Huifang Yu

ORCID: 0000-0003-4711-3128
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Complexity and Algorithms in Graphs
  • Coding theory and cryptography
  • Privacy-Preserving Technologies in Data
  • Cryptography and Residue Arithmetic
  • Cooperative Communication and Network Coding
  • Cryptographic Implementations and Security
  • Cloud Data Security Solutions
  • Water Quality Monitoring and Analysis
  • Wireless Communication Security Techniques
  • Advanced Authentication Protocols Security
  • Toxic Organic Pollutants Impact
  • Chaos-based Image/Signal Encryption
  • Algal biology and biofuel production
  • Advanced Steganography and Watermarking Techniques
  • Chemical Analysis and Environmental Impact
  • Impact of AI and Big Data on Business and Society
  • Chinese history and philosophy
  • Leadership, Courage, and Heroism Studies
  • Service-Learning and Community Engagement
  • Advanced oxidation water treatment
  • Education, Technology, and Economics
  • Advanced Wireless Communication Technologies

Xi’an University of Posts and Telecommunications
2018-2024

Qinghai University Affiliated Hospital
2021-2024

Qujing Normal University
2024

Chinese Academy of Medical Sciences & Peking Union Medical College
2024

China University of Mining and Technology
2024

Shandong University
2019-2021

Qinghai Normal University
2004-2017

Luoyang Normal University
2012

Northwest Normal University
2008-2009

Beijing Center for Disease Prevention and Control
2005-2008

Driven by new situation of "Internet +," Internet has achieved the integrated development with all walks life. Among them, fifth generation is a key technology to promote deep integration Internet-of-Things equipment, cloud computing, blockchain and other trades. Hence, it necessary for IoTs consider cost efficiency authentication confidentiality communication. For effectively solving above problems, we devise certificateless elliptic curve aggregate signcryption (CL-ECASC) scheme that can...

10.1109/jsyst.2021.3096531 article EN cc-by IEEE Systems Journal 2021-08-02

Abstract As one of the most attractive next‐generation probiotics, mucin‐degrading Akkermansia muciniphila has emerged as an essential and integral factor in maintaining human health affecting pathological outcomes. Its abundance is inversely associated with various metabolic diseases (e.g., obesity type 2 diabetes), cardiovascular diseases, intestinal inflammation. Supplementing A. to restore gut microbiota ecosystem a promising approach for treating disorders. However, direct utilization...

10.1002/fft2.341 article EN cc-by Food Frontiers 2024-01-10

Electronic cash (e-cash) has become major payment way in the era of internet things. However, leakage user privacy and transaction data is becoming more serious e-cash system. To solve these problems, we construct a new certificateless blind signcryption from NTRU lattice (NTRUL-CLBSC) suitable for e-cash. NTRUL-CLBSC low communication overhead high calculation efficiency because small storage space short key size number theory research unit (NTRU) lattice. Based on RSIS DNCC problems...

10.1016/j.jii.2024.100632 article EN cc-by-nc-nd Journal of Industrial Information Integration 2024-05-10

Certificateless signcryption (CLSC) can simultaneously fulfill certificateless encryption and signature; however, most CLSC schemes need costly computational overhead due to the usage of pairing operations. How improve its efficiency is a very significant research problem. In this paper, we propose pairing-free secure scheme. random oracle model, proposed scheme indistinguishability against adaptive chosen-ciphertext attacks in confidentiality unforgeability chosen-message unforgeability....

10.1093/comjnl/bxx005 article EN The Computer Journal 2017-01-30

10.1016/j.jisa.2023.103496 article EN Journal of Information Security and Applications 2023-04-17

10.1631/fitee.1601054 article EN Frontiers of Information Technology & Electronic Engineering 2017-07-01

10.1631/fitee.2300248 article EN Frontiers of Information Technology & Electronic Engineering 2024-03-01

Proxy signcryption means that the proxy signcrypter obtains delegate authorization from original and then signcrypts specified message on behalf of signcrypter. In this paper, we construct an identity-based protocol (IBPSP) based universally composable (UC) framework. random oracle model, prove has semantic security under gap bilinear Diffie-Hellman computational assumptions. At same time, ideal functionality is defined in UC framework, also equivalence between its IND-CCA2 UF-CMA security....

10.1155/2018/9531784 article EN cc-by Security and Communication Networks 2018-12-02

A (t,n) threshold signcryption scheme makes the distributor authorize a group with n members, any t or more signcrypters can cooperatively use keys to sign message; however, t−1 fewer cannot. Threshold has broad applications in electronic auction, election, distributed environment, cloud computing and block chain. In this paper, we combine certificateless cryptosystem construct secure efficient signcrypton secret sharing mechanism (SSM-CLTSCS), which is provably indistinguishable unforgeable...

