基本情况

吕克伟,中国科学院研究生院副教授。

 

研究领域

可证明安全、算法设计与分析、计算复杂性、安全多方协议

 

论文发表

  1. On the k(GV)-problem with cyclic Sylow 2-subgroups, Algebra Colloq, Vol.9 (2002) No.2
  2. Some results on p-blocks of defect zero, Chinese J. Contemporary. Math. , 2002, Vol 23, No. 4
  3. Adaptively Secure Distributed Key Generation Against General Adversary without Erasure. Journal of Software (China), Vol. 16 (3), 2005, pp. 453-461
  4. Revised Fischlin's (Blind) Signature Schemes. Proceedings of 2005 International Conference on Computational Intelligence and Security, Springer Verlag, LNCS 3802, 2005, pp. 96-103
  5. On the Hidden Number Problem over any Finite Fields of Large Characteristics, Proceedings of 2005 SKLOIS Conference on Information Security and Cryptology, Higher Education Press
  6. RSA Verifiable Signature Sharing Scheme Based on Secure Distributed Key GenerationsJournal of Software (China), Vol. 18(1), 2007, pp.168-176
  7. Security Analysis of Poker-Resembled Protocol Based on Hidden Number Problem, IEEE CSO DMAA Workshop 2009
  8. A New Hard-Core Predicate of Paillier's Trapdoor Function, Progress in Cryptology - INDOCRYPT 2009, Roy, Bimal; Sendrier, Nicolas (Eds.): LNCS 5922, pp. 263--271, Springer Verlag, Heidelberg, 2009
  9. A Paillier Based Threshold Signature Scheme, Proceedings of 2009 2nd International Conference on Computer Science and Its Applications, IEEE, pp.29-34, 2009
  10. Verifiable Signature Sharing Scheme Based on Strong RSA Assumption, INFOCOMP Journal of Computer Science, v.8, n.3 (2009), pp. 49-56
  11. Hidden Number Problem with Paillier Modulus and Its Application to the Bit Security of Rabin-Paillier Trapdoor Function, The 7th China Conference on Information and Communications Security_CCICS’2010, Science Press and Science Press USA Inc., pp.162-173, 2010
  12. OU Trapdoor Function Hides up to O(n) Bits, Proceeding of the 2010 IRAST International Congress on Computer Applications and Computer Science, Singapore, December, pp.727-730, IRAST, 2010
  13. Stronger Security Proofs for Modular Exponentiation, Proceeding of the 2010 IRAST International Congress on Computer Applications and Computer Science, Singapore, December, pp.214-217, IRAST, 2010