- Cryptography and Data Security
- Digital Media Forensic Detection
- Distributed systems and fault tolerance
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Wave and Wind Energy Systems
- Image Processing Techniques and Applications
- Fluid Dynamics and Vibration Analysis
- Wind Energy Research and Development
- Advanced Queuing Theory Analysis
- Image and Signal Denoising Methods
- Formal Methods in Verification
- Caching and Content Delivery
- TiO2 Photocatalysis and Solar Cells
- Blind Source Separation Techniques
- Congenital gastrointestinal and neural anomalies
- Digital Transformation in Law
- Optimization and Search Problems
- Color Science and Applications
- Complexity and Algorithms in Graphs
- Capital Investment and Risk Analysis
- Anorectal Disease Treatments and Outcomes
University of Science and Technology of China
2014-2025
Shanghai Jiao Tong University
2022-2024
University of Hong Kong
2024
Hong Kong University of Science and Technology
2024
John Brown University
2022-2023
Brown University
2021-2022
Shanghai University
2019-2021
Sun Yat-sen University
2018-2020
University of International Business and Economics
2020
Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool to guarantee data owners' direct control over their in public cloud storage. The earlier ABE schemes involve only one authority maintain the whole attribute set, which can bring single-point bottleneck on both security and performance. Subsequently, some multi-authority are proposed, multiple authorities separately disjoint subsets. However, problem remains unsolved. In this paper, from another...
Data access control is a challenging issue in public cloud storage systems. Ciphertext-policy attribute-based encryption (CP-ABE) has been adopted as promising technique to provide flexible, fine-grained, and secure data for with honest-but-curious servers. However, the existing CP-ABE schemes, single attribute authority must execute time-consuming user legitimacy verification secret key distribution, hence, it results single-point performance bottleneck when scheme large-scale system. Users...
In public cloud storage services, data are outsourced to semi-trusted servers which outside of owners' trusted domain. To prevent untrustworthy service providers from accessing sensitive data, often encrypted. this scenario, conducting access control over these becomes a challenging issue. Attribute-based encryption (ABE) has been proved be powerful cryptographic tool express policies attributes, can provide fine-grained, flexible, and secure data. However, the existing ABE-based schemes do...
Industries and individuals outsource database to realize convenient low-cost applications services. In order provide sufficient functionality for SQL queries, many secure schemes have been proposed. However, such are vulnerable privacy leakage cloud server. The main reason is that hosted processed in server, which beyond the control of data owners. For numerical range query (">," "<;," so on), those cannot protection against practical challenges, e.g., statistical properties, access pattern....
Some state-of-the-art binary image steganographic methods aim to generate stego images with good visual quality, while others focus more on the statistical security of anti-steganalysis. This paper proposes a scheme that improves both them by selecting appropriate flipped pixels. First, fused distortion measurement is developed combines advantages flipping (FDM) and two data-carrying pixel location methods, including edge adaptive grid method (EAG) “Connectivity Preserving” criterion (CPc)....
Attribute-based encryption (ABE) has opened up a popular research topic in cryptography over the past few years. It can be used various circumstances, as it provides flexible way to conduct fine-grained data access control. Despite its great advantages control, current ABE based control system cannot satisfy requirement well when judges behavior according attribute comparison, such "greater than x" or "less x", which are called comparable attributes this paper. In paper, on set of...
A sore loser attack in cross-blockchain commerce rises when one party decides to halt participation partway through, leaving other parties' assets locked up for a long duration. Although vulnerability attacks cannot be entirely eliminated, it can reduced an arbitrarily low level. This paper proposes new distributed protocols hedging range of cross-chain transactions synchronous communication model, such as two-party swaps, n-party brokered transactions, and auctions.
Most state-of-the-art halftone image steganographic techniques only consider the flipping distortion according to human visual system, which are not always secure when they attacked by steganalyzers. In this paper, we propose a scheme that aims generate stego images with good quality and strong statistical security of anti-steganalysis. First, concept pixel density is proposed novel construction called histogram (PDH) design “embedding” for images. Then, optimize pair selection select blocks...
In this paper, a binary image steganographic scheme is presented, which aims at minimizing the embedding distortions measured by prediction. A prediction model of center pixel's value established in 3 × local region. concept "uncertainty" introduced to represent result and uncertainty defined as proximity probabilities about whether pixel black or white. with high means that it hard distinguish has been flipped not, thus distortion flipping small. The an appended statistical explanation...
Data access control is a challenging issue in cloud storage. Ciphertext-Policy Attribute-based Encryption (CP-ABE) potential cryptographic technique to address the above issue, which able enforce data based on users' permanent characteristics. However, some scenarios, policies are associated with temporary conditions (such as time and location) well their ones. CP-ABE cannot deal such situations commendably. In this paper, we focus scenario where privilege determined by attributes, together...
Transactions involving multiple blockchains are implemented by cross-chain protocols. These protocols based on smart contracts, programs that run blockchains, executed a network of computers. Verifying the runtime correctness contracts is problem compelling practical interest since, can automatically transfer ownership cryptocurrencies, electronic securities, and other valuable assets among untrusting parties. Such verification challenging since contract execution time sensitive, clocks...
The new paradigm of outsourcing data to the cloud is a double-edged sword. On one side, it frees up owners from technical management, and easier for share their with intended recipients when are stored in cloud. other brings about challenges privacy security protection. To protect confidentiality against honest-but-curious service provider, numerous works have been proposed support fine-grained access control. However, till now, no efficient schemes can provide scenario control together...
Cross-chain swaps enable exchange of different assets that reside on blockchains. Several protocols have been proposed for atomic cross-chain swaps. However, those are not fault-tolerant, in the sense if any party deviates, no asset transfer can happen. In this paper, we propose two alternative structuring composable and robust Participants multiple simultaneously then complete a subset according to their needs. Their needs expressed as predicates which capture acceptable payoff each...
Sharding significantly enhances blockchain scalability by dividing the entire network into smaller shards that reach consensus and process transactions in parallel. Nevertheless, two new issues emerge with adoption of sharding. One issue involves shrinking size groups, which leads to vulnerability consensus. Most existing works introduce periodic shuffle mechanisms mitigate this problem. these measures necessitate stronger security assumptions can only offer a probabilistic assurance...