基本情况
吕克伟,中国科学院研究生院副教授。
研究领域
可证明安全、算法设计与分析、计算复杂性、安全多方协议
论文发表
-
On the k(GV)-problem with cyclic Sylow 2-subgroups,
Algebra Colloq, Vol.9 (2002) No.2
-
Some results on p-blocks of defect zero,
Chinese J. Contemporary. Math. , 2002, Vol 23, No. 4
-
Adaptively Secure Distributed Key
Generation Against General Adversary without Erasure. Journal of Software
(China), Vol. 16 (3), 2005, pp. 453-461
-
Revised Fischlin's (Blind) Signature
Schemes. Proceedings of 2005 International Conference on Computational
Intelligence and Security, Springer Verlag, LNCS 3802, 2005, pp. 96-103
-
On the Hidden Number Problem over any
Finite Fields of Large Characteristics, Proceedings of 2005 SKLOIS Conference
on Information Security and Cryptology, Higher Education Press
-
RSA Verifiable Signature Sharing Scheme
Based on Secure Distributed Key Generations,Journal of Software
(China), Vol. 18(1), 2007, pp.168-176
-
Security Analysis of Poker-Resembled
Protocol Based on Hidden Number Problem, IEEE CSO DMAA Workshop 2009
-
A New Hard-Core Predicate of Paillier's
Trapdoor Function, Progress in Cryptology - INDOCRYPT 2009, Roy, Bimal;
Sendrier, Nicolas (Eds.): LNCS 5922, pp. 263--271, Springer Verlag, Heidelberg, 2009
-
A Paillier Based Threshold Signature Scheme,
Proceedings of 2009 2nd International Conference on Computer Science and Its
Applications, IEEE, pp.29-34, 2009
-
Verifiable Signature Sharing Scheme Based
on Strong RSA Assumption, INFOCOMP Journal of Computer Science, v.8, n.3
(2009), pp. 49-56
-
Hidden Number Problem with Paillier Modulus
and Its Application to the Bit Security of Rabin-Paillier Trapdoor Function, The
7th China Conference on Information and Communications Security_CCICS’2010, Science
Press and Science Press USA Inc., pp.162-173, 2010
-
OU Trapdoor Function Hides up to O(n) Bits,
Proceeding of the 2010 IRAST International Congress on Computer Applications
and Computer Science, Singapore, December, pp.727-730, IRAST, 2010
-
Stronger Security Proofs for Modular
Exponentiation, Proceeding of the 2010 IRAST International Congress on Computer
Applications and Computer Science, Singapore, December, pp.214-217, IRAST, 2010