Zhenjie Huang

Learn More
The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce two signatures that are not binding, until an extra piece of information (namely the keystone) is released by one of the parties. Upon release of the keystone, both signatures(More)
This paper extends the concept of partially blind signature to the convertible undeniable partially blind signature, in which only the signer can verify and confirm the validity of given signatures and convert given signatures into universally verifiable signatures, along with a formal definition for it and a practical scheme that implements it. The(More)
The multi-signature is a special signature which is generated by multiple group members with the knowledge of multiple private keys, while the subliminal channel is a covert communication channel that can be used to send a secret message to an authorized receiver but the message cannot be discovered by any unauthorized receiver. A (t,n) threshold scheme(More)
The concept of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004 which allows two entities to produce two signatures in such a way that, the signer of each signature is ambiguous from any third party's point of view until the release of a secret, known as the keystone. Once the keystone is released,(More)
It is easy for adversaries to mount node replication attacks due to the unattended nature of wireless sensor networks. In several replica node detection schemes, witness nodes fail to work before replicas are detected due to the lack of effective random verification. This paper presents a novel distributed detection protocol to counteract node replication(More)
Concurrent signature was introduced as an alternative approach to solving the problem of fair exchange of signatures. It allows two entities to produce two signatures in such a way that, the signer of each signature is ambiguous from a third party's point of view until the release of a secret, known as the keystone. Once the keystone is released, both(More)
This paper introduces a new concept of convertible user designating confirmer partially blind signature, in which only the designated confirmer (designated by the user) and the user can verify and confirm the validity of given signatures and convert given signatures into publicly verifiable ones. We give a formal definition for it and propose a concrete(More)
Identity-based cryptosystem has a property that a user's public key can be easily calculated from his identity by a publicly available function, and can be hence a good alternative for certificate-based public key infrastructure. Blind signature has the anonymity and plays a central role in applications such as electronic voting and electronic cash systems.(More)