Share This Author
An enhancement of timestamp-based password authentication scheme
Deniable authentication protocol based on Deffie-Hellman algorithm
A deniable authentication protocol, which is based on the Deffie-Hellman key exchange protocol, is presented, and it does not require a trusted third party, and the protocol can resist person-in-the-middle attack.
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake
TwinCoin is the first cryptocurrency based on a provably secure and scalable public blockchain design using both proof-of-work and proof- of-stake mechanisms and a new strategy for difficulty adjustment in the hybrid blockchain is introduced and provided.
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
- Tuyet Duong, Lei Fan, Jonathan Katz, Phuc Thai, Hong-Sheng Zhou
- Computer Science, MathematicsESORICS
- 14 September 2020
This work proposes a novel 2-hop blockchain protocol that combines PoW and proof-of-stake mechanisms and shows that the protocol is secure as long as the honest players control a majority of the collective resources (which consist of both computing power and stake).
A Scalable Proof-of-Stake Blockchain in the Open Se ing ∗ ( or , How to Mimic Nakamoto ’ s Design via Proof-of-Stake )
- Lei Fan
- Computer Science, Mathematics
A new security property called chain soundness is identified for proof-of-stake based protocols, which captures the intuition of ensuring new players to join the protocol execution securely, and a very useful upper bound of extending blockchain by greedy players is demonstrated.
Efficient Password-Based Authenticated Key Exchange from Lattices
- Yi Ding, Lei Fan
- Computer Science, MathematicsSeventh International Conference on Computational…
- 3 December 2011
This paper modified the lattice-based approximate projective hashing introduced in  and plug it into the framework of , and it is proved the new PAKE is efficient and secure based on the security of GK's PAKE framework  in the standard model.
Building network attack graph for alert causal correlation
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)
A Generic Paradigm for Blockchain Design
- Phuc Thai, L. Njilla, Tuyet Duong, Lei Fan, Hong-Sheng Zhou
- Computer Science, MathematicsMobiQuitous
- 5 November 2018
In this paper, inspired by the 2-hop design by Duong et al, a generic paradigm for blockchain design is put forth, called n-hop blockchain, which includes one main chain, which is supported by (n -- 1) supporting chains; hence, the main chain can achieve better security performance.
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power
- Tuyet Duong, Lei Fan, T. Veale, Hong-Sheng Zhou
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
This work proposes the first Bitcoin-like protocol that is secure in the presence of a malicious majority of computing power and proposes a novel strategy for selecting the best blockchain from many competing chains by carefully comparing coins in these blockchains.