Home >> Events

[A+] [A] [A-]

2017-4-21 Academic reports of Network Security

Type of Event: Academic reports of Network Security

Time: 08:30

Date: 2017-4-21

Venue: 622 meeting room of School of Computer Science, Wenjin Building

Hosted by: School of Computer Science

Schedule of Event:

Schedule of Event:

Title of Lecture 1A secure andobfuscated re-encryption machanism

Time:  8:30-9:30

LecturerProf. Zhang Mingwu

Profile of theLecture

Re-encryption is acryptographic primitive that converts a ciphertext of user A to another of userB. Traditionally, the re-encryption is proceeded by a proxy. However, as itneeds a re-encryption key that might hide the sentitive information such as thesender an/or receiver secret key, then the proxy must be fully trusted. If there-encryption is executed by a untrusted/malicious cloud server, and the cloudserver can trace into the program or monitor the executing, the maliciousserver can obtain the sensitive information during the execution. In this talk,we give a secure and obfuscated re-encryption machanism to run on any maliciousserver while the sensitive information is fully protected even the serverhaving access to the re-encryption program in a white-box manner. The algorithmcan be used in the securely encrypted email delivery systems. 

Profile of the Lecturer

Dr. Mingwu Zhangis now a professor at the School of Computer Sciences in Hubei University ofTechnology. Prior to joining HBUT, supported by Japan Society of the Promptionof Sciences (JSPS), he has been a JSPS postdoctoral fellow at Faculty of Mathematicsin Kyushu University from August 2010 to March 2011. and Institute ofMathematics for Industry in Kyushu University in Japan from April 2011 toAugust 2012 respectively, and also a CSC scholar at School of Computing andInformation Technology in University of Wollongong, Australia from June 2015 toJune 2016. He was an awarded by talent plan of Chuntianscholarship in 2012.


Title of Lecture 2Anonymous authentication protocols formulti-server architectures

Time:  9:30-10:30

Lecturervice Prof. HeDebiao

Profile of the Lecture:

With thedevelopment of computer science and network technology, an increasing number ofInternet services are provided for users. Since the computational resources,transmission and storage capabilities of a single server are very limited; thetraditional single-server environment cannot satisfy the requirements for mostapplications. To improve the performance of systems, the multi-serverenvironment has been widely concerned and applied in many areas. Anonymousauthentication is used to verify the consistency between the real identity andthe claimed identity of users, which is one of the important measures tomaintain the system security and protect user privacy in the multi-serverenvironment. Through the analysis of existing work, we concluded the securityrequirements of systems and divided the anonymity into three levels.Furthermore, we designed a series of anonymous authentication protocols formulti-server environment, which satisfy the different requirements of users interms of performance and security.

Profile of theLecturer

 DebiaoHe received his Ph.D. degree inapplied mathematics from School of Mathematics and Statistics, Wuhan Universityin 2009. He is currently a vice professorof Wuhan University. His main research interests include cryptography andinformation security, in particular, cryptographic protocols. He has published morethan 50 papers in some famous journals, such as IEEE Transactions onInformation Forensics and SecurityIEEE Transactions on  Dependable and Secure ComputingIEEE Transactions on Consumer ElectronicsIEEE Systems JournalIEEE Internet of Things JournalIEEE CommunicationsMagazine and IET Information Security.


Title of Lecture 3A secret sharing scheme based on hyperplanegeometry

Time:  10:30-11:30

Lecturervice Prof. Xia Zhe

Profile of the Lecture

Secret sharing allows the secret to be shared among anumber of parties, so that a quorum of these parties can collaborate to recoverthe secret, but less than a quorum of parties cannot learn any information ofthe secret. The secret sharing based on hyperplane geometry was introduced byBlakley in 1979, but it has not attracted many interests in the literature.Many of its potentials are yet to be investigated. In this talk, we revisit thesecret sharing based on hyperplane geometry, and introduce some of its newproperties and applications. The main contents include: 1) we show thathyperplane geometry is a useful technique to justify the perfect property ofsecret sharing schemes. Based on our results, many existing multi-secretsharing schemes can be shown failing to achieve the perfect property; 2) whendesigning threshold RSA/Paillier encryption using hyperplane geometry, we cancompletely avoid the problem of computing inverse in the group whose order isunknown. Moreover, compared with similar schemes based on polynomialinterpolation, our scheme enjoys better computational efficiency; 3) we showthat secret sharing scheme based on hyperplane geometry can efficiently handleboth (n, t) secret sharing and (n, n) secret sharing. Hence, it could be a veryuseful technique to design proactive secret sharing and compartment secretsharing. The benefit is that the target schemes can be analyzed easier in theUC model.

Profile of the Lecturer

Zhe Xia is currently an Associate Professor in theSchool of Computer Science at Wuhan University of Surrey. He obtained his PhDdegree from University of Surrey (UK) in 2009. After that, he has worked inUniversity of Surrey as a Postdoc Research Fellow, involving in a project ontheory and applications of verifiable voting systems. The research outcome,called the Prêt à Voter voting system, hasbeen successfully used in the Victorian State of Australia in 2014. And this isthe first time across the world that verifiable voting systems have been usedin large scale. In recently years, Zhe Xia has published more than 30 academicpapers in well known journals and conferences, including IEEE Trans. onInformaiton Forensics and Security, IET Information Security, USENIX SecuritySymposium (EVT workshop), ACISP, etc. He has been invited to write a chapterfor the Computer and Information Security Handbook (2nd edition). Zhe Xia hasserved as PC member for many conferences and the Associate Editor for theJournal of Information Security and Application.

Copyright © Shaanxi Normal University