Jianchang Lai
Information Technology University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jianchang Lai.
International Journal of Information Security | 2017
Jianchang Lai; Yi Mu; Fuchun Guo
The technique of online/offline is regarded as a promising approach to speed up the computation of encryption, because the most part of computation, such as pairing over points on elliptic curve and exponentiation in groups, can be pre-computed in the offline phase without knowing the message to be encrypted and/or recipient’s identity. The online phase only requires light computation, such as modular multiplication. In this paper, we propose two novel identity-based online/offline schemes: a full secure identity-based online/offline encryption scheme and an identity-based online/offline signcryption scheme. Compared to the other schemes in the literature, our schemes achieve the shortest ciphertext size in both offline and online phases and demonstrate the best performance in offline computation. Our schemes are applicable to devices with limited computation power. They are proven secure in the random oracle model.
australasian conference on information security and privacy | 2015
Jianchang Lai; Yi Mu; Fuchun Guo; Willy Susilo
The notion of online/offline encryption was put forth by Guo, Mu and Chen (FC 2008), where they proposed an identity-based scheme called identity-based online/offline encryption (IBOOE). An online/offline encryption separates an encryption into two stages: offline and online. The offline phase carries much more computational load than the online phase, where the offline phase does not require the information of the message to be encrypted and the identity of the receiver. Subsequently, many applications of IBOOE have been proposed in the literature. As an example, Hobenberger and Waters (PKC 2014) have recently applied it to attribute-based encryption. In this paper, we move one step further and explore a much more efficient variant. We propose an efficient semi-generic transformation to obtain an online/offline encryption from a tradition identity-based encryption (IBE). Our transformation provides a new method to separate the computation of receiver’s identity into offline and online phases. The IBOOE schemes using our transformation saves one group element in both offline and online phases compared to other IBOOE schemes in identity computing. The transformed scheme still maintains the same level of security as in the original IBE scheme.
international cryptology conference | 2016
Fuchun Guo; Willy Susilo; Yi Mu; Rongmao Chen; Jianchang Lai; Guomin Yang
The indistinguishability security of a public-key cryptosystem can be reduced to a computational hard assumption in the random oracle model, where the solution to a computational hard problem is hidden in one of the adversarys queries to the random oracle. Usually, there is a finding loss in finding the correct solution from the query set, especially when the decisional variant of the computational problem is also hard. The problem of finding loss must be addressed towards tighter reductions under this type. In EUROCRYPT 2008, Cash, Kiltz and Shoup proposed a novel approach using a trapdoor test that can solve the finding loss problem. The simulator can find the correct solution with overwhelming probability 1, if there exists a trapdoor test for the adopted hard problem. The proposed approach is efficient and can be used for many Diffie-Hellman computational assumptions. The only limitation is the requirement of a trapdoor test that must be found for the adopted computational assumptions. In this paper, we introduce a universal approach for finding loss, namely Iterated Random Oracle, which can be applied to all computational assumptions. The finding loss in our proposed approach is very small. For
australasian conference on information security and privacy | 2016
Jianchang Lai; Yi Mu; Fuchun Guo; Willy Susilo; Rongmao Chen
ubiquitous computing | 2017
Jianchang Lai; Yi Mu; Fuchun Guo; Willy Susilo; Rongmao Chen
2^{60}
international cryptology conference | 2017
Funchun Guo; Rongmao Chen; Willy Susilo; Jianchang Lai; Guomin Yang; Yi Mu
provable security | 2016
Peng Jiang; Xiaofen Wang; Jianchang Lai; Fuchun Guo; Rongmao Chen
queries to the random oracle, the success probability of finding the correct solution from the query set will be as large as 1i¾?/i¾?64 compared to
Security and Communication Networks | 2016
Peng Jiang; Yi Mu; Fuchun Guo; Xiaofen Wang; Jianchang Lai
Information Sciences | 2019
Peng Jiang; Jianchang Lai; Fuchun Guo; Willy Susilo; Man Ho Au; Guomin Yang; Yi Mu; Rongmao Chen
1/{2^{60}}
Information Sciences | 2018
Jianchang Lai; Yi Mu; Fuchun Guo; Peng Jiang; Willy Susilo