supported by the National Key R&D Program of China(Grant No.2021YFB2700200);the National Natural Science Foundation of China(Grant Nos.U21B2021,61972018,and 61932014)。
The massive terminals access the Internet of things(IoT)through edge nodes,bringing forth new security and privacy challenges in ciphertext search and data sharing.Meanwhile,existing ciphertext search schemes often ov...
supported by the the National Basic Research Program of China(973 Program)(No.2012CB315901);the National Natural Science Foundation of China(No.61373006)
In a revocable broadcast encryption scheme,the group manager can flexibly set revoked users who cannot decrypt the ciphertext.Many applications of the revocable broadcast encryption have been found in the secure cloud...
supported by the National Natural Science Foundation of China(No.61373040,No.61772385)
Binding access policies to data,Ciphertext-policy attribute-based encryption(CP-ABE)enables data access control to be independent from a certain application and lets users face data directly. It is regarded as one of ...
supported by the National Natural Science Foundation of China(No.61572460,No.61272481);the National Key Research and Development Project(No.2016YFB0800703);Open Fund of Beijing Key Laboratory of IOT Information Security Technology(No.J6V0011104);the China Postdoctoral Science Foundation(No.2015M582622);the National Information Security Special Projects of National Development,the Reform Commission of China(No.(2012)1424);the China 111 Project(No.B16037)
Ciphertext policy attribute-based encryption(CP-ABE)is becoming a new primitive for finegrained access control.It neither produces multiple encrypted copies of the same data nor suffers from the severe burden of key d...
This work is supported by the National Natural Science Foundation of China (No.61070172), the National High Technology Research and Development Program of China (863 Program) (No.2006AA01Z416) and the National Basic Research Program of China (No.2007CB311201).
This paper analyzes a new multivariate public key encryption scheme which we name as PTH+. It is an improved version of the TH scheme by the internal perturbation and plus methods. The inventors of PTH+ claimed that...
This work is supported by the National Natural Science Foundation of China (No.60673070) and the Natural Science Foundation of Jiangsu Province (No.BK2006217).
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present a secure Cer...