Yupu Hu
YOU?
Author Swipe
View article: Key Technology and Equipment for Splitting and Grouting of Complex Geotechnical Bodies
Key Technology and Equipment for Splitting and Grouting of Complex Geotechnical Bodies Open
Due to the hidden nature and complexity of the underground engineering rock body, the actual grouting process is mostly a black box operation, which makes it difficult to observe and control the splitting direction of the slurry vein, and …
View article: Conditionally accepted sampling: AB15 IO scheme with smaller deviation ratio
Conditionally accepted sampling: AB15 IO scheme with smaller deviation ratio Open
Indistinguishable Obfuscation (IO) is a very critical cryptography primitive. It can be used to construct almost any other cryptography schemes. AB15 indistinguishability obfuscation scheme is the first practical scheme. In order to avoid …
View article: Research on the deployment model of intelligent highway sensor network under a bilevel programming framework
Research on the deployment model of intelligent highway sensor network under a bilevel programming framework Open
Theoretical frameworks for the strategic placement of Road Side Units (RSUs) along highways are currently insufficient. In the context of emerging Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication settings, the imp…
View article: Dual‐Mode Encryption for UC‐Secure String OT from Learning with Errors
Dual‐Mode Encryption for UC‐Secure String OT from Learning with Errors Open
Universal composability (UC) is a primary security flavor for designing oblivious transfer (OT) due to its advantage of arbitrary composition. However, the study of UC‐secure OT over lattices is still far behind compared with constructions…
View article: Improved integral cryptanalysis of SPNbox in digital rights management systems
Improved integral cryptanalysis of SPNbox in digital rights management systems Open
As an access control technology of digital material, digital rights management systems have a profound effect on the copyright protection of digital content. To address the threat of key exposure, applying white‐box ciphers is effective to…
View article: Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism
Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism Open
Lattice-based key exchange protocols have attracted tremendous attention for its post-quantum security. In this work, we construct a Module-LWE-based key exchange protocol using Peikert’s error reconciliation mechanism. Compared with Kyber…
View article: An Improved Group Signature Scheme with VLR over Lattices
An Improved Group Signature Scheme with VLR over Lattices Open
For group signatures (GS) supporting membership revocation, verifier-local revocation (VLR) mechanism is the most flexible choice. As a post-quantum secure cryptographic counterpart of classical schemes, the first dynamic GS-VLR scheme ove…
View article: Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited Open
For the purpose of improving the efficiency of the cryptosystems built upon lattice trapdoors, Chen, Genise and Mukherjee at ASIACRYPT 2019 modified the gadget trapdoor (G‐trapdoor) to an approximate trapdoor, which enables one to sample s…
View article: Lattice‐based revocable attribute‐based encryption with decryption key exposure resistance
Lattice‐based revocable attribute‐based encryption with decryption key exposure resistance Open
Attribute‐based encryption (ABE) is a promising management method that enables fine‐grained access control in large‐scale systems. Revocable ABE (RABE) can support a key revocation mechanism in an ABE system. With the advent of the Interne…
View article: Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials Open
Private information retrieval (PIR) protocol is a powerful cryptographic tool and has received considerable attention in recent years as it can not only help users to retrieve the needed data from database servers but also protect them fro…
View article: Study on Frost Heaving Evaluation of Typical Soil Samples along Qinghai-Tibet Highway
Study on Frost Heaving Evaluation of Typical Soil Samples along Qinghai-Tibet Highway Open
Based on the geological survey data of 167 boreholes along the Qinghai-Tibet Highway, the relationship between frost heaving force and natural density and water content of soil samples was analyzed and evaluated. The results show that the …
View article: Revisiting BGG <sup>+</sup> 14 ABE with weakness analysis
Revisiting BGG <sup>+</sup> 14 ABE with weakness analysis Open
Attribute‐based encryption (ABE) supports fine‐grained sharing of encrypted data so that it can be used in a plenty of application scenarios, and many constructions of ABE scheme have been presented. The first arithmetic circuit ABE system…
View article: Lattice-based Threshold Ring Signature with Message Block Sharing
Lattice-based Threshold Ring Signature with Message Block Sharing Open
Threshold ring signature scheme enables any t entities from N ring members to spontaneously generate a publicly verifiable t-out-of-N signature anonymously.The verifier is convinced that the signature is indeed generated by at least t user…
View article: Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output
Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output Open
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantu…
View article: Collusion Trap Against GVW’13 ABE
Collusion Trap Against GVW’13 ABE Open
Attribute-based encryption has broad application prospects. GVW'13 attribute-based encryption (ABE) scheme is one of the major candidates for ABE. The scheme has exquisite structure and proven security, and the crucial component is two-to-…
View article: Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption Open
Accountable authority identity-based encryption (A-IBE), as an attractive way to guarantee the user privacy security, enables a malicious private key generator (PKG) to be traced if it generates and re-distributes a user private key. Parti…
View article: Lattice-based deniable ring signatures
Lattice-based deniable ring signatures Open
In cryptography, a ring signature is anonymous as it hides the signer's identity among other users. When generating the signature, the users are arranged as a ring. Compared with group signatures, a ring signature scheme needs no group man…
View article: Full Secure Attribute-Based Broadcast Encryption Achieved through Selective Techniques
Full Secure Attribute-Based Broadcast Encryption Achieved through Selective Techniques Open
According to the broadcast encryption scheme couldn’t consider its security and efficiency in one model simultaneously, a full secure attribute-based broadcast encryption achieved through selective techniques was proposed. The scheme can…
View article: Efficient identity-based signature over NTRU lattice
Efficient identity-based signature over NTRU lattice Open
Identity-based signature has become an important technique for lightweight authentication as soon as it was proposed in 1984. Thereafter, identity-based signature schemes based on the integer factorization problem and discrete logarithm pr…
View article: Simpler Efficient Group Signature Scheme with Verifier-Local Revocation from Lattices
Simpler Efficient Group Signature Scheme with Verifier-Local Revocation from Lattices Open
Verifier-local revocation (VLR) seems to be the most flexible revocation approaches for any group signature scheme, because it just only requires the verifiers to possess some up-to-date revocation information, but not the signers.Langlois…