Learn More
Most of the proposed E-cash systems require that the shop and customer belong to the same bank, which becomes the bottle-neck of E-cashpsilas wide application. Fangguo Zhang et al. proposed a model of electronic cash using multi-banks, but a trusted third party is needed in their system. To solve this problem, we propose a new electronic cash scheme based(More)
A limited verifier signature scheme provides the functionality that the signer can decide not only when but also by whom his signatures can be verified. This can be used to solve conflicts between authenticity (non-repudiation) and privacy (controlled verifiability) in the digital signatures, and to preserve the privacy of the signer. In this paper, we(More)
A passive forensics method for detecting copy-move attacks was proposed. In the proposed method, tested image was segmented into non-overlapping blocks, DCT and DWT are applied to each image block to extract features, and then compare the statistics of each image block to detection replication regions. Our method was robust to compression up to JPEG quality(More)
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leakage-resilient IB-HPS based on a simple assumption and also prove its security by the variant of dual system encryption. Then, based on our(More)
Concurrent Signatures scheme is an effective way to solve the problem of fair exchange without the help of any trusted third party, it has the advantage of efficiency. Until now, all concurrent signatures are based on traditional cryptosystems, but the emergence of quantum computing poses a severe threat to the security of classic public-key cryptosystems.(More)
In this paper we propose a new multivariate compression function with HAIFA construction. We design the center map meticulously so that the hash function can keep the three cryptography properties and be immune to the differential attack. The memory storage is about 50% that of the one which is built of the cubic polynomials and their coefficients are(More)
An asymmetric traitor tracing scheme based on Luc public key cryptosystem is proposed. The scheme uses Shamir’s secret sharing scheme. Comparing with existed schemes, the new scheme has some advantages. Firstly, we use the Luc public key cryptosystem in the scheme to increase the security. Secondly, the length of user key and data header is short.(More)