Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jun Ao is active.

Publication


Featured researches published by Jun Ao.


network and parallel computing | 2007

Password-based Dynamic Group Key Agreement

Chunbo Ma; Jun Ao; Jianhua Li

A password-based dynamic group key agreement protocol from tripartite Diffie-Hellman using pairing on elliptic curve is presented in this paper. In this scheme, due to all users share a common pre-distributed password, the setup of the key agreement is simplified and the performance is improved. In addition, each user establishes a relation between his left and right neighbors respectively in order to implement the fast joining and leaving operations. Under the DDH assumption, proofs are given to show that the proposed key agreement protocol is secure against passive attack.


international conference on intelligent computing | 2007

A Novel Verifier-Based Authenticated Key Agreement Protocol

Chunbo Ma; Jun Ao; Jianhua Li

Lee et al.’s presented a Verifier-based key agreement protocol in 2004. They claimed that their protocol was secure against Stolen-verifier attack in the case of server compromise. However, it is not really a secure protocol. In this paper, we briefly review this scheme and demonstrate the flaw, which once was pointed out by Shim and Seo. Subsequently, we propose a novel Verifier-based authenticated key agreement protocol and show that it withstands Stolen-verifier attack, Dictionary attack, and man-in-middle attack.


international conference on online communities and social computing | 2007

Chameleon-based deniable authenticated key agreement protocol secure against forgery

Chunbo Ma; Jun Ao; Jianhua Li


IACR Cryptology ePrint Archive | 2007

Group-oriented encryption secure against collude attack.

Chunbo Ma; Jun Ao; Jianhua Li


IACR Cryptology ePrint Archive | 2007

Provable password-based tripartite key agreement protocol.

Chunbo Ma; Jun Ao; Jianhua Li


Information Technology Journal | 2008

Authenticated Tripartite Key Agreement Protocol

Chunbo Ma; Jun Ao; Jianhua Li


Archive | 2007

Key Encapsulation to Designated Group

Chunbo Ma; Jun Ao; Jianhua Li


Information Technology Journal | 2007

Password-Based Key Agreement Protocol

Chunbo Ma; Jun Ao; Jianhua Li


IACR Cryptology ePrint Archive | 2007

Group-based Proxy Re-encryption scheme.

Chunbo Ma; Jun Ao; Jianhua Li


IACR Cryptology ePrint Archive | 2007

Scalable Storage Scheme from Forward Key Rotation.

Chunbo Ma; Jun Ao; Jianhua Li

Collaboration


Dive into the Jun Ao's collaboration.

Top Co-Authors

Avatar

Jianhua Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Chunbo Ma

Shanghai Jiao Tong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge