supported in part by the National Natural Science Foundation of China under Grant 61872409,Grant 61872152 and Grant 62272174;in part by Guangdong Basic and Applied Basic Research Foundation under Grant 2020A1515010751;in part by the Guangdong Major Project of Basic and Applied Basic Research under Grant 2019B030302008;in part by the Science and Technology Program of Guangzhou under Grant 201902010081;in part by Guangdong Basic and Applied Basic Research Foundation under Grant 2023A1515011194.
The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers.Attribute-based encryption(ABE)scheme is considered a powerful encr...
supported by the National Key Research and Development Program of China. Research on Reliable Regulatory Technology Based on Blockchain of Regional Equity Market (2021YFC3340600)
Decentralized identity represents an innovative approach based on blockchain to achieve efective identity management. This method utilizes decentralized identifiers and verifiable credentials to enable trusted authent...
We study the decentralized identity management mechanism based on blockchain.Finally,we propose an updatable and revocable decentralized identity management scheme DIURS.In the scheme,we construct the DID management t...
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti...
supported by the National Key R&D Program of China(Grant No.2017YFB0802000);the National Natural Science Foundation of China(Grant Nos.61671377,61772418,61602378,61802303);the Key Research and Development Program of Shaanxi(Grant No.2019KW-053);Guangxi Cooperative Innovation Center of Cloud Computing and Big Data(Grant No.YD1903);Sichuan Science and Technology Program(Grant No.2017GZDZX0002)。
Dear editor,Plenty of computing and storage resources in the cloud are provided for users with restricted computing and storage resources,which has attracted the attention of many researchers[1,2].A generic blockchain...
supported by National Key R&D Plan of China (Grant No. 2017YFB0802203);National Natural Science Foundation of China (Grant Nos. U1736203, 61732021, 61472165, 61373158);Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defence (Grant No. 2014B090904067);Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve (Grant No. 2016B010124009);Zhuhai Top Discipline-Information Security;Guangzhou Key Laboratory of Data Security and Privacy Preserving;Guangdong Key Laboratory of Data Security and Privacy Preserving;National Joint Engineering Research Center of Network Security Detection and Protection Technology
Dear editor,Fully homomorphic signature(FHS)is a cryptographic primitive and allows anyone to conduct any computations over signatures and generate a signature which,when verified,matches the calculated value of the c...
supported by National Natural Science Foundation of China (Grant No. 61502400, 61702105);Foundation of Sichuan Educational Committee (Grant No. 16ZB0140);National Joint Fund of China (Grant No. U1636209)
.Dear editor,Revocation capacity is one of the main properties for an identity-based encryption(IBE),as in practice users’private keys are possibly leaked or expired.However,existing revocable IBE schemes[1–3]usuall...
supported by the the National Basic Research Program of China(973 Program)(No.2012CB315901);the National Natural Science Foundation of China(No.61373006)
In a revocable broadcast encryption scheme,the group manager can flexibly set revoked users who cannot decrypt the ciphertext.Many applications of the revocable broadcast encryption have been found in the secure cloud...
supported by the National Key Research and Development Program of China (No. 2017YFB0802502);the National Natural Science Foundation of China (Nos. 61672083, 61370190, 61532021, 61472429, 61402029, 61702028, and 61571024);the National Cryptography Development Fund (No. MMJJ20170106);the Planning Fund Project of Ministry of Education (No. 12YJAZH136);the Beijing Natural Science Foundation (No. 4132056);the Fund of the State Key Laboratory of Information Security, the Institute of Information Engineering, and the Chinese Academy of Sciences (No. 2017-MS-02)
Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of us...
With the popularity of cloud computing and mobile Apps, on-demand services such as on-line music or audio streaming and vehicle booking are widely available nowadays. In order to allow efficient delivery and managemen...