- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Internet Traffic Analysis and Secure E-voting
- Mobile Crowdsensing and Crowdsourcing
- Advanced Steganography and Watermarking Techniques
- Advanced Computational Techniques and Applications
- Security in Wireless Sensor Networks
- Advanced Sensor and Control Systems
- Complexity and Algorithms in Graphs
- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Software System Performance and Reliability
- Industrial Technology and Control Systems
- Advanced Measurement and Detection Methods
- DNA and Biological Computing
- Network Time Synchronization Technologies
- Evacuation and Crowd Dynamics
- Technology and Security Systems
- Military Defense Systems Analysis
- Advanced Authentication Protocols Security
- Privacy, Security, and Data Protection
- Security and Verification in Computing
Shaanxi Normal University
2017-2025
Northwestern Polytechnical University
2023
Shandong University of Technology
2022-2023
Data Assurance and Communication Security
2020
Chinese Academy of Sciences
2006-2020
Institute of Information Engineering
2019-2020
State Key Laboratory of Cryptology
2020
State Grid Corporation of China (China)
2019
Shanghai Jiao Tong University
2015
Zen-Noh (Japan)
2010
Mobile crowdsensing enables a crowd of individuals to cooperatively collect data for special interest customers using their mobile devices. The success largely depends on the participating users. broader participation, more sensing are collected; nevertheless, replicate may be generated, thereby bringing unnecessary heavy communication overhead. Hence it is critical eliminate duplicate improve efficiency, a.k.a., deduplication. Unfortunately, usually protected, making its deduplication...
Monero provides a high level of anonymity for both users and their transactions. However, many criminal activities might be committed with the protection in cryptocurrency Thus, user accountability (or traceability) is also important transactions, which unfortunately lacking current literature. In this paper, we fill gap by introducing new named Traceable to balance accountability. Our framework relies on tracing authority, but optimistic, that it only involved when investigations certain...
The Internet of Things (IoT) is experiencing explosive growth and has gained extensive attention from academia industry in recent years. However, most the existing IoT infrastructures are centralized, which may cause issues unscalability single-point-of-failure. Consequently, decentralized been proposed by taking advantage emerging technology called blockchain. Voting systems widely adopted IoT, for example a leader election wireless sensor networks. Self-tallying voting alternatives to...
Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication an effective solution to protect personal privacy. However, existing anonymous credential protocols are not perfectly suitablefor environments such as vehicles sense that revocation issue well-solved. In this article, we propose a Blockchain-based with Selective for Smart applications (BASS) supporting attribute privacy, selective revocation, soundness, and...
Smart cities have experienced rapid development with the advances of information and communication technologies such as Internet Things (IoT). To tackle data storage issues raised by large-scale generated IoT devices, an increasing number enterprises individuals prefer to outsource their cloud, where integrity becomes a concern cloud users. A variety provable possession (PDP) protocols been proposed for centralized scenarios so far. However, relies too much on trust central servers and,...
Outsourced storage such as cloud can significantly reduce the burden of data management owners. Despite a long list merits storage, it triggers many security risks at same time. Data integrity, one most burning challenges in secure is fundamental and pivotal element outsourcing services. auditing protocols enable verifier to efficiently check integrity outsourced files without downloading entire file from cloud, which dramatically communication overhead between server verifier. Existing are...
As the number of connected devices explodes, use scenarios these and data have multiplied. Many scenarios, e.g., home automation, require tools beyond visualizations, to express user intents ensure interactions do not cause undesired effects in physical world. We present SIFT, a safety-centric programming platform for IoT environments. First, simplify programming, users high-level declarative apps. The system then decides which sensor operations should be combined satisfy requirements....
Certificateless aggregate signature (CLAS) schemes reduce the trust on key generation center of identity-based signatures and thus partially address inherent escrow issue in cryptosystems while retaining advantage implementation efficiency. In past few years, a number new CLAS were proposed to overcome communicational computational limitations sensors attain integrality, validity, availability patients' medical data healthcare wireless sensor networks (HWMSNs). However, many these do not...
Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable resources. It challenging search data encrypted and stored in cloud storage servers. Searchable encryption enables users on ciphertext without leaking any information about keywords the plaintext data. Currently, number searchable schemes have been proposed, but most them provide unlimited privileges users, which not desirable certain scenarios. In this paper, we propose new...
Cross-chain technology facilitates the interoperability among isolated blockchains on which users can freely communicate and transfer values. Existing cross-chain protocols suffer from scalability problem when processing on-chain transactions. Off-chain channel, as a promising blockchain scaling technique, enable micro-payment transactions without involving transaction settlement. However, existing channel schemes only be applied to operations within single blockchain, failing support...
Outsourced storage enables data owners to host their on remote resources without keeping a local copy so as target core business. However, serious problem is integrity in the sense that lose physical control over remote-stored data. Existing provable possession protocols are overwhelmingly designed for centralized such cloud, which server assumed dishonest but client reliable. Moreover, suffers single-point-of-failure threat. In this paper, deal with these issues, we propose notion of...
Artificial intelligence (AI) has demonstrated huge potential in a variety of real-world applications. However, some significant considerations like fairness, transparency and trustworthiness are still challenging when applying AI to trust-oriented applications such as E-voting. E-voting plays role democratic societies, which requires voters initiators have strong mutual trust. In this paper, we aim facilitate the consolidation ecosystems by developing blockchain-based traceable self-tallying...
Currently, the number of Internet Things (IoT) devices making up IoT is more than 11 billion and this has been continuously increasing. The prevalence these leads to an emerging business model called Device-as-a-service, which enables sensor collect data disseminated all interested devices. sharing with other could receive some financial reward, such as Bitcoin. However, side-channel attacks, aim exploit information leaked from during trade execution, are possible since most vulnerable be...
As cloud storage services have become popular nowadays, the integrity of outsourced data stored at untrusted servers received increased attention. Provable possession (PDP) provides an effective and efficient solution for by asking server to prove that are not tampered with or maliciously discarded without returning actual users. In this article, we propose identity-based privacy-preserving provable scheme (ID-P <inline-formula><tex-math notation="LaTeX">$^3$</tex-math></inline-formula> DP)...
The cloud computing technology has emerged, developed, and matured in recent years, consequently commercializing remote outsourcing storage services. An increasing number of companies individuals have chosen the to store their data. However, accidents, such as server downtime, data loss, accidental deletion, are serious issues for some applications that need run around clock. For mission business-critical applications, continuous availability services is also necessary protect users'...
Adaptor signature, a new primitive that alleviates the scalability issue of blockchain to some extent, has been widely adopted in off-chain payment channel and atomic swap. As an extension standard digital adaptor signature can bind release complete with exchange secret value. Existing constructions signatures are mainly based on Schnorr or ECDSA algorithms, which suffer low signing efficiency long length. In this paper, address these issues, we propose construction using randomized EdDSA,...