Shanshan Duan

Learn More
Recently bilinear pairings on elliptic curves have raised great interest in cryptographic community. Based on their good properties, many excellent ID-based cryptographic schemes have been proposed. However, in these proposed schemes, the private key generator should be assumed trusted, while in real environment, this assumption does not always hold. To(More)
The concept of certificateless public key cryptography (CL-PKC) was introduced by Al-Riyami and Paterson. Such a cryptosystem does not suffer from the key escrow problem while avoiding the onerous management of certificates. In this paper, we present the first certificateless undeniable signature scheme. We consider two different types of adversaries and(More)
<lb>We introduce Partial Signatures, where a signer, given a message, can compute a “stub” which<lb>preserves her anonymity, yet later she, but nobody else, can complete the stub to a full and verifiable<lb>signature under her public key. We provide a formal definition requiring three properties, namely<lb>anonymity, unambiguity and unforgeability. We(More)
Although the recently identified Pirh2 protein is known as a p53-induced ubiquitin-protein E3 ligase, which negatively regulates p53, the detailed mechanism underlying the regulation of Pirh2 remains largely unknown. Here, we demonstrate that while Pirh2 is mostly detected in the phosphorylated form in normal tissues, it is predominantly present in the(More)
Ischemic stroke is one of the leading causes of mortality and disability worldwide. Previous studies have indicated that hyperbaric oxygen preconditioning (HBO-PC) can induce neuroprotection against focal cerebral ischemia. However, the underlying mechanisms are still not fully understood, and the optimal regimen for preconditioning must be confirmed. In(More)
We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks.We construct two formal security models, Reset-1 and(More)
In this paper, we first construct a security model for delegation-bywarrant ID-based proxy signcryption schemes and formalize notions of security for them. To the best of our knowledge, no related work has been done. Then we present such a scheme based on the bilinear pairings, and show that it is provably secure in the random oracle model. Specifically, we(More)
Key insulation (KI) and Intrusion resilience (IR) are methods to protect a user’s key against exposure by utilizing periodic communications with an auxiliary helper. But existing work assumes a secure channel between user and helper. If we want to realize KI or IR in practice we must realize this secure channel. This paper looks at the question of how to do(More)