Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhengping Jin is active.

Publication


Featured researches published by Zhengping Jin.


Journal of Medical Systems | 2014

A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems

Xin Xu; Ping Zhu; Qiao-Yan Wen; Zhengping Jin; Hua Zhang; Lian He

In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients’ privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.


IEEE Transactions on Parallel and Distributed Systems | 2016

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

Jie Xu; Qiao-Yan Wen; Wenmin Li; Zhengping Jin

In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data. Users with limited computing power are however more likely to delegate the mask of the decryption task to the cloud servers to reduce the computing cost. As a result, attribute-based encryption with delegation emerges. Still, there are caveats and questions remaining in the previous relevant works. For instance, during the delegation, the cloud servers could tamper or replace the delegated ciphertext and respond a forged computing result with malicious intent. They may also cheat the eligible users by responding them that they are ineligible for the purpose of cost saving. Furthermore, during the encryption, the access policies may not be flexible enough as well. Since policy for general circuits enables to achieve the strongest form of access control, a construction for realizing circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation has been considered in our work. In such a system, combined with verifiable computation and encrypt-then-mac mechanism, the data confidentiality, the fine-grained access control and the correctness of the delegated computing results are well guaranteed at the same time. Besides, our scheme achieves security against chosen-plaintext attacks under the k-multilinear Decisional Diffie-Hellman assumption. Moreover, an extensive simulation campaign confirms the feasibility and efficiency of the proposed solution.


Journal of Medical Systems | 2014

Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems

Xuelei Li; Qiao-Yan Wen; Wenmin Li; Hua Zhang; Zhengping Jin

Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient’s medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.


Frontiers of Computer Science in China | 2015

An anonymous and efficient remote biometrics user authentication scheme in a multi server environment

Peng Jiang; Qiao-Yan Wen; Wenmin Li; Zhengping Jin; Hua Zhang

As service demands rise and expand single-server user authentication has become unable to satisfy actual application demand. At the same time identity and password based authentication schemes are no longer adequate because of the insecurity of user identity and password. As a result biometric user authentication has emerged as a more reliable and attractive method. However, existing biometric authentication schemes are vulnerable to some common attacks and provide no security proof, some of these biometric schemes are also either inefficient or lack sufficient concern for privacy. In this paper, we propose an anonymous and efficient remote biometric user authentication scheme for a multi-server architecture with provable security. Through theoretical mathematic deduction, simulation implementation, and comparison with related work, we demonstrate that our approach can remove the aforementioned weaknesses and is well suited for a multi-server environment.


Frontiers of Computer Science in China | 2013

A novel pairing-free certificateless authenticated key agreement protocol with provable security

Haiyan Sun; Qiao-Yan Wen; Hua Zhang; Zhengping Jin

Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secure in the extended Canetti-Krawczyk (eCK) model. By giving concrete attacks, we indicate that their protocol is not secure in the eCK model. We propose an improved protocol and show our improvement is secure in the eCK model under the gap Diffie-Hellman (GDH) assumption. Furthermore, the proposed protocol is very efficient.


International Journal of Network Management | 2013

An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks

Xuelei Li; Qiao-Yan Wen; Hua Zhang; Zhengping Jin

SUMMARY In this paper, we cryptanalyze Rhee et al.s ‘Remote user authentication scheme without using smart cards’, and prove that their scheme is not completely secure against user impersonation attack. The security flaw is caused by mathematical homomorphism of the registration information. In addition, their scheme lacks key agreement procedures for generating the session key to encrypt the communication messages after mutual authentication. Furthermore, a modification is proposed to improve the security, practicability and robustness of such scheme. Firstly, we introduce elliptic curve cryptosystem to enhance the security. Secondly, in order to improve the practicability, our improvement is much more easily implemented using portable devices in global mobility networks; moreover, a synchronized clock system, traditional password table or ancillary equipment are not required in our improvement. Finally, the proposed scheme not only achieves mutual authentication, but also provides the procedure for key agreement and update of secrets for users and servers to increase the robustness. Copyright


Journal of Medical Systems | 2013

An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems

Rui Guo; Qiao-Yan Wen; Huixian Shi; Zhengping Jin; Hua Zhang

Telecare Medicine Information Systems (TMIS) promote the traditional medical and healthcare services by information and communication technology. Since the physician and caregiver can monitor the patient’s physiological condition remotely in TMIS, the confidentiality of this sensitive data should be protected, which is the key issue in the Health Insurance Portability and Accountability Act. In this paper, we propose an efficient certificateless public key encryption scheme without bilinear pairing for TMIS. Our proposal is proved to be secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem. Moreover, after modifying the original model of the certificateless encryption, this scheme achieves Girault’s trust level 3. Compared with the related protocols, the perform evaluations show that our scheme is more efficient and appropriate to collocate with low power mobile devices for TMIS.


Security and Communication Networks | 2015

A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption

Haiyan Sun; Qiao-Yan Wen; Hua Zhang; Zhengping Jin

Among the existing identity-based authenticated key agreement ID-AKA protocols, there are only a few of them that can resist to leakage of ephemeral secret keys, which is about the protection of the session secret key after the ephemeral secret keys of users are compromised. However, all these ID-AKA protocols with leakage of ephemeral secret keys resistance require expensive bilinear pairing operations. In this paper, we present a pairing-free ID-AKA protocol with ephemeral secrets leakage resistance. We also provide a full proof of its security in the extended Canetti-Krawczyk model, which not only can capture resistance to leakage of ephemeral secret keys but also can capture other basic security properties such as master key forward security and key compromise impersonation resistance. Compared with the existing ID-AKA protocols, our scheme is a good trade-off between security and efficiency. Copyright


Journal of Medical Systems | 2015

An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems

Dianli Guo; Qiao-Yan Wen; Wenmin Li; Hua Zhang; Zhengping Jin

Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients’ privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.’s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed sche-me through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.


Mathematical Problems in Engineering | 2014

Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things

Rui Guo; Qiao-Yan Wen; Huixian Shi; Zhengping Jin; Hua Zhang

Certificateless cryptography aims at combining the advantages of public key cryptography and identity based cryptography to avoid the certificate management and the key escrow problem. In this paper, we present a novel certificateless public key encryption scheme on the elliptic curve over the ring, whose security is based on the hardness assumption of Bilinear Diffie-Hellman problem and factoring the large number as in an RSA protocol. Moreover, since our scheme requires only one pairing operation in decryption, it is significantly more efficient than other related schemes. In addition, based on our encryption system, we also propose a protocol to protect the confidentiality and integrity of information in the scenario of Internet of Things with constrained resource nodes.

Collaboration


Dive into the Zhengping Jin's collaboration.

Top Co-Authors

Avatar

Qiao-Yan Wen

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Hua Zhang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Wenmin Li

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Dianli Guo

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Haiyan Sun

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xiuhua Lu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xuelei Li

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Licheng Wang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Qiaoyan Wen

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Wei Yin

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge