Zhangjie Huang
Chinese Academy of Sciences
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Zhangjie Huang.
Designs, Codes and Cryptography | 2017
Liqiang Peng; Lei Hu; Yao Lu; Jun Xu; Zhangjie Huang
In 2007, Sun et al. (IEEE Trans Inf Theory 53(8):2922–2933, 2007) presented new variants of RSA, called Dual RSA, whose key generation algorithm outputs two distinct RSA moduli having the same public and private exponents, with an advantage of reducing storage requirements for keys. These variants can be used in some applications like blind signatures and authentication/secrecy. In this paper, we give an improved analysis on Dual RSA and obtain that when the private exponent is smaller than
international conference on progress in cryptology | 2015
Liqiang Peng; Lei Hu; Yao Lu; Santanu Sarkar; Jun Xu; Zhangjie Huang
international conference on cryptology in africa | 2014
Liqiang Peng; Lei Hu; Jun Xu; Zhangjie Huang; Yonghong Xie
N^{0.368}
applied cryptography and network security | 2014
Zhangjie Huang; Lei Hu; Jun Xu; Liqiang Peng; Yonghong Xie
international conference on information security and cryptology | 2014
Zhangjie Huang; Lei Hu; Jun Xu
N0.368, the Dual RSA can be broken, where N is an integer with the same bitlength as the modulus of Dual RSA. The point of our work is based on the observation that we can split the private exponent into two much smaller unknown variables and solve a related modular equation on the two unknown variables and other auxiliary variables by making use of lattice based methods. Moreover, we extend this method to analyze the common private exponent RSA scheme, a variant of Dual RSA, and obtain a better bound than previous analyses. While our analyses cannot be proven to work in general, since we rely on some unproven assumptions, our experimental results have shown they work in practice.
information security practice and experience | 2014
Jun Xu; Lei Hu; Zhangjie Huang; Liqiang Peng
In this paper, we analyze the security of two variants of the RSA public key cryptosystem where multiple encryption and decryption exponents are used with a common modulus. For the most well known variant, CRT-RSA, assume that n encryption and decryption exponents
international conference on information security | 2016
Jun Xu; Lei Hu; Santanu Sarkar; Xiaona Zhang; Zhangjie Huang; Liqiang Peng
international workshop on security | 2015
Liqiang Peng; Lei Hu; Yao Lu; Zhangjie Huang; Jun Xu
e_l,d_{p_l},d_{q_l}
international conference on information security | 2015
Liqiang Peng; Lei Hu; Zhangjie Huang; Jun Xu
Designs, Codes and Cryptography | 2018
Jun Xu; Santanu Sarkar; Lei Hu; Zhangjie Huang; Liqiang Peng
el,dpl,dql, where