oracle forensics,个人主页

该博客详细列举了作者在安全和密码学领域的多篇高影响力论文,包括在四大安全顶会(USENIX Security, ACM CCS, NDSS, IEEESP)和三大密码顶会(CRYPTO, ASIACRYPT, EUROCRYPT)的发表成果,涉及匿名认证、密钥交换、量子随机 oracle 模型、环签名、可验证计算等多个关键主题,展示了深入的理论研究和实际应用贡献。
摘要由CSDN通过智能技术生成

​代表性学术论文:

(1)Privacy-Preserving and Standard-Compatible AKA Protocol, The 30th USENIX Security Symposium(USENIX Security,四大安全顶会), 2021,通讯作者

(2)Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication, ACM CCS(四大安全顶会), 2016,第1作者(3)Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities, Network and Distributed System Security Symposium (NDSS,四大安全顶会), 2020,第1作者

(4)Multiple Handshakes Security of TLS 1.3 Candidates, IEEE Symposium on Security & Privacy(四大安全顶会), 2016,通讯作者(5)Dumbo: Faster Asynchronous BFT Protocols, ACM Conference on Computer and Communications Security (CCS,四大安全顶会), 2020,第5作者

(6)IND-CCA-secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited, Advances in Cryptology - CRYPTO(三大密码顶会), 2018,通讯作者

(7)On the Hardness of the Computational Ring-LWR Problem and Its Applications, Advances in Cryptology - ASIACRYPT(三大密码顶会), 2018,通讯作者

(8)Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Advances in Cryptology - CRYPTO 2016,Lecture Notes in Computer Science 9816(三大密码顶会), 2016,通讯作者

(9)Authenticated Key Exchange from Ideal Lattices, Advances in Cryptology - EUROCRYPT 2015(三大密码顶会), 2015,通讯作者

(10)Black-box Separations for One-More (Static) CDH and Its Generalization, Advances in Cryptology - ASIACRYPT 2014(三大密码顶会), 2014,通讯作者

(11)Batched Multi-hop Multi-key FHE from Ring-LWE with Compact Ciphertext Extension, Theory of Cryptography Conference(TCC,CCF-B), 2017,通讯作者

(12)Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes, Public-Key Cryptography (PKC, CCF-B), 2020,通讯作者

(13)Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model, Public Key Cryptography (CCF-B), 2019,通讯作者

(14)Simpler Efficient Group Signatures from Lattices, PKC 2015,Lecture Notes in Computer Science 9020, 2015,通讯作者

(15)Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks, Security Standardisation Research - SSR 2015, 2015,第1作者

(16)Accountable Proxy Re-encryption for Secure Data Sharing, IEEE Transactions on Dependable and Secure Computing (CCF-A), 2021,通讯作者

(17)Puncturable Signatures and Applications in_Proof-of-Stake Blockchain Protocols, IEEE Transactions on Information Forensics and Security (CCF-A), 2020,第5作者

(18)Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3, IEEE Transactions on Dependable and Secure Computing(CCF-A), 2017,第3作者​

(19)Towards Secure Data Distribution Systems in Mobile Cloud Computing, IEEE Transactions on Mobile Computing(CCF-A), 2017,第2作者

(20)Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme, IEEE Trans. Parallel Distrib. Syst.(CCF-A), 2013,

(21)UC-secure Two-Server Password-Based Authentication Protocol and Its Applications, ASIACCS(CACR-B), 2016,第2作者

(22)Ciphertext Policy Attribute-Based Encryption from Lattices , ASIACCS(CACR-B), 2012,通讯作者

(23)Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network, European Symposium on Research in Computer Security (ESORICS, CCF-B), 2019,第2作者

(24)Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model, Post-quantum Cryptography (CACR-B), 2019,通讯作者

(25)Modular Security Analysis of OAuth 2.0 in the Three-Party Setting, IEEE European Symposium on Security and Privacy, 2020,第3作者

(26)PRE: Stronger Security Notions and Efficient Construction with Non-interactive Opening, Theoretical Computer Science(CCF-B), 2014,通讯作者

(27)Optiwords: A new password policy for creating memorable and strong passwords, Computers & Security (CCF-B), 2019,通讯作者

(28)Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications, Computers & Security (CCF-B), 2019,第2作者

(29)Non-transferable Proxy Re-encryption, The Computer Journal (CCF-B), 2019,通讯作者

(30)LPSE: Lightweight password-strength estimation for password meters, Computers & Security(CCF-B), 2018,第2作者

(31)Attribute-based signature scheme with constant size signature in the standard model, IET Information Security(CACR-B), 2012,第3作者

(32)Certificateless signature: a new security model and an improved generic construction, Des. Codes Cryptography(CCF-B), 2007,第3作者

(33)Certificateless Public-Key Signature: Security Model and Efficient Construction, ACNS, 2006,第1作者

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值