Rufen Huang

  • Citations Per Year
Learn More
The concept of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signature is ambiguous from any third party's point of view until the release of a secret, known as the keystone. Once the keystone is released,(More)
It is easy for adversaries to mount node replication attacks due to the unattended nature of wireless sensor networks. In several replica node detection schemes, witness nodes fail to work before replicas are detected due to the lack of effective random verification. This paper presents a novel distributed detection protocol to counteract node replication(More)
Identity-based cryptosystem has a property that a user's public key can be easily calculated from his identity by a publicly available function, and can be hence a good alternative for certificate-based public key infrastructure. Blind signature has the anonymity and plays a central role in applications such as electronic voting and electronic cash systems.(More)
Certificateless public key cryptography was introduced to remove the use of certificate to ensure the authentication of the user's public key in the traditional certificate-based public key cryptography and overcome he key escrow problem in the identity-based public key cryptography. Concurrent signatures were introduced as an alternative approach to(More)
The certificate-based signature is an attractive cryptography primitive whose original motivation is to simplify certificate’s management and to eliminate key escrow problem. The proxy signature is another cryptography paradigm which permits an entity to delegate his signing rights to another. In this paper, we first note that certificate-based signatures(More)
The paper proposes a new and efficient certificate-based blind signature scheme with bilinear maps combining blind signature with certificate-based encryption. The proposed scheme solves the escrow problem, simplifies the certificate management process and retains the merits of blind signature. The new scheme is provably secure, and the analysis of the(More)
The security of Zheng et al.'s ID-based proxy blind signature scheme from bilinear pairings is analyzed, it is found that their scheme does not possess the blindness property. A dishonest proxy signer can relate the formation process of the proxy blind signature to the unblind signature for the message by gathering the corresponding message of signing(More)
The verifiable encrypted signature is one of the basic fair exchange protocols. There are important applications, such as e-commerce and other cryptographic protocols. We incorporate the verifiable encrypted signature into the certificate-based signature to propose an efficient certificate-based verifiable encrypted signature scheme in the paper, which does(More)
  • 1