L
Libing Wu
Researcher at Wuhan University
Publications - 100
Citations - 2215
Libing Wu is an academic researcher from Wuhan University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 20, co-authored 73 publications receiving 1246 citations. Previous affiliations of Libing Wu include Anhui University & Guilin University of Electronic Technology.
Papers
More filters
Journal ArticleDOI
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
TL;DR: A security analysis of the proposed CLPA scheme shows that it is provably secure against two types of adversaries (i.e., a type-I adversary can replace users' public keys, and atype-II adversary can access the master key) in an environment of certificateless cryptography.
Journal ArticleDOI
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure
TL;DR: Using blockchain, this article introduces a blockchain-based mutual authentication and key agreement protocol that can support efficient conditional anonymity and key management, without the need for other complex cryptographic primitives.
Journal ArticleDOI
Cloud-Assisted Safety Message Dissemination in VANET–Cellular Heterogeneous Wireless Network
TL;DR: A novel Cloud-assisted Message Downlink dissemination Scheme (CMDS), with which the safety messages in the cloud server are first delivered to the suitable mobile gateways on relevant roads with the help of cloud computing, and then being disseminated among neighboring vehicles via vehicle-to-vehicle (V2V) communication.
Journal ArticleDOI
Secure Key Agreement and Key Protection for Mobile Device User Authentication
TL;DR: This paper considers the special case that only two devices at the user’s side jointly perform user authentication with a server, and neither device can successfully complete the authentication process alone and analyzes the security of the proposed protocol, which satisfies all known security requirements in practical applications, particularly the key exposure attack resistance.
Journal ArticleDOI
Efficient and secure identity-based encryption scheme with equality test in cloud computing
TL;DR: This paper proposes an efficient IBEET scheme with bilinear pairing, which reduces the need for time-consuming HashToPoint function and proves the security of the scheme for one-way secure against chosen identity and chosen ciphertext attacks (OWIDCCA) in the random oracle model (ROM).