Learn More
The concept of certificateless public key cryptography (CL-PKC) was introduced by Al-Riyami and Paterson. Such a cryptosystem does not suffer from the key escrow problem while avoiding the onerous management of certificates. In this paper, we present the first certificateless undeniable signature scheme. We consider two different types of adversaries and(More)
Recently bilinear pairings on elliptic curves have raised great interest in cryptographic community. Based on their good properties, many excellent ID-based cryptographic schemes have been proposed. However, in these proposed schemes, the private key generator should be assumed trusted, while in real environment, this assumption does not always hold. To(More)
Although the recently identified Pirh2 protein is known as a p53-induced ubiquitin-protein E3 ligase, which negatively regulates p53, the detailed mechanism underlying the regulation of Pirh2 remains largely unknown. Here, we demonstrate that while Pirh2 is mostly detected in the phosphorylated form in normal tissues, it is predominantly present in the(More)
Ischemic stroke is one of the leading causes of mortality and disability worldwide. Previous studies have indicated that hyperbaric oxygen preconditioning (HBO-PC) can induce neuroprotection against focal cerebral ischemia. However, the underlying mechanisms are still not fully understood, and the optimal regimen for preconditioning must be confirmed. In(More)
Activation of the apical caspase-8 is crucial to the extrinsic apoptotic pathway. Although the death effector domain (DED) of caspase-8 has been reported to be involved in death-inducing signaling complex formation, the detailed mechanism of how DED functions in regulating apoptosis remains largely unknown. Here, we demonstrate that the prodomain of the(More)
Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Abstract We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE(More)
In this paper, we first construct a security model for delegation-by-warrant ID-based proxy signcryption schemes and formalize notions of security for them. To the best of our knowledge, no related work has been done. Then we present such a scheme based on the bilinear pairings, and show that it is provably secure in the random oracle model. Specifically,(More)
We introduce Partial Signatures, where a signer, given a message, can compute a " stub " which preserves her anonymity, yet later she, but nobody else, can complete the stub to a full and verifiable signature under her public key. We provide a formal definition requiring three properties, namely anonymity, unambiguity and unforgeability. We provide schemes(More)
Key insulation (KI) and Intrusion resilience (IR) are methods to protect a user's key against exposure by utilizing periodic communications with an auxiliary helper. But existing work assumes a secure channel between user and helper. If we want to realize KI or IR in practice we must realize this secure channel. This paper looks at the question of how to do(More)