检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Fei Chen Yiliang Han Di Jiang Xiaoce Li Xiaoyuan Yang
机构地区:[1]Department of Electronic Technology,Engineering University of CAPF,Xi’an710086,China [2]College of Information Science and Technology,Northwest University,Xi’an710127,China
出 处:《国际计算机前沿大会会议论文集》2016年第1期136-138,共3页International Conference of Pioneering Computer Scientists, Engineers and Educators(ICPCSEE)
基 金:This work is supported by National Natural Science Foundation of China (61572521, 61272492), Natural Science Basic Research Plan in Shaanxi Province of China (2015JM6353) and Foundation Funding Research Project of Engineering University of Chinese Armed Police Force (WJY201523).
摘 要:In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computation costs than existing similar schemes by utilizing secure outsourcing of scientific computation in cloud computing and eliminates overhead for users, the ciphertext is short, compact, the correctness of transformation algorithm is verifiable. The decrease of ciphertext is 17 %. Additionally, new scheme remits the key escrow problem and is proven selective security in the standard model, it could be verified publicly, applied in mobile devices.
关 键 词:Social computing Public key CRYPTOSYSTEM ATTRIBUTE-BASED SIGNCRYPTION Outsourced computation MULTILINEAR MAPS Selective security
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.63