CIPHERTEXT

作品数:48被引量:86H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:董庆宽陈丹陈原更多>>
相关机构:西安电子科技大学南京航空航天大学电子科技大学更多>>
相关期刊:《Opto-Electronic Advances》《Journal of Information Security》《Computer Systems Science & Engineering》《China Communications》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Journal of Shanghai Jiaotong university(Science)x
条 记 录,以下是1-5
视图:
排序:
Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud
《Journal of Shanghai Jiaotong university(Science)》2018年第5期666-670,共5页SUMang WANG Liangchen FUAnmin YU Yan 
the National Natural Science Foundation of China(Nos.61702266 and 61572255);the Natural Science Foundation of Jiangsu Province(Nos.BK20150787 and BK20141404)
Cloud computing provides a wide platform for information sharing. Users can access data and retrieve service easily and quickly. Generally, the data in cloud are transferred with encrypted form to protect the informat...
关键词:proxy re-encryption (PRE) access control multi-factor cipher text cloud computing 
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model被引量:1
《Journal of Shanghai Jiaotong university(Science)》2011年第6期672-676,共5页孙瑾 胡予濮 张乐友 
the National Natural Science Foundation of China (No.60970119);the National Basic Research Program (973) of China (No.2007CB311201)
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chos...
关键词:the standard model provably secure broadcast encryption the chosen ciphertext security the self-adaptive chosen identity security 
An Identity-Based Encryption Scheme with Compact Ciphertexts
《Journal of Shanghai Jiaotong university(Science)》2009年第1期86-89,共4页刘胜利 郭宝安 张庆胜 
the National Natural Science Foundation of China(Nos.60673077,60873229)
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key s...
关键词:identity-based encryption compact ciphertext ehosen-ciphertext attack (CCA) 
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
《Journal of Shanghai Jiaotong university(Science)》2009年第1期90-93,共4页路献辉 来学嘉 何大可 
the National Natural Science Foundation of China(Nos.60573032,60773092,90604036)
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a...
关键词:public key encryption adaptive chosen ciphertext security intractable vroblem 
Chosen Ciphertext Secure Fuzzy Identity Based Encryption without ROM
《Journal of Shanghai Jiaotong university(Science)》2008年第6期646-650,共5页方黎明 王建东 任勇军 夏金月 卞仕柱 
the National High Technology Research and Development Program (863) of China(No. 2006AA12A106)
Two new constructions of chosen-ciphertext secure fuzzy identity-based encryption (fuzzy-IBE) schemes without random oracle are proposed. The first scheme combines the modification of chosen-plaintext secure Sahai a...
关键词:fuzzy identity based encryption (fuzzy-IBE) chosen-ciphertext security standard model 
检索报告 对象比较 聚类工具 使用帮助 返回顶部