10.1016/j.knosys.2021.106981 article EN cc-by-nc-nd Knowledge-Based Systems 2021-03-20

Threshold signature can solve the problems of high cost and network congestion during execution smart contracts. However, information transmitted in public links is vulnerable to eavesdropping, tampering other attacks, it essential ensure confidentiality integrity data transmission. traditional threshold signcryption not suitable for blockchain setting cannot withstand quantum computing attacks. In view these reasons, one lattice-based oracle transmission (BCODT-LTSC) devised this article....

10.1109/tits.2023.3276920 article EN IEEE Transactions on Intelligent Transportation Systems 2023-05-25

10.1016/j.jisa.2022.103345 article EN Journal of Information Security and Applications 2022-10-04

Certificateless signcryption can simultaneously provide certificateless signature and encryption. In recent years, many schemes have been proposed. However, these are based on traditional mathematical theory not the ability of resisting quantum computing attacks. Up to now, lattice-based or encryption proposed; however, only one function cannot fulfill two functions at same time. consideration this reason, in article, a scheme from lattice (L-CLSS) is constructed. L-CLSS has three...

10.1109/jsyst.2020.3007519 article EN IEEE Systems Journal 2020-07-17

This review examines the technological bottlenecks, potential solutions, and future development directions in treatment resource utilization of semi-coking wastewater (SCOW) China. By comprehensively investigating industry analyzing research hotspots existing projects, this study systematically explores current status challenges each unit, emphasizing necessity for innovative technologies that offer high efficiency, engineering feasibility, environmental friendliness, effective recovery....

10.3390/w16182614 article EN Water 2024-09-15

As a cryptography primitive for secure data transmission, certificateless proxy signcryption (CLPS) allows an original signcrypter to entrust his signing authority specified message on behalf. In this paper, we combine CLPS with cyclic multiplication groups (CMGs) construct new scheme from CMGs (CMGs-CLPSS). CMGs-CLPSS will receive significant attention because it simplifies the traditional public key cryptosystem (PKC) and solves escrow issue suffered by identity-based (IB-PKC). CMGs-CLPSS,...

10.1109/access.2019.2943718 article EN cc-by IEEE Access 2019-01-01

Abstract A study was carried out to the accumulative levels and dynamic changes of organochlorine pesticides in human milk Beijing from 1982 1998, effect prohibition restriction on use DDT BHC (666) China 1983. The samples were collected women during lactation period four districts 1991, 1993 respectively. contents determined according standard method biology-monitoring PR China. average fat content about 3% 1982–1998 Beijing. concentration pp-DDT op-DDT 1985 less than 0.10 mg/kg remained so...

10.1080/09603120500397615 article EN International Journal of Environmental Health Research 2006-02-01

10.1631/fitee.2000099 article EN Frontiers of Information Technology & Electronic Engineering 2021-06-01

Traditional certificateless ring signature is not suitable for the network coding environment. In this view, a new (CL-NCRS) devised by using techniques of multisource and signature. Network kind information interaction technology can improve system robustness save wireless resources. CL-NCRS satisfies unforgeability unconditional anonymity; moreover, it has relatively higher communication computational efficiency.

10.1155/2021/8029644 article EN cc-by Security and Communication Networks 2021-06-30

Ring signcryption with no group administrator satisfies the decentralization and blockchain anonymity. In this article, we construct new lattice-based ring scheme suitable for consortium (CB-LRSCS), in which smart contract controls process of unsigncryption to make system be fair reliable. CB-LRSCS can protect user privacy by reducing connection between information, it reliability ethereum environment. also has characteristics high efficiency, anti-quantum, anti-forgery, confidentiality...

10.1016/j.jksuci.2023.101602 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-06-03

10.1016/j.jisa.2020.102655 article EN Journal of Information Security and Applications 2020-10-16

Network coding can improve network transmission performance and reduce data delay. However, the nodes in are vulnerable to pollution attacks. Previous schemes based on difficult problems number theory cannot resist quantum computing Hence, certificateless multi-source signcryption with lattice (LCL-MSSC) is devised for coding, it uses common public key verify combination ciphertext from different source node users. Based learning errors inhomogeneous small integer solution problems, LCL-MSSC...

10.1016/j.jksuci.2022.10.013 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2022-10-25

Inspired by plant transpiration, an attached microalgae−simulated system was designed to enhance the transpiration of reverse osmosis concentrated water (i.e., WROC) and realize conversion pollutants microalgae biomass. The results showed that production rate clean could reach as high 14.84 L·m−2·day−1, which significantly influenced humidity air growth status microalgae. Moreover, enhancement evaporation more obvious under relatively low humidity. Pollutants, transported along with water,...

10.3390/w13152058 article EN Water 2021-07-29
Coming Soon ...