scispace - formally typeset
L

Libing Wu

Researcher at Wuhan University

Publications -  100
Citations -  2215

Libing Wu is an academic researcher from Wuhan University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 20, co-authored 73 publications receiving 1246 citations. Previous affiliations of Libing Wu include Anhui University & Guilin University of Electronic Technology.

Papers
More filters
Journal ArticleDOI

Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks

TL;DR: A security analysis of the proposed CLPA scheme shows that it is provably secure against two types of adversaries (i.e., a type-I adversary can replace users' public keys, and atype-II adversary can access the master key) in an environment of certificateless cryptography.
Journal ArticleDOI

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure

TL;DR: Using blockchain, this article introduces a blockchain-based mutual authentication and key agreement protocol that can support efficient conditional anonymity and key management, without the need for other complex cryptographic primitives.
Journal ArticleDOI

Cloud-Assisted Safety Message Dissemination in VANET–Cellular Heterogeneous Wireless Network

TL;DR: A novel Cloud-assisted Message Downlink dissemination Scheme (CMDS), with which the safety messages in the cloud server are first delivered to the suitable mobile gateways on relevant roads with the help of cloud computing, and then being disseminated among neighboring vehicles via vehicle-to-vehicle (V2V) communication.
Journal ArticleDOI

Secure Key Agreement and Key Protection for Mobile Device User Authentication

TL;DR: This paper considers the special case that only two devices at the user’s side jointly perform user authentication with a server, and neither device can successfully complete the authentication process alone and analyzes the security of the proposed protocol, which satisfies all known security requirements in practical applications, particularly the key exposure attack resistance.
Journal ArticleDOI

Efficient and secure identity-based encryption scheme with equality test in cloud computing

TL;DR: This paper proposes an efficient IBEET scheme with bilinear pairing, which reduces the need for time-consuming HashToPoint function and proves the security of the scheme for one-way secure against chosen identity and chosen ciphertext attacks (OWIDCCA) in the random oracle model (ROM).