Zhenjie Huang

Learn More
The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce two signatures that are not binding, until an extra piece of information (namely the keystone) is released by one of the parties. Upon release of the keystone, both signatures(More)
It is easy for adversaries to mount node replication attacks due to the unattended nature of wireless sensor networks. In several replica node detection schemes, witness nodes fail to work before replicas are detected due to the lack of effective random verification. This paper presents a novel distributed detection protocol to counteract node replication(More)
The certificate-based signature is an attractive cryptography primitive whose original motivation is to simplify certificate's management and to eliminate key escrow problem. The proxy signature is another cryptography paradigm which permits an entity to delegate his signing rights to another. In this paper, we first note that certificate-based signatures(More)