Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    ActAnyware - Blockchain-Based Software Licensing Scheme

    Software validation is a long battle between software developers and software pirates. License validation is proposed as the protection of both developer’s revenue and intellectual properties. However, as the ...

    Wei-Yang Chiu, Lu Zhou, Weizhi Meng, Zhe Liu in Blockchain and Trustworthy Systems (2021)

  2. No Access

    Article

    Achieving reliable timestamp in the bitcoin platform

    Blockchain, the underlying technology of the Bitcoin cryptocurrency, is an innovation of information technology. The blockchain technology has been widely applied in the evidence storage scenarios to prove tha...

    Guangkai Ma, Chunpeng Ge, Lu Zhou in Peer-to-Peer Networking and Applications (2020)

  3. No Access

    Article

    Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs

    Zengpeng Li, Vishal Sharma, Chunguang Ma, Chunpeng Ge in Science China Information Sciences (2020)

  4. No Access

    Article

    A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes

    In the Bitcoin network, the simplified payment verification protocol (SPV) enables a lightweight device such as a mobile phone to participate in the bitcoin network without needed to download and store the who...

    Lu Zhou, Chunpeng Ge, Chunhua Su in Science China Information Sciences (2020)

  5. No Access

    Article

    Fuzzy conditional proxy re-encryption

    Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy. To achieve more fine-grained de...

    LiMing Fang, JianDong Wang, ChunPeng Ge, YongJun Ren in Science China Information Sciences (2013)