REVOCABLE

作品数:16被引量:26H指数:3
导出分析报告
相关领域:自动化与计算机技术更多>>
相关机构:电子科技大学更多>>
相关期刊:《Computer Systems Science & Engineering》《China Communications》《Science China(Information Sciences)》《Tsinghua Science and Technology》更多>>
相关基金:国家自然科学基金高等学校学科创新引智计划国家重点基础研究发展计划北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Revocable and verifable weighted attribute-based encryption with collaborative access for electronic health record in cloud
《Cybersecurity》2025年第1期189-207,共19页Ximing Li Hao Wang Sha Ma Meiyan Xiao Qiong Huang 
supported in part by the National Natural Science Foundation of China under Grant 61872409,Grant 61872152 and Grant 62272174;in part by Guangdong Basic and Applied Basic Research Foundation under Grant 2020A1515010751;in part by the Guangdong Major Project of Basic and Applied Basic Research under Grant 2019B030302008;in part by the Science and Technology Program of Guangzhou under Grant 201902010081;in part by Guangdong Basic and Applied Basic Research Foundation under Grant 2023A1515011194.
The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers.Attribute-based encryption(ABE)scheme is considered a powerful encr...
关键词:Revocable attribute-based encryption Data verifcation Collaborative access Electronic health record 
Supervised and revocable decentralized identity privacy protection scheme
《Security and Safety》2024年第4期113-135,共23页Jing He Xiaofeng Ma Dawei Zhang Feng Peng 
supported by the National Key Research and Development Program of China. Research on Reliable Regulatory Technology Based on Blockchain of Regional Equity Market (2021YFC3340600)
Decentralized identity represents an innovative approach based on blockchain to achieve efective identity management. This method utilizes decentralized identifiers and verifiable credentials to enable trusted authent...
关键词:Blockchain Decentralized identity Privacy protection SUPERVISION Anonymous credential Zero-knowledge proof 
An Updatable and Revocable Decentralized Identity Management Scheme Based on Blockchain
《国际计算机前沿大会会议论文集》2023年第1期372-388,共17页Zhiping Wang Meijiao Duan Maoning Wang 
We study the decentralized identity management mechanism based on blockchain.Finally,we propose an updatable and revocable decentralized identity management scheme DIURS.In the scheme,we construct the DID management t...
关键词:Blockchain decentralized identity Chameleon hash function DID management tree 
Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption
《Computer Systems Science & Engineering》2022年第12期985-996,共12页S.Saravanakumar S.Chitra 
Cloud storage is a service involving cloud service providers providingstorage space to customers. Cloud storage services have numerous advantages,including convenience, high computation, and capacity, thereby attracti...
关键词:Cloud computing storage identification based revocation attribute based access control encryption DECRYPTION 
Revocable and certificateless public auditing for cloud storage被引量:1
《Science China(Information Sciences)》2020年第10期278-280,共3页Yinghui ZHANG Tiantian ZHANG Shengmin XU Guowen XU Dong ZHENG 
supported by the National Key R&D Program of China(Grant No.2017YFB0802000);the National Natural Science Foundation of China(Grant Nos.61671377,61772418,61602378,61802303);the Key Research and Development Program of Shaanxi(Grant No.2019KW-053);Guangxi Cooperative Innovation Center of Cloud Computing and Big Data(Grant No.YD1903);Sichuan Science and Technology Program(Grant No.2017GZDZX0002)。
Dear editor,Plenty of computing and storage resources in the cloud are provided for users with restricted computing and storage resources,which has attracted the attention of many researchers[1,2].A generic blockchain...
关键词:EDITOR computing CLOUD 
General construction of revocable identity-based fully homomorphic signature
《Science China(Information Sciences)》2020年第3期234-236,共3页Congge XIE Jian WENG Wei LU Lin HOU 
supported by National Key R&D Plan of China (Grant No. 2017YFB0802203);National Natural Science Foundation of China (Grant Nos. U1736203, 61732021, 61472165, 61373158);Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defence (Grant No. 2014B090904067);Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve (Grant No. 2016B010124009);Zhuhai Top Discipline-Information Security;Guangzhou Key Laboratory of Data Security and Privacy Preserving;Guangdong Key Laboratory of Data Security and Privacy Preserving;National Joint Engineering Research Center of Network Security Detection and Protection Technology
Dear editor,Fully homomorphic signature(FHS)is a cryptographic primitive and allows anyone to conduct any computations over signatures and generate a signature which,when verified,matches the calculated value of the c...
关键词:SIGNATURE CENTERS COMPANIES 
Space efficient revocable IBE for mobile devices in cloud computing被引量:5
《Science China(Information Sciences)》2020年第3期243-245,共3页Baodong QIN Ximeng LIU Zhuo WEI Dong ZHENG 
supported by National Natural Science Foundation of China (Grant No. 61502400, 61702105);Foundation of Sichuan Educational Committee (Grant No. 16ZB0140);National Joint Fund of China (Grant No. U1636209)
.Dear editor,Revocation capacity is one of the main properties for an identity-based encryption(IBE),as in practice users’private keys are possibly leaked or expired.However,existing revocable IBE schemes[1–3]usuall...
关键词:SERVER COMPUTING OVERCOME 
Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size被引量:1
《Chinese Journal of Electronics》2019年第4期690-697,共8页JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei 
supported by the the National Basic Research Program of China(973 Program)(No.2012CB315901);the National Natural Science Foundation of China(No.61373006)
In a revocable broadcast encryption scheme,the group manager can flexibly set revoked users who cannot decrypt the ciphertext.Many applications of the revocable broadcast encryption have been found in the secure cloud...
关键词:CRYPTOGRAPHIC ACCUMULATOR BROADCAST ENCRYPTION REVOCABLE Dual system ENCRYPTION Cloud data sharing 
Revocable Hierarchical Identity-Based Broadcast Encryption
《Tsinghua Science and Technology》2018年第5期539-549,共11页Dawei Li Jianwei Liu Zongyang Zhang Qianhong Wu Weiran Liu 
supported by the National Key Research and Development Program of China (No. 2017YFB0802502);the National Natural Science Foundation of China (Nos. 61672083, 61370190, 61532021, 61472429, 61402029, 61702028, and 61571024);the National Cryptography Development Fund (No. MMJJ20170106);the Planning Fund Project of Ministry of Education (No. 12YJAZH136);the Beijing Natural Science Foundation (No. 4132056);the Fund of the State Key Laboratory of Information Security, the Institute of Information Engineering, and the Chinese Academy of Sciences (No. 2017-MS-02)
Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any subset of us...
关键词:Revocable Hierarchical Identity-Based Broadcast Encryption (RHIBBE) REVOCATION provable security 
A New Revocable and Re-Delegable Proxy Signature and Its Application被引量:2
《Journal of Computer Science & Technology》2018年第2期380-399,共20页Shengmin Xu Guomin Yang Yi Mu 
With the popularity of cloud computing and mobile Apps, on-demand services such as on-line music or audio streaming and vehicle booking are widely available nowadays. In order to allow efficient delivery and managemen...
关键词:REVOCATION (re)delegation proxy signature 
检索报告 对象比较 聚类工具 使用帮助 返回顶部