CIPHERTEXT

作品数:48被引量:86H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:董庆宽陈丹陈原更多>>
相关机构:西安电子科技大学南京航空航天大学电子科技大学更多>>
相关期刊:《Opto-Electronic Advances》《Journal of Information Security》《Computer Systems Science & Engineering》《China Communications》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Chinese Journal of Electronicsx
条 记 录,以下是1-6
视图:
排序:
Secure Fine-Grained Multi-Keyword Ciphertext Search Supporting Cloud-Edge-End Collaboration in IoT
《Chinese Journal of Electronics》2025年第1期266-281,共16页Kaifa Zheng Ziyu Zhou Jianwei Liu Beiyuan Yu 
supported by the National Key R&D Program of China(Grant No.2021YFB2700200);the National Natural Science Foundation of China(Grant Nos.U21B2021,61972018,and 61932014)。
The massive terminals access the Internet of things(IoT)through edge nodes,bringing forth new security and privacy challenges in ciphertext search and data sharing.Meanwhile,existing ciphertext search schemes often ov...
关键词:Cloud-edge-end computation PRIVACY-PRESERVING Attribute-based encryption Searchable encryption Edge computing 
Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size被引量:1
《Chinese Journal of Electronics》2019年第4期690-697,共8页JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei 
supported by the the National Basic Research Program of China(973 Program)(No.2012CB315901);the National Natural Science Foundation of China(No.61373006)
In a revocable broadcast encryption scheme,the group manager can flexibly set revoked users who cannot decrypt the ciphertext.Many applications of the revocable broadcast encryption have been found in the secure cloud...
关键词:CRYPTOGRAPHIC ACCUMULATOR BROADCAST ENCRYPTION REVOCABLE Dual system ENCRYPTION Cloud data sharing 
ACS-HCA:An Access Control Scheme Under Hierarchical Cryptography Architecture被引量:1
《Chinese Journal of Electronics》2019年第1期52-61,共10页SHI Jiaoli HUANG Chuanhe HE Kai SHEN Xieyang 
supported by the National Natural Science Foundation of China(No.61373040,No.61772385)
Binding access policies to data,Ciphertext-policy attribute-based encryption(CP-ABE)enables data access control to be independent from a certain application and lets users face data directly. It is regarded as one of ...
关键词:Cloud storage ACCESS control Ciphertext-policy ATTRIBUTE-BASED encryption HIERARCHICAL CRYPTOGRAPHY ARCHITECTURE Attribute revocation 
Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow被引量:6
《Chinese Journal of Electronics》2017年第3期640-646,共7页ZHAO Qianqian ZHANG Yuqing ZHANG Guanghua WANG He 
supported by the National Natural Science Foundation of China(No.61572460,No.61272481);the National Key Research and Development Project(No.2016YFB0800703);Open Fund of Beijing Key Laboratory of IOT Information Security Technology(No.J6V0011104);the China Postdoctoral Science Foundation(No.2015M582622);the National Information Security Special Projects of National Development,the Reform Commission of China(No.(2012)1424);the China 111 Project(No.B16037)
Ciphertext policy attribute-based encryption(CP-ABE)is becoming a new primitive for finegrained access control.It neither produces multiple encrypted copies of the same data nor suffers from the severe burden of key d...
关键词:CP-ABE The escrow problem Fully security In the standard model 
Ciphertext-only Attack on a Multivariate Public Key Encryption Scheme with Internal Perturbation and Plus Structure
《Chinese Journal of Electronics》2011年第3期511-515,共5页CAO Weiwei HU Lei 
This work is supported by the National Natural Science Foundation of China (No.61070172), the National High Technology Research and Development Program of China (863 Program) (No.2006AA01Z416) and the National Basic Research Program of China (No.2007CB311201).
This paper analyzes a new multivariate public key encryption scheme which we name as PTH+. It is an improved version of the TH scheme by the internal perturbation and plus methods. The inventors of PTH+ claimed that...
关键词:Multivariate public key encryption Internal perturbation Quadratic polynomial Differential attack. 
Secure Certificateless Encryption with Short Ciphertext被引量:2
《Chinese Journal of Electronics》2010年第2期313-318,共6页SUN Yinxia ZHANG Futai 
This work is supported by the National Natural Science Foundation of China (No.60673070) and the Natural Science Foundation of Jiangsu Province (No.BK2006217).
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present a secure Cer...
关键词:Certificateless encryption Short ciphertext Bilinear pairing Random oracle Gap-BDH problem Twinning technique. 
检索报告 对象比较 聚类工具 使用帮助 返回顶部