Shangping Wang

Learn More
Most of the proposed E-cash systems require that the shop and customer belong to the same bank, which becomes the bottle-neck of E-cashpsilas wide application. Fangguo Zhang et al. proposed a model of electronic cash using multi-banks, but a trusted third party is needed in their system. To solve this problem, we propose a new electronic cash scheme based(More)
A limited verifier signature scheme provides the functionality that the signer can decide not only when but also by whom his signatures can be verified. This can be used to solve conflicts between authenticity (non-repudiation) and privacy (controlled verifiability) in the digital signatures, and to preserve the privacy of the signer. In this paper, we(More)
Decellularized heart valves can be used as starter matrix implants for heart valve replacement therapies in terms of guided tissue regeneration. Decellularized matrices ideally need to be long-term storable to assure off-the-shelf availability. Freeze-drying is an attractive preservation method, allowing storage at room temperature in a dried state.(More)
A passive forensics method for detecting copy-move attacks was proposed. In the proposed method, tested image was segmented into non-overlapping blocks, DCT and DWT are applied to each image block to extract features, and then compare the statistics of each image block to detection replication regions. Our method was robust to compression up to JPEG quality(More)
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leakage-resilient IB-HPS based on a simple assumption and also prove its security by the variant of dual system encryption. Then, based on our(More)
An asymmetric traitor tracing scheme based on Luc public key cryptosystem is proposed. The scheme uses Shamir’s secret sharing scheme. Comparing with existed schemes, the new scheme has some advantages. Firstly, we use the Luc public key cryptosystem in the scheme to increase the security. Secondly, the length of user key and data header is short.(More)
Recently, the first ID-based restrictive partially blind signature scheme from bilinear pairing is proposed by Chen et al., which extends the concept of blind signature and possesses the excellent features of partially blind signature, restrictive blind signature and ID-based cryptosystem simultaneously. However, its computational cost is rather high. In(More)