Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yichun Zhang is active.

Publication


Featured researches published by Yichun Zhang.


computational intelligence and security | 2009

A DRM Authentication Scheme Based on Smart-Card

Yichun Zhang; Lei Yang; Pin Xu; Yong-Song Zhan

In this paper, we proposed a DRM authentication scheme with smart-card. We first defined a three-role based DRM implementation scenario (Server, Playback device and smart-card), and then fully considered its security and performance challenges. Our scheme is based on Identity Based Encryption and its implementation-oriented. The scheme is efficient at server-side and compact in smart-card design. The proposed scheme realized mutual authentication and session key agreement among all involved parties and is immune to known potential attacks.


international conference on e-business engineering | 2012

HB-MAP Protocol: A New Secure Bidirectional Light-Wight Authentication Protocol of HB

Fangtian Hou; Cheng Yang; Jianbo Liu; Yichun Zhang; Jiayin Tian; Yakun Zhang

With the popularity of the mobile internet, the thin client terminals play an important role in our daily life. Because the thin client terminals have limited computation ability, the light-weight authentication scheme is a urgent problem to be solved. In this paper, we propose a novel mutual lightweight authentication protocol called HB-MAP. In the protocol the client just need store a small amount of messages and do some simple bit-wise operations, the computation-consuming operations such as the generation of random challenges are all done by the server. Finally we will also analysis the security vulnerabilities of HB-MAP protocol.


mobile adhoc and sensor systems | 2009

The Simplified and Secure Conditional Access for Interactive TV Service in Converged Network

Cheng Yang; Jianbo Liu; Yichun Zhang; Jiayin Tian; Lei Yang

For interactive TV (ITV) services in converged network, the DVB-based DTV and the IP-based IPTV coexist in a single dual mode set-top box (STB) and the traditional one-way DVB-CA cannot be adapted to the variation. In this paper, a simplified and secure conditional access scheme based on the simplified double layer is proposed to realize authentication and access control between servers and STBs. In this scheme, the advanced encryption standard (AES) and the common scramble algorithm (CSA) are combined to secure the ITV service and its entitled control message. The video fingerprint and legitimate watermark is used for the piracy tracking and the conditional playing. The elliptic curve based authentication algorithm is used for secure authentication. Under the tripartite participation, the service key access protocol is designed to dynamically update the service keys. The algorithm in the front-end, the algorithm in the STB client and the service key access protocol are proposed in detail. Through the test in an actual application environment and the analysis of security, the proposed conditional access system is very secure with high performance for high definition ITV service and large scale customers.


Wuhan University Journal of Natural Sciences | 2013

An analysis of HB-MAP based on OPNET simulation

Fangtian Hou; Cheng Yang; Jianbo Liu; Yichun Zhang; Jiayin Tian; Yakun Zhang

HB-MAP (HB-mutual authentication protocol) is a mutual ultra-light-weight authentication protocol we have proposed before. In this paper, we present an HB-MAP simulation model. This model is based on the OPNET modeler and includes three parts, namely, the network model, the node model, and the process model. The simulation results are obtained mainly in the aspects of running time, queuing delay, throughput, and channel utilization. To show the performance of HB-MAP, simulation of two other protocols HB and LCAP (load-based concurrent access protocol) is also executed, and comparative analysis is carried out on the results. At the end of the paper, we show a simple process of the attacks and identify that the HB-MAP can defend against some attacks.


international conference on internet technology and applications | 2011

Light-Weight Authentication & Authorization Protocol for Seamless Video Services Application

Jiayin Tian; Cheng Yang; Yichun Zhang; Jianbo Liu

Seamless Video Service is a new service mode, providing video services to users at any time and any place. In seamless content delivery system, the authentication & authorization protocol is an essential problem to be solved. In this paper, an authentication & authorization protocol suitable for seamless video services with light weight certificate, namely SVSAAP is proposed. Through the analysis of the protocol on efficiency and security, the proposed scheme is effective and secure.


international symposium on intelligent information technology and security informatics | 2010

Distributed Key Management Scheme for Large Scale Pay-TV Application

Jiayin Tian; Cheng Yang; Yichun Zhang; Jianbo Liu

In the Pay-TV system, the Key Management System (KMS) is one of the essential basis. The KMS is used to prevent the unauthorized access to the audio/video data and ensure the benefit of the service providers. The security of the KMS is primarily affected by the key distribution process. In this paper, a distributed key management scheme based on the notion of the rekey path method is proposed. Through the comparison of the proposed scheme and the traditional scheme which is based on the smart card, the proposed scheme is low cost and secure.


mobile adhoc and sensor systems | 2009

A Smart-Card Based DRM Authentication Scheme for Mobile TV System

Yichun Zhang; Cheng Yang; Jianbo Liu; Jiayin Tian

In this paper, we propose a novel three party authentication scheme which could realize the mutual authentication among the involved parities (service provider, terminal and smart-card), and our scheme can be used for more fair-use oriented DRM scheme framework design. The scheme is highly efficient and secure, and it’s immune to many existing attacks. Keywords-mobile TV; DRM; smart-card; authentication


international conference on communications | 2007

A Novel Broadcast Encryption Scheme Based on SD Scheme Reconstruction

Yichun Zhang; Cheng Yang; Jianbo Liu; Jianzeng Li

In this paper, we introduce a novel way to solve the tradeoff problem about communication/storage/computation overhead of broadcast encryption scheme. We construct a new scheme based on subset difference (SD) scheme, use concept of RSA accumulator and the idea of separating the user-side device into different function parts, take advantage of the public devices functionality, minimize the storage and computation overhead of the private device, and make the broadcast encryption scheme more implementation-oriented.


Archive | 2012

Network program aggregation and recommendation system and network program aggregation and recommendation method

Cheng Yang; Jianbo Liu; Jiayin Tian; Yichun Zhang; Huan Wang; Meng Chen; Jiechao Chen


international conference on management of e-commerce and e-government | 2009

Authentication Scheme and Simplified CAS in Mobile Multimedia Broadcast

Cheng Yang; Jianbo Liu; Jiayin Tian; Yichun Zhang

Collaboration


Dive into the Yichun Zhang's collaboration.

Top Co-Authors

Avatar

Jianbo Liu

Communication University of China

View shared research outputs
Top Co-Authors

Avatar

Cheng Yang

Communication University of China

View shared research outputs
Top Co-Authors

Avatar

Jiayin Tian

Communication University of China

View shared research outputs
Top Co-Authors

Avatar

Fangtian Hou

Communication University of China

View shared research outputs
Top Co-Authors

Avatar

Lei Yang

Communication University of China

View shared research outputs
Top Co-Authors

Avatar

Yakun Zhang

Communication University of China

View shared research outputs
Top Co-Authors

Avatar

Aina Sui

Communication University of China

View shared research outputs
Top Co-Authors

Avatar

Huan Wang

Communication University of China

View shared research outputs
Top Co-Authors

Avatar

Jianzeng Li

Communication University of China

View shared research outputs
Top Co-Authors

Avatar

Jiechao Chen

Communication University of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge