CIPHERTEXT

作品数:47被引量:85H指数:5
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:董庆宽陈丹陈原更多>>
相关机构:西安电子科技大学南京航空航天大学电子科技大学更多>>
相关期刊:《Opto-Electronic Advances》《Journal of Information Security》《Computer Systems Science & Engineering》《China Communications》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext
《Frontiers of Computer Science》2025年第2期133-135,共3页Lejun ZHANG Bo ZHANG Ran GUO Zhujun WANG Guopeng WANG Jing QIU Shen SU Yuan LIU Guangxia XU Zhihong TIAN Sergey GATAULLIN 
sponsored by the National Natural Science Foundation of China(Grant Nos.62302114,62172353 and U20B2046);the Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education(Nos.1331007,1311022);the Natural Science Foundation of Guangdong Province(No.2024A1515010177).
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information leakage.However,distribu...
关键词:communication TABLES networks 
Witness encryption with updatable ciphertexts
《Science China(Information Sciences)》2025年第3期177-192,共16页Yuzhu WANG Mingwu ZHANG 
supported in part by National Natural Science Foundation of China(Grant Nos.62072134,62472150,U2001205);Major Research Plan of Hubei Province(Grant No.2023BAA027);Key Research and Development Program of Hubei Province(Grant No.2021BEA163)。
Witness encryption(WE)is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance.Anyone who possesses a solution to this instance(i.e.,a witness)can then recover the message f...
关键词:witness encryption NP relation updatable ciphertext access control indistinguishable obfuscation 
Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System
《Computer Modeling in Engineering & Sciences》2024年第6期3287-3310,共24页Yanzhong Sun Xiaoni Du Shufen Niu Xiaodong Yang 
supported by the National Natural Science Foundation of China(Nos.62172337,62241207);Key Project of GansuNatural Science Foundation(No.23JRRA685).
Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectio...
关键词:Cloud email system authenticated searchable encryption blockchain-based designated server test multi-trapdoor privacy multi-ciphertext indistinguishability 
Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
《The Journal of China Universities of Posts and Telecommunications》2023年第5期51-60,共10页Meng Hui Ren Lina Zhao Zongqu 
supported by the Henan Key Laboratory of Network Cryptography Technology(LNCT2022-A11);the Shaanxi Key Laboratory of Information Communication Network and Security(ICNS202006)。
Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-base...
关键词:proxy re-encryption(PRE) learning with errors over ring(RLWE) chosen-ciphertext attack(CCA) ciphertext delegation ciphertext evolution 
Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
《Computer Systems Science & Engineering》2023年第7期1079-1092,共14页P.Prathap Nayudu Krovi Raja Sekhar 
The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t...
关键词:Cloud computing access policy CP-ABE hash code SHA-512 ATTRIBUTE CIPHERTEXT encryption DECRYPTION 
An Improved Pairing-Free Ciphertext Policy Framework for IoT
《Computer Systems Science & Engineering》2023年第6期3079-3095,共17页M.Amirthavalli S.Chithra R.Yugha 
Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confident...
关键词:Internet of things access control cipher policy based-attribute based encryption(CP-ABE) access matrix performance analysis 
Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems被引量:1
《Intelligent Automation & Soft Computing》2023年第6期3725-3742,共18页Byeori Kim Minseong Choi Taek-Young Youn Jeong Hyun Yi Haehyun Cho 
This work was supported in part by the Mid-Career Researcher and Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Science and ICT(MSIT);Future Planning under Grant NRF2020R1A2C2014336 and Grant NRF2021R1F1A105611511.
Recently,there has been a sudden shift from using traditional office applications to the collaborative cloud-based office suite such as Microsoft Office 365.Such cloud-based systems allow users to work together on the...
关键词:Cloud collaboration mode of operation auditability of ciphertext 
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
《Computers, Materials & Continua》2023年第2期4059-4079,共21页Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 
the Researchers Supporting Program(TUMAProject-2021-27)Almaarefa University,Riyadh,Saudi Arabia.
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve...
关键词:Symmetric CRYPTOGRAPHY CIPHERTEXT encryption DECRYPTION cloud security matrix cipher 
Research and design of CRT-based homomorphic ciphertext database system
《High-Confidence Computing》2022年第4期1-7,共7页De Zhao Zhenzhen Li Haiyang Ding Zhenzhen Zhang Zichen Li 
supported by National Natural Science Foundation of China(61370188,61732021);Beijing Municipal Education Commission Scientific Research Project(KM202010015009,KM202110015004);Beijing Institute of Graphic Communication Doctoral Funding Project(27170120003/020,27170122006);The BIGC Project(Ec202201);Beijing Institute of Graphic Communication Research Innovation Team Project(Eb202101);Intramural Discipline Construction Project of Beijing Institute of Graphic Communication(21090121021);Key Educational Reform Project of Beijing Institute of Graphic Communication(22150121033/009).
The cloud’s storage and query of private information have the cryptographic scholar due to the proliferation of cloud computing.In the traditional query mode,the private information stored in the cloud is at risk of ...
关键词:Ciphertext database Homomorphic encryption Chinese remainder theorem 
A survey on cryptographic techniques for protecting big data security:present and forthcoming被引量:5
《Science China(Information Sciences)》2022年第10期69-102,共34页Siqi LU Jianhua ZHENG Zhenfu CAO Yongjuan WANG Chunxiang GU 
supported by National Key Research and Development Project(Grant No.2020YFA0712300);National Natural Science Foundation of China(Grants Nos.61772548,61632012);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-17-001);Peng Cheng Laboratory Project of Guangdong Province(Grant No.PCL2018KP004)。
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world.As they significantly create economic and social value,big data meaningfully impact t...
关键词:big data security cryptographic techniques ciphertext-based data sharing and computing authenticated encryption functional encryption homomorphic encryption secure multi-party computing 
检索报告 对象比较 聚类工具 使用帮助 返回顶部