Share This Author
A Survey on the Security of Blockchain Systems
A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
- Xin Xu, Ping Zhu, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Lian He
- Computer ScienceJournal of Medical Systems
A secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost and provide the patient anonymity by employing the dynamic identity is proposed.
An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement
An efficient quantum private comparison protocol for comparing information of equality with the help of a third party (TP) is proposed, which can ensure fairness, efficiency and security.
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
A watermark strategy for quantum images based on quantum fourier transform
- Wei-Wei Zhang, Fei Gao, Bin Liu, Qiaoyan Wen, Hui Chen
- Computer ScienceQuantum Inf. Process.
- 1 February 2013
A robust watermark strategy for quantum images that embeds the watermark image into the fourier coefficients of the quantum carrier image, which will not affect the carrier image’s visual effect.
A steganographic method for digital images with four-pixel differencing and modified LSB substitution
Finite-key analysis for measurement-device-independent quantum key distribution
Ting-Ting Song,1,2,* Qiao-Yan Wen,1 Fen-Zhuo Guo,1 and Xiao-Qing Tan3 1State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876,…
An improved semantically-secure identity-based signcryption scheme in the standard model
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement