Jinyong CHANG


On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme
Yanyan JI Jinyong CHANG Honglong DAI Maozhi XU 
Publication:   
Publication Date: 2018/12/01
Vol. E101-A  No. 12  pp. 2477-2480
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
network coding signaturesignature schemerelated-key attack
 Summary | Full Text:PDF(161.5KB)

The KDM-CCA Security of the Kurosawa-Desmedt Scheme
Jinyong CHANG Rui XUE Anling ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/04/01
Vol. E98-A  No. 4  pp. 1032-1037
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
key-dependent messageKurosawa-Desmedt schemechosen ciphertext attackdecisional Diffie-Hellman assumption
 Summary | Full Text:PDF(129.6KB)

Multi-Use Unidirectional Proxy Re-Signatures of Constant Size without Random Oracles
Fei TANG Hongda LI Jinyong CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/03/01
Vol. E98-A  No. 3  pp. 898-905
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
multi-hop proxy re-signaturesunidirectionalityindistinguishability obfuscation
 Summary | Full Text:PDF(140.9KB)

Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps
Fei TANG Hongda LI Jinyong CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/02/01
Vol. E98-A  No. 2  pp. 762-766
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
proxy re-encryptionmulti-hopmultilinear maps
 Summary | Full Text:PDF(91.9KB)

On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack
Jinyong CHANG Rui XUE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/11/01
Vol. E97-A  No. 11  pp. 2267-2271
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
key-dependent messagepublic key encryptionnonadaptive chosen ciphertext attackDamgård's ElGamal scheme
 Summary | Full Text:PDF(110.2KB)