Debiao He
YOU?
Author Swipe
View article: Network-Layer Perspectives on Satellite–Terrestrial Integrated Networks in 6G: A Comprehensive Review
Network-Layer Perspectives on Satellite–Terrestrial Integrated Networks in 6G: A Comprehensive Review Open
View article: VSSTPM: Verifiable simulation-secure threshold public key encryption scheme from standard module-LWE for IoT gateway-based applications
VSSTPM: Verifiable simulation-secure threshold public key encryption scheme from standard module-LWE for IoT gateway-based applications Open
View article: Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey
Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey Open
Blockchain technology, introduced in 2008, has revolutionized data storage and transfer across sectors such as finance, healthcare, intelligent transportation, and the metaverse. However, the proliferation of blockchain systems has led to …
View article: SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs Open
Multi-scalar multiplication (MSM) is the primary building block in many pairing-based zero-knowledge proof (ZKP) systems. MSM at large scales has become the main bottleneck in ZKP implementations. Inspired by existing SIMD-accelerated work…
View article: Optimizing Dilithium Implementation with AVX2/-512
Optimizing Dilithium Implementation with AVX2/-512 Open
Dilithium is a signature scheme that is currently being standardized to the Module-Lattice-Based Digital Signature Standard by NIST. It is believed to be secure even against attacks from large-scale quantum computers based on lattice probl…
View article: A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city
A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city Open
Smart cities, as a typical application in the field of the Internet of Things, can combine cloud computing to realize the intelligent control of objects and process massive data. While cloud computing brings convenience to smart city servi…
View article: Further Investigations on Nonlinear Complexity of Periodic Binary Sequences
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences Open
Nonlinear complexity is an important measure for assessing the randomness of sequences. In this paper we investigate how circular shifts affect the nonlinear complexities of finite-length binary sequences and then reveal a more explicit re…
View article: Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm Open
Multi-scalar multiplication (MSM) is an important building block in most of elliptic-curve-based zero-knowledge proof systems, such as Groth16 and PLONK. Recently, Lu et al. proposed cuZK, a new parallel MSM algorithm on GPUs. In this pape…
View article: Security Enhanced Authentication Protocol for Vehicle-to-Grid Communication
Security Enhanced Authentication Protocol for Vehicle-to-Grid Communication Open
View article: The governance technology for blockchain systems: a survey
The governance technology for blockchain systems: a survey Open
After the Ethereum DAO attack in 2016, which resulted in significant economic losses, blockchain governance has become a prominent research area. However, there is a lack of comprehensive and systematic literature review on blockchain gove…
View article: A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth Open
The mobile healthcare (mHealth) is a promising and fascinating paradigm, which can dramatically improve the quality of healthcare delivery by providing remote diagnosis and medical record sharing. Now, the mHealth faces serious challenges …
View article: A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm Open
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national …
View article: Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature
Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature Open
Adaptor signature is extended from the standard digital signature, which conceals a secret value in the “pre-signature”. The one who knows the secret value can transform it into a completed signature. Adaptor signatures are useful in addre…
View article: An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks
An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks Open
Online social networks (OSNs) are becoming more and more popular in people's lives as the demand for online interaction continues to grow. Current OSNs are using centralized identity management system (IDM), which has some problems of sing…
View article: Sm2-Dualring: Efficient Sm2-Based Ring Signature Schemes with Logarithmic Size
Sm2-Dualring: Efficient Sm2-Based Ring Signature Schemes with Logarithmic Size Open
View article: An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System
An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System Open
Adaptor signature, as a new emerging cryptographic primitive, has become one promising method to mitigate the scalability issue on blockchain. It can transform an incomplete signature into a complete signature by revealing the witness of a…
View article: IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search
IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search Open
Since the convenience and advancement of cloud applications, many users (e.g., companies or individuals) adopt remote cloud services to reduce the local storage overload and computing consumption. However, before transferring them to the c…
View article: A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing
A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing Open
Cloud computing can provide users with sufficient computing resources, storage, and bandwidth to meet their needs. Data security and privacy protection are among the new threats faced by users. Searchable encryption is the combination of s…
View article: On the Niho type locally-APN power functions and their boomerang spectrum
On the Niho type locally-APN power functions and their boomerang spectrum Open
In this article, we focus on the concept of locally-APN-ness (``APN" is the abbreviation of the well-known notion of Almost Perfect Nonlinear) introduced by Blondeau, Canteaut, and Charpin, which makes the corpus of S-boxes somehow larger …
View article: A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems
A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems Open
With the development of telecommunication systems and customized monitoring devices, telehealth has been widely used to improve medical quality and reduce overall health costs. However, the convenience of connection between the providers a…
View article: An efficient data aggregation scheme with local differential privacy in smart grid
An efficient data aggregation scheme with local differential privacy in smart grid Open
By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the smart grid collect the…
View article: The Applications of Blockchain in the Covert Communication
The Applications of Blockchain in the Covert Communication Open
Covert communication is designed for hiding the subliminal communication which takes place between both of the speakers and their relationship. The traditional covert communication utilizes the centralized channel and the third‐party centr…
View article: A Privacy-Preserving and Efficient Data Sharing Scheme with Trust Authentication Based on Blockchain for Mhealth
A Privacy-Preserving and Efficient Data Sharing Scheme with Trust Authentication Based on Blockchain for Mhealth Open
View article: A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing
A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing Open
Outsourcing data to cloud services is a good solution for users with limited computing resources. Privacy and confidentiality of data is jeopardized when data is transferred and shared in the cloud. The development of searchable cryptograp…
View article: The Applications of Blockchain in Artificial Intelligence
The Applications of Blockchain in Artificial Intelligence Open
There has been increased interest in applying artificial intelligence (AI) in various settings to inform decision-making and facilitate predictive analytics. In recent times, there have also been attempts to utilize blockchain (a peer-to-p…
View article: Editorial for special issue on ”security and privacy protection in the era of IoT devices”
Editorial for special issue on ”security and privacy protection in the era of IoT devices” Open
IoT devices like smartphones have become an important personal assistant and an indispensable part of our daily life and work. As more and more users storing their private data on their mobile phones, it becomes imperative to develop secur…
View article: Reliable and Secure e-Health Networks
Reliable and Secure e-Health Networks Open
View article: An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud
An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud Open
Dispatching and Control Cloud (DCC) is a cloud platform constructed by State Grid Corporation with the technology of cloud computing. DCC has improved the overall operation and monitoring capabilities, the smart level and many other advant…
View article: Multi‐party key generation protocol for the identity‐based signature scheme in the IEEE P1363 standard for public key cryptography
Multi‐party key generation protocol for the identity‐based signature scheme in the IEEE P1363 standard for public key cryptography Open
Identity‐based cryptography (IBC) is considered as a promising mechanism in the Internet of Things and ad‐hoc networks, providing lightweight authentication and powerful access control. However, it suffers from two inherent problems, i.e. …
View article: Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey Open