishability (WI), public-coin honest ver...

    Yunlei Zhao, C. H. Lee, Yiming Zhao, Hong Zhu in Applied Cryptography and Network Security (2004)