Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning

    As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...

    Zhen **a, Zhenfu Cao, Jiachen Shen in Information Security Practice and Experien… (2023)

  2. No Access

    Chapter and Conference Paper

    A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication

    Privacy-preserving machine learning is a hot topic in Artificial Intelligence (AI) area. However, there are also many security issues in all stages of privacy-oriented machine learning. This paper focuses on t...

    Yang Hong, Lisong Wang, Weizhi Meng, Jian Cao, Chunpeng Ge in Network and System Security (2022)

  3. No Access

    Chapter and Conference Paper

    CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts

    Smart contracts, that allow parties to establish agreements based on predefined rules without a trusted third-party, have been explored in various applications. However, the main drawback of smart contracts is...

    **aofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang in Information Security and Privacy (2022)

  4. No Access

    Chapter and Conference Paper

    Fully Discover the Balance of Lightning Network Payment Channels

    The Lightning Network is a payment channel network that runs on top of Bitcoin. It is an open network, in which anyone with a computing device capable of connecting to the Internet can participate. Every parti...

    Zhixin Zhao, Chunpeng Ge, Lu Zhou in Wireless Algorithms, Systems, and Applicat… (2021)

  5. No Access

    Chapter and Conference Paper

    ActAnyware - Blockchain-Based Software Licensing Scheme

    Software validation is a long battle between software developers and software pirates. License validation is proposed as the protection of both developer’s revenue and intellectual properties. However, as the ...

    Wei-Yang Chiu, Lu Zhou, Weizhi Meng, Zhe Liu in Blockchain and Trustworthy Systems (2021)

  6. No Access

    Chapter and Conference Paper

    A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds

    Micro-video sharing is prevalent nowadays due to the rapid development of personal smart devices, fast growing of network bandwidth and the easy-to-use cloud computing. However, the micro-video sharing system ...

    Chunpeng Ge, Lu Zhou, **yue **a in Security and Privacy in Social Networks an… (2019)

  7. No Access

    Chapter and Conference Paper

    Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture

    With the rapid growth of the transportation systems, the Internet of Vehicles (IoV) has evolved as a new theme in both industry and academia from traditional vehicular ad hoc networks (VANETs). However, the mu...

    **nshu Ma, Chunpeng Ge, Zhe Liu in Network and System Security (2019)

  8. No Access

    Chapter and Conference Paper

    A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle

    The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the origi...

    Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang in Cryptology and Network Security (2009)