Debiao He
YOU?
Author Swipe
View article: A survey on threshold digital signature schemes
A survey on threshold digital signature schemes Open
Threshold signature, as a privacy-preserving distributed signature, has become the underlying technology in various fields over the last decade. It is useful to protect against a single point of failure and can effectively ensure key secur…
View article: SilentLedger: Privacy-Preserving Auditing for Blockchains with Complete Non-Interactivity
SilentLedger: Privacy-Preserving Auditing for Blockchains with Complete Non-Interactivity Open
Privacy-preserving blockchain systems are essential for protecting transaction data, yet they must also provide auditability that enables auditors to recover participant identities and transaction amounts when warranted. Existing designs o…
View article: Network-Layer Perspectives on Satellite–Terrestrial Integrated Networks in 6G: A Comprehensive Review
Network-Layer Perspectives on Satellite–Terrestrial Integrated Networks in 6G: A Comprehensive Review Open
Satellite–terrestrial networks have garnered significant attention in recent years and are extensively applied in intelligent transportation and emergency rescue. This paper provides a comprehensive review of the latest research advancemen…
View article: Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey
Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey Open
Blockchain technology, introduced in 2008, has revolutionized data storage and transfer across sectors such as finance, healthcare, intelligent transportation, and the metaverse. However, the proliferation of blockchain systems has led to …
View article: SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs Open
Multi-scalar multiplication (MSM) is the primary building block in many pairing-based zero-knowledge proof (ZKP) systems. MSM at large scales has become the main bottleneck in ZKP implementations. Inspired by existing SIMD-accelerated work…
View article: Optimizing Dilithium Implementation with AVX2/-512
Optimizing Dilithium Implementation with AVX2/-512 Open
Dilithium is a signature scheme that is currently being standardized to the Module-Lattice-Based Digital Signature Standard by NIST. It is believed to be secure even against attacks from large-scale quantum computers based on lattice probl…
View article: A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city
A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city Open
Smart cities, as a typical application in the field of the Internet of Things, can combine cloud computing to realize the intelligent control of objects and process massive data. While cloud computing brings convenience to smart city servi…
View article: Further Investigations on Nonlinear Complexity of Periodic Binary Sequences
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences Open
Nonlinear complexity is an important measure for assessing the randomness of sequences. In this paper we investigate how circular shifts affect the nonlinear complexities of finite-length binary sequences and then reveal a more explicit re…
View article: Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm Open
Multi-scalar multiplication (MSM) is an important building block in most of elliptic-curve-based zero-knowledge proof systems, such as Groth16 and PLONK. Recently, Lu et al. proposed cuZK, a new parallel MSM algorithm on GPUs. In this pape…
View article: The governance technology for blockchain systems: a survey
The governance technology for blockchain systems: a survey Open
After the Ethereum DAO attack in 2016, which resulted in significant economic losses, blockchain governance has become a prominent research area. However, there is a lack of comprehensive and systematic literature review on blockchain gove…
View article: A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth Open
The mobile healthcare (mHealth) is a promising and fascinating paradigm, which can dramatically improve the quality of healthcare delivery by providing remote diagnosis and medical record sharing. Now, the mHealth faces serious challenges …
View article: A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm Open
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national …
View article: Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature
Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature Open
Adaptor signature is extended from the standard digital signature, which conceals a secret value in the “pre-signature”. The one who knows the secret value can transform it into a completed signature. Adaptor signatures are useful in addre…
View article: An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks
An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks Open
Online social networks (OSNs) are becoming more and more popular in people's lives as the demand for online interaction continues to grow. Current OSNs are using centralized identity management system (IDM), which has some problems of sing…
View article: An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System
An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System Open
Adaptor signature, as a new emerging cryptographic primitive, has become one promising method to mitigate the scalability issue on blockchain. It can transform an incomplete signature into a complete signature by revealing the witness of a…
View article: IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search
IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search Open
Since the convenience and advancement of cloud applications, many users (e.g., companies or individuals) adopt remote cloud services to reduce the local storage overload and computing consumption. However, before transferring them to the c…
View article: A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing
A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing Open
Cloud computing can provide users with sufficient computing resources, storage, and bandwidth to meet their needs. Data security and privacy protection are among the new threats faced by users. Searchable encryption is the combination of s…
View article: On the Niho type locally-APN power functions and their boomerang spectrum
On the Niho type locally-APN power functions and their boomerang spectrum Open
In this article, we focus on the concept of locally-APN-ness (``APN" is the abbreviation of the well-known notion of Almost Perfect Nonlinear) introduced by Blondeau, Canteaut, and Charpin, which makes the corpus of S-boxes somehow larger …
View article: A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems
A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems Open
With the development of telecommunication systems and customized monitoring devices, telehealth has been widely used to improve medical quality and reduce overall health costs. However, the convenience of connection between the providers a…
View article: An efficient data aggregation scheme with local differential privacy in smart grid
An efficient data aggregation scheme with local differential privacy in smart grid Open
By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the smart grid collect the…
View article: The Applications of Blockchain in the Covert Communication
The Applications of Blockchain in the Covert Communication Open
Covert communication is designed for hiding the subliminal communication which takes place between both of the speakers and their relationship. The traditional covert communication utilizes the centralized channel and the third‐party centr…
View article: A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing
A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing Open
Outsourcing data to cloud services is a good solution for users with limited computing resources. Privacy and confidentiality of data is jeopardized when data is transferred and shared in the cloud. The development of searchable cryptograp…
View article: The Applications of Blockchain in Artificial Intelligence
The Applications of Blockchain in Artificial Intelligence Open
There has been increased interest in applying artificial intelligence (AI) in various settings to inform decision-making and facilitate predictive analytics. In recent times, there have also been attempts to utilize blockchain (a peer-to-p…
View article: An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud
An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud Open
Dispatching and Control Cloud (DCC) is a cloud platform constructed by State Grid Corporation with the technology of cloud computing. DCC has improved the overall operation and monitoring capabilities, the smart level and many other advant…