W
Wei Yao
Researcher at Hohai University
Publications - 7
Citations - 437
Wei Yao is an academic researcher from Hohai University. The author has contributed to research in topics: Encryption & Revocation. The author has an hindex of 4, co-authored 5 publications receiving 300 citations.
Papers
More filters
Journal ArticleDOI
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
TL;DR: This article provides a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system that can withstand collusion attack performed by revoked users cooperating with existing users and proves the security of the scheme under the divisible computation Diffie-Hellman assumption.
Journal ArticleDOI
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage
TL;DR: This work formalizes the definition and security model, which model collusion attack executed by the existing users cooperating with the revoked users, and presents a user collusion avoidance ciphertext-policy ABE scheme with efficient attribute revocation for the cloud storage system.
Journal Article
Provably Secure Certificate-based Conditional Proxy Re-encryption.
TL;DR: This paper proposes the formal definition and security model of certificate-based conditional proxy re-encryption, a new cryptography primitive in which only those ciphertexts satisfying one condition set by the delegator can be re-encrypted correctly by the proxy.
Patent
Ciphertext poly attribute base encryption method having efficient attribute revocation capability
Li Jiguo,Wei Yao,Zhang Yichen +2 more
TL;DR: In this article, a ciphertext poly attribute base encryption method with an efficient attribute revocation capability has been proposed, which has the advantages of less users related in the revocation process, small revocation cost, high revocation efficiency and the like.
Journal ArticleDOI
A New Efficient Certificate-Based Signature Scheme
TL;DR: Under the strong security model of certificatebased signature scheme, it is proved that the scheme is existentially unforgeable against adaptive chosen message and identity attacks in the random oracle.