Chenhuang Wu

ORCID: 0000-0001-8002-7630
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • graph theory and CDMA systems
  • Cryptography and Data Security
  • Cellular Automata and Applications
  • Cryptographic Implementations and Security
  • Cryptography and Residue Arithmetic
  • Analytic Number Theory Research
  • Cloud Data Security Solutions
  • Chaos-based Image/Signal Encryption
  • Blockchain Technology Applications and Security
  • Complexity and Algorithms in Graphs
  • semigroups and automata theory
  • Indoor and Outdoor Localization Technologies
  • Advanced Wireless Communication Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Algebraic Geometry and Number Theory
  • Energy Efficient Wireless Sensor Networks
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Advanced Algebra and Geometry
  • Speech and Audio Processing
  • Advanced Mathematical Theories and Applications
  • Spam and Phishing Detection
  • User Authentication and Security Systems

Putian University
2015-2025

University of Electronic Science and Technology of China
2018-2022

Northwest University
2022

Yaroslav-the-Wise Novgorod State University
2022

University of Science and Technology of China
2016

Applied Mathematics (United States)
2014

Chinese Academy of Sciences
2011-2012

Institute of Software
2012

Quanta Computer (China)
2006

Zhangzhou Normal University
2006

Certificateless public key cryptosystem overcomes the problem of certificate management in certificate-based and inherent escrow identity-based cryptosystem. Signcryption is a cryptographic primitive that combines both functions digital signature encryption logical single step with lower computational costs communication overheads than traditional then approach. In this paper, we proposed new scheme which more efficient all schemes available. Our based on CDH DL assumption. Moreover,...

10.1109/isise.2008.206 article EN International Symposium on Information Science and Engineering 2008-12-01

Encrypted traffic classification plays a vital role in cybersecurity as network encryption becomes prevalent. First, we briefly introduce three mechanisms: IPsec, SSL/TLS, and SRTP. After evaluating the performances of support vector machine, random forest, naïve Bayes, logistic regression for classification, propose combined approach entropy estimation artificial neural networks. is classified encrypted or plaintext with estimation. then further using We packet’s sizes, packet's...

10.4218/etrij.2019-0190 article EN publisher-specific-oa ETRI Journal 2020-01-14

Aggregate signatures are excellent in simultaneously verifying the validity of multiple signatures, which renders them highly suitable for bandwidth-constrained environments. The certificateless public key system is among most advanced cryptosystems at present. Scholars have combined their advantages to develop aggregate signature schemes, applicable secure communication Vehicular Ad-hoc Networks (VANETs). Recently, Cahyadi E F et al. put forward a scheme specifically designed use VANETs....

10.1371/journal.pone.0317047 article EN cc-by PLoS ONE 2025-02-20

Hall’s sextic residue sequences of prime period [Formula: see text] with have some desirable features pseudorandomness, such as high linear complexity, two-level periodic autocorrelation, nice aperiodic auto-correlation measure (correlation order text]) and in particular the 2-adic complexity for special (related to difference set). In this study, we prove a lower bound on all text], which implies that is at least expected value text]-periodic binary sequences. However, numerical analysis...

10.1142/s0129054125500145 article EN International Journal of Foundations of Computer Science 2025-05-20

Data deduplication can solve the problem of resource wastage caused by duplicated data. However, due to limited resources Internet Things (IoT) devices, applying data IoT scenarios is challenging. Existing frameworks for are prone inefficiency or trust crises random allocation edge computing nodes. Furthermore, side-channel attacks remain a risk. In addition, after devices store in cloud through deduplication, they cannot share their efficiently. this paper, we propose secure and efficient...

10.1080/09540091.2022.2090514 article EN cc-by-nc Connection Science 2022-06-21

Cloud data auditing is essential to ensure the integrity of cloud data. The main idea entrust audit task a third-party auditor (TPA) with powerful computing ability. However, TPA may lead leakage and become single point failure. Recently, blockchain has been introduced solve these problems by TPA. dynamic storage structure developed traditional does not apply blockchain. This paper proposes blockchain-based collaborative public scheme for We design service provider(CSP) generate challenge...

