- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Complexity and Algorithms in Graphs
- Cryptographic Implementations and Security
- Cryptography and Residue Arithmetic
- Coding theory and cryptography
- Cloud Data Security Solutions
- Chaos-based Image/Signal Encryption
- Internet Traffic Analysis and Secure E-voting
- Advanced Authentication Protocols Security
- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Security in Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Access Control and Trust
- Security and Verification in Computing
- graph theory and CDMA systems
- Caching and Content Delivery
- Advanced Data Storage Technologies
- Quantum Mechanics and Applications
- User Authentication and Security Systems
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Malware Detection Techniques
- Machine Learning and ELM
- Advanced Memory and Neural Computing
Chinese Academy of Sciences
2016-2025
Institute of Information Engineering
2016-2025
University of Chinese Academy of Sciences
2016-2025
Hebei University of Engineering
2025
Institute of Acoustics
2023-2024
Xishuangbanna Tropical Botanical Garden
2024
Beijing Jiaotong University
2009-2023
State Key Laboratory of Information Security
2023
Nanjing University of Aeronautics and Astronautics
2022
Henan University
2020-2021
Extreme learning machines (ELMs) have been proposed for generalized single-hidden-layer feedforward networks which need not be neuron-like and perform well in both regression classification applications. In this brief, we propose an ELM with adaptive growth of hidden nodes (AG-ELM), provides a new approach the automated design networks. Different from other incremental ELMs (I-ELMs) whose existing are frozen when added one by one, AG-ELM number is determined way sense that may replaced newly...
We propose two ciphertext-policy attribute-based key encapsulation mechanism (CP-AB-KEM) schemes that for the first time achieve both outsourced encryption and decryption in system storage models give corresponding security analysis. In our schemes, heavy computations are to Encryption Service Providers (ESPs) or Decryption (DSPs), leaving only one modular exponentiation computation sender receiver. Moreover, we a general verification wide class of (cf. key-policy) AB-KEM which can check...
The immutability of blockchains is critical for cryptocurrencies, but an imperative need arises the redaction on-chain data due to privacy-protecting laws like GPDR. Recently, Ateniese et al. (EuroS&P 2017) proposed elegant solution this problem based on chameleon hash functions, followed by many subsequent works. While these works offered a permissioned blockchain, approaches were not efficient enough permissionless setting, in terms either security (which may cause inconsistent historical...
Sharing digital medical records on public cloud storage via mobile devices facilitates patients (doctors) to get (offer) treatment of high quality and efficiency. However, challenges such as data privacy protection, flexible sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Electronic Medical Record (EMR) system. In this work, we propose an innovative model a sharing mechanism for EMR,...
The explosive growth of mobile-connected and location-aware devices makes it possible to have a new way establishing trust relationships, which we coin as spatiotemporal matching. In particular, mobile user could very easily maintain his profile recording continuous whereabouts in time, the level matching that other can be translated into they two each other. Since profiles contain sensitive personal information, privacy-preserving is needed ensure little information about either participant...
Authenticated key exchange (AKE) is one of the most important applications in applied cryptography, where a user interacts with server to set up session pre-registered information (aka. authentication factor), such as password or biometrics, stored. While single-factor AKE widely used practice, higher security concerns call for multi-factor (MFAKE) schemes, e.g., combining both passwords and biometrics simultaneously. However, some casually designed even weakened sense that leakage factor...
SPHINCS was recently proposed as a stateless, quantum-resilient hash-based signature scheme. However, one possible limitation of is its signing speed, namely, the best known implementation merely produces few hundred signatures per second, which not good enough, e.g., for social website with huge amount users. Aiming at improving singing throughput, we present highly parallel and optimized implementations SPHINCS, can be deployed on various multi-core platforms. As first step, give an...
In alignment with China’s carbon peak and neutrality commitments, digital inclusive finance (DIF) has emerged as a strategic instrument for emission mitigation, facilitated by coordinated policy interventions market-driven innovations. This study conducted an original multi-dimensional investigation into DIF’s intensity reduction effects through integrated analytical framework. Employing two-way fixed mediation analysis models, we systematically evaluated both direct impacts...
Outsource encrypted data is a popular trend for storing sensitive in third party clouds. Many cloud applications need privacy preserving encryption services with two capabilities: On one hand, they querying over Web based hosting services. the other also to keep query keywords and associated search operations private such that service providers cannot gain access unauthorized content or trace infer stored servers. In this paper we present novel oriented framework verifiable searchable...
Abstract Multi-factor authentication (MFA) is extensively employed in mobile applications to enhance security, including Internet of Vehicles, healthcare systems, smart homes, etc. Traditional MFA requires users present specific factors, which can be inconvenient if certain factors are unavailable. To address this, $ (t, n) $-threshold (T-MFA) allows select any t out n registered for authentication. However, existing T-MFA solutions face four key issues: (i) reliance on n-1 devices, may...