Search For:

Displaying 1-17 out of 17 total
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage
Found in: IEEE Transactions on Parallel and Distributed Systems
By Huaqun Wang,Yuqing Zhang
Issue Date:January 2014
pp. 264-267
Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without downloading the whole data. In 2012, Zhu et al. proposed the construction of an efficient PDP scheme for multi...
 
Proxy Provable Data Possession in Public Clouds
Found in: IEEE Transactions on Services Computing
By Huaqun Wang
Issue Date:October 2013
pp. 551-559
Recently, cloud computing rapidly expands as an alternative to conventional computing due to it can provide a flexible, dynamic and resilient infrastructure for both academic and business environments. In public cloud environment, the client moves its data...
 
Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Huaqun Wang,Yuqing Zhang,Bo Qin
Issue Date:June 2012
pp. 1057-1062
Anonymous signcryption provides anonymity of the sender with the advantages of signcryption. When a sender wants to send a message to multiple receivers in the confidential and authenticated way, multi receiver signcryption is needed. In 2010, Zhang et al....
 
Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Huaqun Wang,Yuqing Zhang
Issue Date:December 2011
pp. 451-455
In order to improve the security of ring signature, we combine standard ring signature and key-insulated cryptography. We give the definition and security model for ID-based key-insulated ring signature, and at the same time we proposed an ID-based strong ...
 
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
Found in: IEEE Transactions on Dependable and Secure Computing
By Huaqun Wang,Yuqing Zhang
Issue Date:May 2012
pp. 443-446
In 2011, Sun et al. [CHECK END OF SENTENCE] proposed a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in wireless mesh networks (WMNs). It strives to resolve the confli...
 
Certificateless Ring Signature Scheme from Anonymous Subsets
Found in: Multimedia Information Networking and Security, International Conference on
By Huaqun Wang
Issue Date:November 2010
pp. 413-417
In a ring signature scheme from anonymous subsets,a member of a setcan freely choose a family of subsets including their own subset tocompute a signature which enjoys two properties: (1) the externalverifier is convinced that all members of some subset in ...
 
On the Security of Some Self-Healing Key Distribution Schemes
Found in: Multimedia Information Networking and Security, International Conference on
By Huaqun Wang
Issue Date:November 2010
pp. 777-780
Self-healing key distribution schemes are particularly useful when there is no network infrastructure or such infrastructure has been destroyed. A self-healing mechanism can allow group users to recover lost session keys and is therefore quite suitable est...
 
A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptography
Found in: Information Science and Management Engineering, International Conference of
By Huaqun Wang, Shengju Han
Issue Date:August 2010
pp. 105-108
Ring signature is a kind of group-oriented signature. It allows a member of a group to sign messages on behalf of the group without revealing his/her identity. Certificateless public key cryptography was first introduced by Al-Riyami and Paterson at Asiacr...
 
Cryptanalysis of Several Linkable Ring Signature Schemes
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Huaqun Wang, Shuping Zhao
Issue Date:April 2010
pp. 302-305
The notion of linkable ring signature, introduced by Liu et al. in 2004, provides signer anonymity and spontaneity, but at the same time, allows anyone to determine whether two signatures have been issued by the same group member (linkability).In 2006,Liu-...
 
Cryptanalysis and Improvement of Several Digital Signature Schemes
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Huaqun Wang, Shuping Zhao
Issue Date:April 2010
pp. 306-309
In 2007, Zhang proposed an efficient identity based ring signature scheme. Through cryptanalysis, we found that the ring signature scheme is insecure. There exists group changing attack. In 2007, Ming, et al. proposed a certificate less universal designate...
 
A Proxy Ring Signature Scheme with Revocable Anonymity from Bilinear Pairings
Found in: Multimedia Information Networking and Security, International Conference on
By Huaqun Wang
Issue Date:November 2009
pp. 191-194
Proxy ring signature scheme with revocable anonymity allows the original signer to know exactly who the signer is and the original signer doesn't need to publish extra information except his original public key. Based on bilinear pairings, a new ring signa...
 
Cryptanalysis and Improvement of a Ring Signature Based on ElGamal Signature
Found in: Software Engineering, World Congress on
By Huaqun Wang, Shengju Han, Changhui Deng, Futai Zhang
Issue Date:May 2009
pp. 397-401
The concept of ring signature was first introduced by Rivest et al. in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was i...
 
Cryptanalysis of a Generalized Ring Signature Scheme
Found in: IEEE Transactions on Dependable and Secure Computing
By Huaqun Wang, Futai Zhang, Yanfei Sun
Issue Date:April 2009
pp. 149-151
The concept of ring signature was first introduced by Rivest et al. in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was i...
 
A Novel Signer-Admission Ring Signature Scheme from Bilinear Pairings
Found in: Education Technology and Computer Science, International Workshop on
By Huaqun Wang, Hong Yu
Issue Date:March 2009
pp. 631-634
In this paper,we presented a novel ring signature scheme in which the actual signer has the ability to admit having signed a document at his will. It's an extension and improvement of the ring signature suggested by Rivest et al. in 2001. This extended rin...
 
Cryptanalysis and Improvement of Shacham-Waters Ring Signature Scheme
Found in: Computational Intelligence and Security, International Conference on
By Huaqun Wang, Changhui Deng, Shuping Zhao, Futai Zhang
Issue Date:December 2008
pp. 374-377
Shacham-Waters proposed an efficient ring signature scheme without random oracle, and proved that it’s unforgeable in their security model. But, it’s insecure in another security model proposed by Masayuki Abe et al. This article shows an existential forge...
 
Cryptanalysis and Improvement of a Constant-Size Identity Based Ring Signature Scheme
Found in: Computational Intelligence and Security Workshops, International Conference on
By Huaqun Wang, Xianjiu Guo
Issue Date:December 2007
pp. 803-806
Ring signature is of vital importance to secure electronic voting. Many ID-based ring signature schemes have been put forward, but most of them are not constant-size. Au etc proposed a constant-size ID-based ring signature with- out random oracles. The siz...
 
Key Management Based on Elliptic Curve Paillier Scheme in Ad Hoc Networks
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Huaqun Wang, Shuping Zhao, Guoxing Jiang
Issue Date:August 2007
pp. 116-119
The problem of key management in ad hoc networks was analyzed. Based on the elliptic curve Paillier scheme and Shamir secret sharing scheme, a new key management scheme that adapts to ad hoc networks was proposed. In this scheme, the new node provided elli...
 
 1