Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhang Yichen is active.

Publication


Featured researches published by Zhang Yichen.


Wuhan University Journal of Natural Sciences | 2005

A new proxy signature scheme with message recovery using self-certified public key

Li Jiguo; Zhang Yichen; Zhu Yuelong

A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer.


Archive | 2014

Digital signature system and signature method based on certificate

Li Jiguo; Wang Zhiwei; Zhang Yichen


international conference on information security | 2004

Security analysis and improvement of some proxy signature schemes

Li Jiguo; Zhang Yichen; Zhu Yuelong


Archive | 2015

Attribute-based encryption method and attribute-based encryption system capable of protecting privacy and supporting user Undo

Li Jiguo; Shi Yuerong; Lu Yang; Zhang Yichen


Archive | 2014

Encapsulation method and encapsulation system for certificate-based key with label

Li Jiguo; Yang Haishan; Zhang Yichen


Archive | 2013

Fair and rational multi-secret sharing method for honest participants

Li Jiguo; Wang Fei; Zhang Yichen; Yu Qihong; Qian Huiling; Teng Meilin; Guo Yuyan; Shi Yuerong; Guo Jun; Zhao Xuexia; Zhao Jingjing


Archive | 2015

Proxy re-encryption method and system on basis of certificate conditions

Li Jiguo; Zhao Xuexia; Zhang Yichen; Lu Yang; Wang Yao; Li Lei; Sha Fengjie; Yao Wei; Lin Xiaonan; Zhang Quanling; Wang Haiping; Zhao Jingjing; Guo Jun; Shi Yuerong


Archive | 2015

Certificateless condition based proxy re-encryption system and method

Li Jiguo; Zhao Xuexia; Zhang Yichen


Archive | 2013

Attribute protection based multiple authorization center encryption method

Li Jiguo; Qian Huiling; Zhang Yichen; Teng Meilin


Archive | 2017

Multi-authorization center outsourcing attribute based encryption method and system for keyword search

Li Jiguo; Lin Xiaonan; Zhang Yichen; Li Feifei; Wang Yao

Collaboration


Dive into the Zhang Yichen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge