Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Haipeng Qu is active.

Publication


Featured researches published by Haipeng Qu.


IACR Cryptology ePrint Archive | 2017

Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings

Xi Jun Lin; Haipeng Qu; Xiaoshuai Zhang

One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computation. However, writing a simulator and proving security via the use of simulation is a nontrivial task, and one that many newcomers to the field often find difficult. In this tutorial, we provide a guide to how to write simulators and prove security via the simulation paradigm. Although we have tried to make this tutorial as stand-alone as possible, we assume some familiarity with the notions of secure encryption, zero-knowledge, and secure computation.


Computers & Security | 2015

Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications

Xi Jun Lin; Lin Sun; Haipeng Qu

The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously and in real-time. Recently, Alcaide et?al. proposed a fully decentralized anonymous authentication protocol for privacy-preserving IoT target-driven applications. Their system is set up by an ad-hoc community of decentralized founding nodes. Nodes can interact, being participants of cyberphysical systems, preserving full anonymity. In this study, we point out that their protocol is insecure. The adversary can cheat the data collectors by impersonating a legitimate user.


Discrete Applied Mathematics | 2017

An efficient RSA-based certificateless public key encryption scheme

Xi Jun Lin; Lin Sun; Haipeng Qu

Abstract In order to resolve the key escrow in identity-based scheme and the significant cost of using a PKI system in traditional public key scheme, the notion of certificateless public key cryptography (CL-PKC) was introduced. The first certificateless public key encryption scheme (CL-PKE) was proposed by Al-Riyami and Paterson, and then further schemes were developed. However, most of them are constructed from the bilinear pairing which is a time costing operation. In this paper, we construct an efficient CL-PKE scheme from RSA since RSA is the de facto Internet standard and is widely used in many applications. The security is based on Kilian–Petrank’s RSA assumption which is a variant of RSA.


Information Sciences | 2018

Certificateless public key encryption with equality test

Haipeng Qu; Zhen Yan; Xi Jun Lin; Qi Zhang; Lin Sun

Abstract In this paper, we present the concept of certificateless public key encryption with equality test (CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public key encryption with equality test (PKEET) to solve the key escrow problem of identity-based encryption with equality test (IBEET). In the CL-PKEET scheme, the receiver first computes his private key with the receiver’s secret value and the partial private key generated by the key generation center (KGC). The trapdoor is generated with this private key. Then, using the trapdoor, the receiver authorizes the cloud server to test the equivalence between his ciphertexts and others’ ciphertexts. We formalize the system model and definition of CL-PKEET, propose the security models by considering four types of adversaries, and then present a concrete CL-PKEET scheme. Our proposal achieves the IND-CCA security against adversaries without trapdoor, and the OW-CCA security against adversaries with trapdoor. Furthermore, compared with IBEET and PKEET, our proposal which has the features of CL-PKC solves certificate management and key escrow problems simultaneously.


IACR Cryptology ePrint Archive | 2015

Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential.

Haipeng Qu; Peng Shang; Xi Jun Lin; Lin Sun


IACR Cryptology ePrint Archive | 2016

New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings.

Xi Jun Lin; Haipeng Qu; Xiaoshuai Zhang


The Computer Journal | 2018

On the Security of Secure Server-Designation Public Key Encryption with Keyword Search

Xi-Jun Lin; Lin Sun; Haipeng Qu; Dongxiao Liu


The Computer Journal | 2018

Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme

Xi Jun Lin; Lin Sun; Haipeng Qu; Dongxiao Liu


Information Sciences | 2018

Generic construction of public key encryption, identity-based encryption and signcryption with equality test

Xi Jun Lin; Lin Sun; Haipeng Qu


The Computer Journal | 2016

Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme

Xi Jun Lin; Lin Sun; Haipeng Qu; Xiaoshuai Zhang

Collaboration


Dive into the Haipeng Qu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiaoshuai Zhang

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar

Dongxiao Liu

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar

Qi Zhang

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar

Zhen Yan

Ocean University of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xi-Jun Lin

Ocean University of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge