Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shuanghe Peng is active.

Publication


Featured researches published by Shuanghe Peng.


international conference on signal processing | 2006

Trust of User Using U-Key on Trusted Platform

Shuanghe Peng; Zhen Han

Trusted computing based on TPM can be viewed from the following several ways, i.e. trusted on user, trusted on platform, trusted on application and trusted between platforms. Even though trusted on user was mentioned in trusted computing architecture, it does not really address security from a user point of view, as the model is centered on the security of platform. User identification and authentication mechanism, are rather rudiment. Andreas Pashalidis and Chris J. Mitchell proposed a single sign on scheme using trusted platform in 2003, where platform attestation identity key is used as user identity. User identity is bound to his/her trusted platform, which makes it inconvenient to users. Mobility and flexibility are not achieved. Based on the rule of separation of user and platform credentials, trust of user using U-key technology on trusted platform is proposed in this paper. The proposed scheme can simplify the management of user and provide portability and flexibility to users


international conference on multimedia information networking and security | 2009

A Trusted Bootstrap Scheme on EFI

Rui Zhang; Jiqiang Liu; Shuanghe Peng

Extensible Firmware Interface (EFI) is a new interface applied for platform firmware and the operating system. Due to providing extensibility and customization, EFI is also a new technology instead of the conventional Basic Input-Output System (BIOS). However, the issue of building trusted EFI BIOS becomes increasingly important. The key of establishing trusted EFI BIOS is based on the trust transition. Therefore, we formalize the principles of building the trust chain firstly, and then present a suggested trust transition model in this paper.


international conference on signal processing | 2008

Design and implementation of UsbKey device driver based on Extensible Firmware Interface

Tang Weimin; Shuanghe Peng; Zhen Han

The goal of trusted computing proposed by TCG is to enhance the security of platform by the way of integrity measurement. TPM is a tamper-resistant hardware module designed to provide robust security capabilities like remote attestation and sealed storage for the trusted platform. But TPM has its limitation. It canpsilat be directly used in common PC current in use because of its interface with PC. A UsbKey is a USB device with capabilities of smart card. Extensible firmware interface (abbreviated as EFI) is intended as a significantly improved replacement of the old legacy BIOS. How to design and implement the driver of UsbKey based on EFI is what this paper focuses on. It is a basement for the trusted application.


China Communications | 2016

Membership proof and verification in authenticated skip lists based on heap

Shuanghe Peng; Zhige Chen; Deen Chen

How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees.


pacific rim international symposium on dependable computing | 2005

Proxy cryptography for secure inter-domain information exchanges

Shuanghe Peng; Zhen Han

In todays interconnected world, the need to access to services across domains is increasing. How to make inter-domain data exchanges secure is what we concerned. Kerberos protocol can be used to secure inter-domain information exchanges, but it cannot be applied directly in environment where boundary device such as firewall exists between domains. Proxy ElGamal encryption scheme is a way to protect data exchanges between two domains. However, there are two disadvantages in using this proxy cryptosystem. In this article, an improved proxy ElGamal cryptosystem is proposed and two secure inter-domain authentication and proxy keys distribution protocols based on the improved proxy ElGamal cryptosystem are designed, one is for trusted domains and the other is for untrusted domains. The proposed protocols make data exchanges between domains more secure and efficient.


Archive | 2010

Method for establishing trusted booting system based on EFI

Shuanghe Peng; Zhen Han; Jiqiang Liu


Journal of Computer Research and Development | 2005

Security Protocol and Scheme for Inter-Realm Information Accessing

Shuanghe Peng


Archive | 2009

Boot file credible verify based on mobile TPM

Shuanghe Peng; Zhen Han; Jiqiang Liu


international conference on multimedia information networking and security | 2009

Design and Implementation of Portable TPM Device Driver Based on Extensible Firmware Interface

Shuanghe Peng; Zhen Han


Archive | 2010

Method for establishing credible link under EFI

Zhen Han; Jiqiang Liu; Shuanghe Peng; Yanfeng Shi

Collaboration


Dive into the Shuanghe Peng's collaboration.

Top Co-Authors

Avatar

Zhen Han

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Jiqiang Liu

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Zhige Chen

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Deen Chen

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Rui Zhang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Tang Weimin

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Yanfeng Shi

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Yingjie Qin

Beijing Jiaotong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge