Skip to main content

and
  1. No Access

    Book and Conference Proceedings

    Information Security and Cryptology

    19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part I

    Chunpeng Ge, Moti Yung in Lecture Notes in Computer Science (2024)

  2. No Access

    Book and Conference Proceedings

    Information Security and Cryptology

    19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II

    Chunpeng Ge, Moti Yung in Lecture Notes in Computer Science (2024)

  3. No Access

    Article

    Tips: towards automating patch suggestion for vulnerable smart contracts

    Smart contracts are slowly penetrating our society where they are leveraged to support critical business transactions of which financial stakes are high. Smart contract programming is, however, in its infancy,...

    Qianguo Chen, Teng Zhou, Kui Liu, Li Li, Chunpeng Ge in Automated Software Engineering (2023)

  4. No Access

    Chapter and Conference Paper

    Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning

    As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...

    Zhen **a, Zhenfu Cao, Jiachen Shen in Information Security Practice and Experien… (2023)

  5. No Access

    Chapter and Conference Paper

    A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication

    Privacy-preserving machine learning is a hot topic in Artificial Intelligence (AI) area. However, there are also many security issues in all stages of privacy-oriented machine learning. This paper focuses on t...

    Yang Hong, Lisong Wang, Weizhi Meng, Jian Cao, Chunpeng Ge in Network and System Security (2022)

  6. No Access

    Chapter and Conference Paper

    CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts

    Smart contracts, that allow parties to establish agreements based on predefined rules without a trusted third-party, have been explored in various applications. However, the main drawback of smart contracts is...

    **aofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang in Information Security and Privacy (2022)

  7. No Access

    Book and Conference Proceedings

    Provable and Practical Security

    16th International Conference, ProvSec 2022, Nan**g, China, November 11–12, 2022, Proceedings

    Chunpeng Ge, Fuchun Guo in Lecture Notes in Computer Science (2022)

  8. No Access

    Article

    Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment

    Shor presented a quantum algorithm to factor large integers and compute discrete logarithms in polynomial time. As a result, public key cryptosystems, such as RSA, ElGamal and ECC, which are based on these com...

    Zhengjun **g, Chunsheng Gu, Chunpeng Ge, Peizhong Shi in Mobile Networks and Applications (2021)

  9. No Access

    Chapter and Conference Paper

    Fully Discover the Balance of Lightning Network Payment Channels

    The Lightning Network is a payment channel network that runs on top of Bitcoin. It is an open network, in which anyone with a computing device capable of connecting to the Internet can participate. Every parti...

    Zhixin Zhao, Chunpeng Ge, Lu Zhou in Wireless Algorithms, Systems, and Applicat… (2021)

  10. No Access

    Chapter and Conference Paper

    ActAnyware - Blockchain-Based Software Licensing Scheme

    Software validation is a long battle between software developers and software pirates. License validation is proposed as the protection of both developer’s revenue and intellectual properties. However, as the ...

    Wei-Yang Chiu, Lu Zhou, Weizhi Meng, Zhe Liu in Blockchain and Trustworthy Systems (2021)

  11. No Access

    Article

    Achieving reliable timestamp in the bitcoin platform

    Blockchain, the underlying technology of the Bitcoin cryptocurrency, is an innovation of information technology. The blockchain technology has been widely applied in the evidence storage scenarios to prove tha...

    Guangkai Ma, Chunpeng Ge, Lu Zhou in Peer-to-Peer Networking and Applications (2020)

  12. No Access

    Article

    Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs

    Zengpeng Li, Vishal Sharma, Chunguang Ma, Chunpeng Ge in Science China Information Sciences (2020)

  13. No Access

    Article

    A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes

    In the Bitcoin network, the simplified payment verification protocol (SPV) enables a lightweight device such as a mobile phone to participate in the bitcoin network without needed to download and store the who...

    Lu Zhou, Chunpeng Ge, Chunhua Su in Science China Information Sciences (2020)

  14. No Access

    Chapter and Conference Paper

    A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds

    Micro-video sharing is prevalent nowadays due to the rapid development of personal smart devices, fast growing of network bandwidth and the easy-to-use cloud computing. However, the micro-video sharing system ...

    Chunpeng Ge, Lu Zhou, **yue **a in Security and Privacy in Social Networks an… (2019)

  15. No Access

    Chapter and Conference Paper

    Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture

    With the rapid growth of the transportation systems, the Internet of Vehicles (IoV) has evolved as a new theme in both industry and academia from traditional vehicular ad hoc networks (VANETs). However, the mu...

    **nshu Ma, Chunpeng Ge, Zhe Liu in Network and System Security (2019)

  16. No Access

    Article

    A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system

    The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertex...

    Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang in Designs, Codes and Cryptography (2018)

  17. No Access

    Article

    A proxy broadcast re-encryption for cloud data sharing

    Proxy re-encryption (PRE) enables a semi-trusted proxy to automatically convert a delegator’s ciphertext to a delegate’s ciphertext without learning anything about the underlying plaintext. PRE schemes have br...

    Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang in Multimedia Tools and Applications (2018)

  18. No Access

    Article

    Fuzzy conditional proxy re-encryption

    Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy. To achieve more fine-grained de...

    LiMing Fang, JianDong Wang, ChunPeng Ge, YongJun Ren in Science China Information Sciences (2013)

  19. No Access

    Chapter and Conference Paper

    A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle

    The public key encryption with keyword Search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the origi...

    Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang in Cryptology and Network Security (2009)