Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xianhui Lu is active.

Publication


Featured researches published by Xianhui Lu.


computational intelligence and security | 2007

A Tight Security Reduction Identity-Based Signature Scheme

Li Kang; Xiaohu Tang; Xianhui Lu; Jia Fan

This paper presents a novel algorithm for point correspondences using graph spectral analysis. Firstly, the correspondence probabilities are computed by using the eigenvectors and eigenvalues of the proximity matrix as well as the method of alternated row and column normalizations. Secondly, local similarity evaluated by shape context is incorporated into our spectral method to refine the results of spectral correspondence via a probabilistic relaxation approach. Experiments on both real-world and synthetic data show that our method possesses comparatively high accuracy.


Information Processing Letters | 2009

Improved efficiency of Kiltz07-KEM

Xianhui Lu; Xuejia Lai; Dake He

Kiltz proposed a practical key encapsulation mechanism (Kiltz07-KEM) which is secure against adaptive chosen ciphertext attacks (IND-CCA2) under the gap hashed Diffie-Hellman (GHDH) assumption [Eike Kiltz, Chosen-ciphertext secure key encapsulation based on hashed gap decisional Diffie-Hellman, in: Proceedings of the 10th International Workshop on Practice and Theory in Public-Key Cryptography, PKC 2007, in: LNCS, vol. 4450, Springer-Verlag, 2007, pp. 282-297. Full version available on Cryptology ePrint Archive: Report 2007/036]. We propose a variant of Kiltz07-KEM with improved efficiency in encryption. The new scheme can be proved IND-CCA2 secure under the same hardness assumption. This makes the most efficient KEM provably IND-CCA2 secure in the standard model until today.


IACR Cryptology ePrint Archive | 2007

A Short Signature Scheme in the Standard Model.

Li Kang; Xiaohu Tang; Xianhui Lu; Jia Fan


IACR Cryptology ePrint Archive | 2008

Improved efficiency of Kiltz07-KEM.

Xianhui Lu; Xuejia Lai; Dake He


IACR Cryptology ePrint Archive | 2007

Efficient chosen ciphertext secure PKE scheme with short ciphertext.

Xianhui Lu; Xuejia Lai; Dake He; Guomin Li


Journal of Shanghai Jiaotong University (science) | 2009

The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security

Xianhui Lu; Xuejia Lai; Dake He


Journal of Shanghai Jiaotong University (science) | 2008

Identity-based encryption with non-interactive opening

Jia Fan; Xiaohu Tang; Li Kang; Xianhui Lu


IACR Cryptology ePrint Archive | 2008

Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext.

Xianhui Lu; Xuejia Lai; Dake He


IACR Cryptology ePrint Archive | 2007

MAC-free variant of KD04.

Xianhui Lu; Xuejia Lai; Dake He


IACR Cryptology ePrint Archive | 2007

A new paradigm of chosen ciphertext secure public key encryption scheme.

Xianhui Lu; Xuejia Lai; Dake He

Collaboration


Dive into the Xianhui Lu's collaboration.

Top Co-Authors

Avatar

Dake He

Southwest Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Xuejia Lai

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Guomin Li

Southwest Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Jia Fan

Southwest Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Li Kang

Southwest Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Xiaohu Tang

Southwest Jiaotong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge