• Publications
  • Influence
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks
This paper presents a novel system, ROPecker, to efficiently and effectively defend against ROP attacks without relying on any other side information (e.g., source code and compiler support) or binary rewriting. Expand
Anonymous secure routing in mobile ad-hoc networks
Detailed analysis shows that ASR can achieve both anonymity and security properties, as defined in the requirements, of the routing protocol in mobile ad-hoc networks. Expand
Private Query on Encrypted Data in Multi-user Settings
The results include a set of security notions for multi-user searchable encryption as well as a construction which is provably secure under the newly introduced security notions. Expand
Efficient and practical fair exchange protocols with off-line TTP
  • F. Bao, R. Deng, W. Mao
  • Computer Science
  • Proceedings. IEEE Symposium on Security and…
  • 3 May 1998
The protocols presented here are the first exchange protocols which use offline TTP and at the same time guarantee true fair exchange of digital messages and introduce a novel cryptographic primitive, called the Certificate of Encrypted Message Being a Signature (CEMBS), as the basic building block of the fair exchange protocols. Expand
A Signcryption Scheme with Signature Directly Verifiable by Public Key
  • F. Bao, R. Deng
  • Computer Science
  • Public Key Cryptography
  • 5 February 1998
Zheng's scheme is modified so that the recipient's private key is no longer needed in signature verification, and the computational cost is higher than that of Zheng's scheme but lower than that that of the signature-then-encryption approach. Expand
Efficient Unidirectional Proxy Re-Encryption
This paper proposes an efficient unidirectional PRE scheme, which the re-encryption key only enables delegation in one direction but not the opposite, and gains high efficiency and CCA-security using the “token-controlled encryption” technique. Expand
Attribute-Based Encryption With Verifiable Outsourced Decryption
This paper gives the formal model of ABE with verifiable outsourced decryption and proposes a concrete scheme that is both secure and verifiable, without relying on random oracles and shows an implementation of the scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users. Expand
Trellis-coded multidimensional phase modulation
A systematic approach to partitioning L*MPSK signal sets that is based on block coding is used and an encoder system approach is developed that incorporates the design of a differential precoder, a systematic convolutional encoder, and a signal set mapper. Expand
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
The security of HASBE is formally proved based on security of the ciphertext-policy attribute-based encryption (CP-ABE) scheme by Bethencourt and its performance and computational complexity are formally analyzed. Expand
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
New public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertextS are possible are described, giving the first public-keys patient-controlled encryption for flexible hierarchy. Expand