Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lan Nguyen is active.

Publication


Featured researches published by Lan Nguyen.


the cryptographers track at the rsa conference | 2005

Accumulators from bilinear pairings and applications

Lan Nguyen

We propose a dynamic accumulator scheme from bilinear pairings and use it to construct an identity-based (ID-based) ring signature scheme with constant-size signatures and to provide membership revocation to group signature schemes, identity escrow schemes and anonymous credential systems. The ID-based ring signature scheme and the group signature scheme have very short signature sizes. The size of our group signatures with membership revocation is only half the size of those in the well-known ACJT00 scheme, which does not provide membership revocation. The schemes do not require trapdoor, so system parameters can be shared by multiple groups belonging to different organizations. All schemes are provably secure in formal models. We generalize the definition of accumulators and provide formal models for ID-based ad-hoc anonymous identification schemes and identity escrow schemes with membership revocation.


applied cryptography and network security | 2005

Dynamic k -times anonymous authentication

Lan Nguyen; Reihaneh Safavi-Naini

k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has application in e-voting, e-cash, electronic coupons and anonymous trial browsing of content. In this paper, we extend k-TAA model to dynamick-TAA in which application providers can independently grant or revoke users from their own groups and so have the required control on their clients. We give a formal model for dynamic k-TAA, propose a dynamic k-times anonymous authentication scheme from bilinear pairing, and prove its security. We also construct an ordinary k-TAA from the dynamic scheme and show communication efficiency of the schemes compared to the previously proposed schemes.


international conference on the theory and application of cryptology and information security | 2004

Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings

Lan Nguyen; Reihaneh Safavi-Naini

We propose a group signature scheme with constant-size public key and signature length that does not require trapdoor. So system parameters can be shared by multiple groups belonging to different organizations. The scheme is provably secure in the formal model recently proposed by Bellare, Shi and Zhang (BSZ04), using random oracle model, Decisional Bilinear Diffie-Hellman and Strong Diffie-Hellman assumptions. We give a more efficient variant scheme and prove its security in a formal model which is a modification of BSZ04 model and has a weaker anonymity requirement. Both schemes are very efficient and the sizes of signatures are approximately one half and one third, respectively, of the sizes of the well-known ACJT00 scheme. We also use the schemes to construct a traceable signature scheme.


applied cryptography and network security | 2004

Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security

Lan Nguyen; Reihaneh Safavi-Naini; Kaoru Kurosawa

We propose a formal model for security of verifiable shuffles and prove security of a number of recently proposed shuffle schemes in this model. The model is general and can be extended to mix-nets and verifiable shuffle decryption. We propose a new efficient verifiable shuffle system based on Paillier encryption scheme and prove its security in the proposed model.


International Journal of Information Security | 2006

Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security

Lan Nguyen; Reihaneh Safavi-Naini; Kaoru Kurosawa

A shuffle takes a list of ciphertexts and outputs a permuted list of re-encryptions of the input ciphertexts. Mix-nets, a popular method for anonymous routing, can be constructed from a sequence of shuffles and decryption. We propose a formal model for security of verifiable shuffles and a new verifiable shuffle system based on the Paillier encryption scheme, and prove its security in the proposed dmodel. The model is general and can be extended to provide provable security for verifiable shuffle decryption.


privacy enhancing technologies | 2003

Breaking and Mending Resilient Mix-Nets

Lan Nguyen; Reihaneh Safavi-Naini

In this paper we show two attacks against universally resilient mix-nets. The first attack can be used against a number of mix-nets, including Furukawa-Sako01 [6], Millimix [11], Abe98 [1], MiP-1, MiP-2 [2,3] and Neff01 [19]. We give the details of the attack in the case of Furukawa-Sako01 mix-net. The second attack breaks the correctness of Millimix [11]. We show how to counter these attacks, and give efficiency and security analysis for the proposed countermeasures.


international conference on networks | 2002

Secure authorization, access control and data integrity in Bluetooth

Lan Nguyen; Reihaneh Safavi-Naini; Willy Susilo; Tadeusz A. Wysocki

The Bluetooth standard has a provision for mutual authentication of connecting devices but not their actual users and allows access control during connection setup only. We propose a user authorization and pairing (UAP) application, that has the ability to perform authentication and authorization of users using role based model. The pairing procedure, which exchanges link key between devices, is also performed as a part of the user authorization process. The integrity of the message is guaranteed by using message authentication codes. We also extend an attack on a short PIN during the pairing procedure for devices compliant with the Bluetooth specification version 1.1.


IACR Cryptology ePrint Archive | 2005

A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem

Lan Nguyen; Reihaneh Safavi-Naini; Kaoru Kurosawa


Cryptographic Algorithms and their Uses | 2004

An Efficient Verifiable Shuffle with Perfect Zero-knowledge Proof System.

Lan Nguyen; Reihaneh Safavi-Naini


Journal of Universal Computer Science | 2005

A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem.

Lan Nguyen; Reihaneh Safavi-Naini; Kaoru Kurosawa

Collaboration


Dive into the Lan Nguyen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Willy Susilo

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar

Tadeusz A. Wysocki

University of Nebraska–Lincoln

View shared research outputs
Researchain Logo
Decentralizing Knowledge