10.1080/09540091.2023.2213863 article EN cc-by-nc Connection Science 2023-06-05

10.1007/s00200-018-0368-9 article EN Applicable Algebra in Engineering Communication and Computing 2018-08-09

Digital signature, as an important cryptographic primitive, has been widely used in many application scenarios, such e-commerce, authentication, cloud computing, and so on. Certificateless Public Key Cryptography (PKC) can get rid of the certificate management problem traditional Infrastructure (PKI) eliminate key-escrow identity-based PKC. Lately, a new Signature (CLS) scheme proposed by Kyung-Ah Shim (IEEE SYSTEMS JOURNAL, 2018, 13(2)), which claimed to achieve provable security standard...

10.23919/jcc.2021.01.013 article EN China Communications 2021-01-01

We define a family of 2e+1-periodic binary threshold sequences and p2-periodic by using Carmichael quotients modulo 2e(e>2) 2p (p is an odd prime), respectively. These are extensions the construction derived from Fermat prime in our earlier work. determine exact values linear complexity, which larger than half period. For cryptographic purpose, complexities this letter desired values.

10.1587/transfun.e95.a.1197 article EN IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 2012-01-01

An m-sequence is the one of largest period among those produced by a linear feedback shift register. It possesses several desirable features pseudorandomness such as balance, uniform pattern distribution and ideal autocorrelation for applications to communications. However, it also undesirable low complexity. Here we prove nontrivial upper bound on its arithmetic autocorrelation, another figure merit introduced Mandelbaum error-correcting codes later investigated Goresky Klapper FCSRs. The...

10.1080/01611194.2022.2071116 article EN Cryptologia 2022-07-12

We investigate the $ k$-error linear complexity of pseudorandom binary sequences period p^{\mathfrak{r}} derived from Euler quotients modulo p^{\mathfrak{r}-1} $, a power an odd prime p for \mathfrak{r}≥2 $. When \mathfrak{r} = 2 this is just case polynomial (including Fermat quotients) $p which has been studied in earlier work Chen, Niu and Wu. In work, we establish recursive relation on k $-error \mathfrak{r}≥3 also state exact values 3 From results, can find that (of $) does not decrease...

10.3934/amc.2018047 article EN Advances in Mathematics of Communications 2018-01-01

Summary Range‐free localization is a widely concerned technique that supports many essential network applications like coverage and clustering. Most existing technologies assume nodes are uniformly distributed in regular with no obstacles propagation paths between pairwise close to straight lines. However, real‐world scenarios, topology usually irregular, resulting estimated distances differ significantly from the corresponding physical poor anchor deployment. These will lead erroneous...

10.1002/dac.5153 article EN International Journal of Communication Systems 2022-03-23

We extend the construction of $p^2$-periodic binary thresholdsequences derived from Fermat quotients to $d$-ary case where $d$is an odd prime divisor $p-1$, and then by defining cyclotomic classesmodulo $p^{2}$, we present exact values linear complexityunder condition $d^{p-1}\not \equiv 1 \pmod {p^2}$. Also, weextend results Euler modulo $p^{r}$ with oddprime $p$ $r \geq 2$. The complexity is very close theperiod desired value for cryptographic purpose. Theresults corresponding...

10.3934/amc.2016038 article EN Advances in Mathematics of Communications 2016-11-01

10.1007/s11859-011-0779-y article EN Wuhan University Journal of Natural Sciences 2011-09-03

10.1007/s11390-011-1130-y article EN Journal of Computer Science and Technology 2011-03-01

10.1007/s11390-011-9434-5 article EN Journal of Computer Science and Technology 2011-03-01

Certificate less Public Key Cryptography (CLPKC) as a new paradigm was introduced by Al-Riyami and Paterson in Asia crypt 2003, which removes the use of certificate to ensure authenticity user's public key traditional certificate-based cryptography also overcomes escrow problem identity-based cryptography. However, it does suffer from an attack called Denial-of-Decryption (DOD) its nature is similar well known Denial-of-Service(DOS)attack. In ASIACCS 2007, K. Liu, M. Au W. Susilo proposed...

10.1109/icgec.2010.100 article EN 2010-12-01
Coming Soon ...