Yinchun Yang

Learn More
Based on Gentry’ s identity based encryption, an identity based proxy re-signature scheme is proposed that is existentially unforgeable in the standard model under the q-SDH (Strong Diffie-Hellman) assumption. Comparison with all previous proxy re-signature schemes, the proposed scheme has a tight security reduction and very compact public(More)
Peer-to-Peer (P2P) content distribution networks such as BitTorrent swarms, are very popular on Internet. These networks rely on reciprocative chunk contribution of participating peers. However, such reciprocation induces the free-riding behavior, where peers receive chunks from other peers and do not upload chunks in return. It is shown in the literature(More)
Based on the RSA problem, Zhou et al.’s proposed a proxy-protected proxy signature scheme. They claimed that their scheme were secure and efficient. However, this paper shows that their proposed proxy-protected proxy signature scheme is insecure against the replaced warrant attack: the original signer can remove the old warrant from a valid proxy signature(More)
Over the past few years, power tower accidents often occurred, it caused serious influence to our country electric power safety, and caused great economic loss. In order to improve the efficiency of the power tower safety testing, to protect the safety of staff, some people proposed to climb the tower to replace the robot staff to detect tower. In this(More)
Recently, Au et al. proposed a hierarchical identity-based signature scheme and Hu-Huang proposed a proxy key generation protocol. Based on the both schemes, we present a novel identity-based proxy signature scheme. The proposed scheme is provablly secure in the standard model and its security can be reduced to the hardness assumption of the g-strong(More)