Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jianchang Lai is active.

Publication


Featured researches published by Jianchang Lai.


International Journal of Information Security | 2017

Efficient identity-based online/offline encryption and signcryption with short ciphertext

Jianchang Lai; Yi Mu; Fuchun Guo

The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentiation in groups, can be pre-computed in the offline phase without knowing the message to be encrypted and/or recipient’s identity. The online phase only requires light computation, such as modular multiplication. In this paper, we propose two novel identity-based online/offline schemes: a full secure identity-based online/offline encryption scheme and an identity-based online/offline signcryption scheme. Compared to the other schemes in the literature, our schemes achieve the shortest ciphertext size in both offline and online phases and demonstrate the best performance in offline computation. Our schemes are applicable to devices with limited computation power. They are proven secure in the random oracle model.


australasian conference on information security and privacy | 2015

Improved Identity-Based Online/Offline Encryption

Jianchang Lai; Yi Mu; Fuchun Guo; Willy Susilo

The notion of online/offline encryption was put forth by Guo, Mu and Chen (FC 2008), where they proposed an identity-based scheme called identity-based online/offline encryption (IBOOE). An online/offline encryption separates an encryption into two stages: offline and online. The offline phase carries much more computational load than the online phase, where the offline phase does not require the information of the message to be encrypted and the identity of the receiver. Subsequently, many applications of IBOOE have been proposed in the literature. As an example, Hobenberger and Waters (PKC 2014) have recently applied it to attribute-based encryption. In this paper, we move one step further and explore a much more efficient variant. We propose an efficient semi-generic transformation to obtain an online/offline encryption from a tradition identity-based encryption (IBE). Our transformation provides a new method to separate the computation of receiver’s identity into offline and online phases. The IBOOE schemes using our transformation saves one group element in both offline and online phases compared to other IBOOE schemes in identity computing. The transformed scheme still maintains the same level of security as in the original IBE scheme.


international cryptology conference | 2016

Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction

Fuchun Guo; Willy Susilo; Yi Mu; Rongmao Chen; Jianchang Lai; Guomin Yang

The indistinguishability security of a public-key cryptosystem can be reduced to a computational hard assumption in the random oracle model, where the solution to a computational hard problem is hidden in one of the adversarys queries to the random oracle. Usually, there is a finding loss in finding the correct solution from the query set, especially when the decisional variant of the computational problem is also hard. The problem of finding loss must be addressed towards tighter reductions under this type. In EUROCRYPT 2008, Cash, Kiltz and Shoup proposed a novel approach using a trapdoor test that can solve the finding loss problem. The simulator can find the correct solution with overwhelming probability 1, if there exists a trapdoor test for the adopted hard problem. The proposed approach is efficient and can be used for many Diffie-Hellman computational assumptions. The only limitation is the requirement of a trapdoor test that must be found for the adopted computational assumptions. In this paper, we introduce a universal approach for finding loss, namely Iterated Random Oracle, which can be applied to all computational assumptions. The finding loss in our proposed approach is very small. For


australasian conference on information security and privacy | 2016

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing

Jianchang Lai; Yi Mu; Fuchun Guo; Willy Susilo; Rongmao Chen


ubiquitous computing | 2017

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

Jianchang Lai; Yi Mu; Fuchun Guo; Willy Susilo; Rongmao Chen

2^{60}


international cryptology conference | 2017

Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample

Funchun Guo; Rongmao Chen; Willy Susilo; Jianchang Lai; Guomin Yang; Yi Mu


provable security | 2016

Oblivious Keyword Search with Authorization

Peng Jiang; Xiaofen Wang; Jianchang Lai; Fuchun Guo; Rongmao Chen

queries to the random oracle, the success probability of finding the correct solution from the query set will be as large as 1i¾?/i¾?64 compared to


Security and Communication Networks | 2016

Centralized keyword search on encrypted data for cloud applications

Peng Jiang; Yi Mu; Fuchun Guo; Xiaofen Wang; Jianchang Lai


Information Sciences | 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters

Peng Jiang; Jianchang Lai; Fuchun Guo; Willy Susilo; Man Ho Au; Guomin Yang; Yi Mu; Rongmao Chen

1/{2^{60}}


Information Sciences | 2018

Privacy-enhanced attribute-based private information retrieval

Jianchang Lai; Yi Mu; Fuchun Guo; Peng Jiang; Willy Susilo

Collaboration


Dive into the Jianchang Lai's collaboration.

Top Co-Authors

Avatar

Fuchun Guo

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Yi Mu

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Willy Susilo

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar

Rongmao Chen

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Peng Jiang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Guomin Yang

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar

Sha Ma

South China Agricultural University

View shared research outputs
Top Co-Authors

Avatar

Xiaofen Wang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Man Ho Au

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Funchun Guo

University of Wollongong

View shared research outputs
Researchain Logo
Decentralizing Knowledge