Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dake He is active.

Publication


Featured researches published by Dake He.


Information Processing Letters | 2009

Improved efficiency of Kiltz07-KEM

Xianhui Lu; Xuejia Lai; Dake He

Kiltz proposed a practical key encapsulation mechanism (Kiltz07-KEM) which is secure against adaptive chosen ciphertext attacks (IND-CCA2) under the gap hashed Diffie-Hellman (GHDH) assumption [Eike Kiltz, Chosen-ciphertext secure key encapsulation based on hashed gap decisional Diffie-Hellman, in: Proceedings of the 10th International Workshop on Practice and Theory in Public-Key Cryptography, PKC 2007, in: LNCS, vol. 4450, Springer-Verlag, 2007, pp. 282-297. Full version available on Cryptology ePrint Archive: Report 2007/036]. We propose a variant of Kiltz07-KEM with improved efficiency in encryption. The new scheme can be proved IND-CCA2 secure under the same hardness assumption. This makes the most efficient KEM provably IND-CCA2 secure in the standard model until today.


IACR Cryptology ePrint Archive | 2008

Improved efficiency of Kiltz07-KEM.

Xianhui Lu; Xuejia Lai; Dake He


IACR Cryptology ePrint Archive | 2007

Efficient chosen ciphertext secure PKE scheme with short ciphertext.

Xianhui Lu; Xuejia Lai; Dake He; Guomin Li


Journal of Shanghai Jiaotong University (science) | 2009

The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security

Xianhui Lu; Xuejia Lai; Dake He


IACR Cryptology ePrint Archive | 2008

Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext.

Xianhui Lu; Xuejia Lai; Dake He


IACR Cryptology ePrint Archive | 2007

MAC-free variant of KD04.

Xianhui Lu; Xuejia Lai; Dake He


IACR Cryptology ePrint Archive | 2007

A new paradigm of chosen ciphertext secure public key encryption scheme.

Xianhui Lu; Xuejia Lai; Dake He


IACR Cryptology ePrint Archive | 2007

On the hash function of ODH assumption.

Xianhui Lu; Xuejia Lai; Dake He; Guomin Li


IACR Cryptology ePrint Archive | 2007

Weak adaptive chosen ciphertext secure hybrid encryption scheme.

Xianhui Lu; Xuejia Lai; Dake He; Guomin Li


IACR Cryptology ePrint Archive | 2006

Revisit of CS98.

Xianhui Lu; Xuejia Lai; Dake He; Guomin Li

Collaboration


Dive into the Dake He's collaboration.

Top Co-Authors

Avatar

Xianhui Lu

Southwest Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Xuejia Lai

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Guomin Li

Southwest Jiaotong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge