Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Predicate Aggregate Signatures and Applications

    Motivated by applications in anonymous reputation systems and blockchain governance, we initiate the study of predicate aggregate signatures (PAS), which is a new primitive that enables users to sign multiple mes...

    Tian Qiu, Qiang Tang in Advances in Cryptology – ASIACRYPT 2023 (2023)

  2. No Access

    Chapter and Conference Paper

    A Shallow Convolution Network Based Contextual Attention for Human Activity Recognition

    Human activity recognition (HAR) is increasingly important in ubiquitous computing applications. Recently, attention mechanism are extensively used in sensor-based HAR tasks, which is capable of focusing the n...

    Chenyang Xu, Zhihong Mao, Feiyi Fan in Mobile and Ubiquitous Systems: Computing, … (2023)

  3. No Access

    Chapter and Conference Paper

    A Multi-Group Signature Scheme from Lattices

    Group signature allows group members to sign on behalf of the group anonymously, and incorporate some tracing mechanism to identify the actual signer. Multi-group signature (MGS), introduced by Ateniese and Tsudi...

    Tian Qiu, Lin Hou, Dongdai Lin in Information and Communications Security (2020)

  4. No Access

    Chapter and Conference Paper

    Lattice HIBE with Faster Trapdoor Delegation and Applications

    In this paper, we propose a lattice-based HIBE scheme in the standard model with faster trapdoor delegation. It is proven secure under the Learning With Errors assumption. Inspired by Canetti et al.’s transformat...

    Guofeng Tang, Tian Qiu in Information and Communications Security (2020)

  5. No Access

    Chapter and Conference Paper

    Analysis of Zipper as a Hash Function

    At CRYPTO 2005, Coron etc. proposed several modified methods to make the usual hash functions based on MD method indifferentiable from random oracles. However, the compression functions used in Coron’s schemes...

    Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu in Information Security Practice and Experience (2008)