CIPHERTEXT

作品数:48被引量:86H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:董庆宽陈丹陈原更多>>
相关机构:西安电子科技大学南京航空航天大学电子科技大学更多>>
相关期刊:《Opto-Electronic Advances》《Journal of Information Security》《Computer Systems Science & Engineering》《China Communications》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 主题=ENCRYPTIONx
条 记 录,以下是1-10
视图:
排序:
Witness encryption with updatable ciphertexts
《Science China(Information Sciences)》2025年第3期177-192,共16页Yuzhu WANG Mingwu ZHANG 
supported in part by National Natural Science Foundation of China(Grant Nos.62072134,62472150,U2001205);Major Research Plan of Hubei Province(Grant No.2023BAA027);Key Research and Development Program of Hubei Province(Grant No.2021BEA163)。
Witness encryption(WE)is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance.Anyone who possesses a solution to this instance(i.e.,a witness)can then recover the message f...
关键词:witness encryption NP relation updatable ciphertext access control indistinguishable obfuscation 
Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
《Computers, Materials & Continua》2022年第10期69-85,共17页Hyun Sook Rhee 
As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage...
关键词:Searchable encryption public-key encryption with keyword search chosen ciphertext security data privacy 
A survey on cryptographic techniques for protecting big data security:present and forthcoming被引量:6
《Science China(Information Sciences)》2022年第10期69-102,共34页Siqi LU Jianhua ZHENG Zhenfu CAO Yongjuan WANG Chunxiang GU 
supported by National Key Research and Development Project(Grant No.2020YFA0712300);National Natural Science Foundation of China(Grants Nos.61772548,61632012);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-17-001);Peng Cheng Laboratory Project of Guangdong Province(Grant No.PCL2018KP004)。
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world.As they significantly create economic and social value,big data meaningfully impact t...
关键词:big data security cryptographic techniques ciphertext-based data sharing and computing authenticated encryption functional encryption homomorphic encryption secure multi-party computing 
Multi-dimensional Security Range Query for Industrial IoT
《Computers, Materials & Continua》2022年第7期157-179,共23页Abdallah Abdallah Ayman A.Aly Bassem F.Felemban Imran Khan Ki-Il Kim 
This study was supported by the Institute for Information&Communications Technology Planning&Evaluation(IITP)grant funded by theKorean government(MSIT)(No.2019-0-01343,Training Key Talents in Industrial Convergence Security).
The Internet of Things(IoT)has allowed for significant advancements in applications not only in the home,business,and environment,but also in factory automation.Industrial Internet of Things(IIoT)brings all of the ben...
关键词:Internet of things data security CIPHERTEXT privacy encryption 
Comparative Study of Different Cryptographic Algorithms被引量:1
《Journal of Information Security》2020年第3期138-148,共11页Baha Eldin Hamouda Hassan Hamouda 
With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of d...
关键词:CRYPTOGRAPHY DES 3DES AES ENCRYPTION DECRYPTION CIPHERTEXT PLAINTEXT 
Improved lattice-based CCA2-secure PKE in the standard model被引量:5
《Science China(Information Sciences)》2020年第8期143-164,共22页Jiang ZHANG Yu YU Shuqin FAN Zhenfeng ZHANG 
National Key Research and Development Program of China(Grant Nos.2017YFB0802005,2018YFB0804105);National Natural Science Foundation of China(Grant No.61602046);National Natural Science Foundation of China(Grant Nos.61872236;61572192);National Natural Science Foundation of China(Grant No.U1536205);Young Elite Scientists Sponsorship Program by CAST(Grant No.2016QNRC001);Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection(Grant No.2017B030301004);National Cryptography Development Fund(Grant No.MMJJ20170209);Anhui Initiative in Quantum Information Technologies(Grant No.AHY150100);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Natural Science Foundation of China(Grant No.U1536205).
Based on the identity-based encryption(IBE)from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12)presented a CCA1-secure public-key encryption(PKE),which has the best known efficiency in ...
关键词:LATTICE public-key encryption chosen ciphertext security standard model 
Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size被引量:1
《Chinese Journal of Electronics》2019年第4期690-697,共8页JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei 
supported by the the National Basic Research Program of China(973 Program)(No.2012CB315901);the National Natural Science Foundation of China(No.61373006)
In a revocable broadcast encryption scheme,the group manager can flexibly set revoked users who cannot decrypt the ciphertext.Many applications of the revocable broadcast encryption have been found in the secure cloud...
关键词:CRYPTOGRAPHIC ACCUMULATOR BROADCAST ENCRYPTION REVOCABLE Dual system ENCRYPTION Cloud data sharing 
An Improved Ciphertext Retrieval Scheme Based on Fully Homomorphic Encryption
《Wuhan University Journal of Natural Sciences》2019年第3期218-222,共5页LI Xinyan MOU Huajian LU Dianjun 
Supported by the Research Program of Chongqing Education Commission(JK15012027,JK1601225);the Chongqing Research Program of Basic Research and Frontier Technology(cstc2017jcyjBX0008);the Graduate Student Research and Innovation Foundation of Chongqing(CYB17026);the Basic Applied Research Program of Qinghai Province(2019-ZJ-7099)
In order to guarantee the user's privacy and the integrity of data when retrieving ciphertext in an untrusted cloud environment, an improved ciphertext retrieval scheme was proposed based on full homomorphic encryptio...
关键词:fully homomorphic ENCRYPTION PUBLIC key size the GREATEST common divisor(GCD) problem CIPHERTEXT RETRIEVAL 
Privacy preserving ciphertext-policy attribute-based broadcast encryption in smart city
《The Journal of China Universities of Posts and Telecommunications》2019年第1期21-31,共11页Cui Yilei Zhang Leyou 
supported by the National Natural Science Foundation of China(61472307,61402112);the Key Research Project of Shaanxi Province of China(2018GY-018);the Foundation of Education Department of Shaanxi Province(17JK0713);the National Key Research and Development Program of China(2017YFB0802002);the National Cryptography Development Fund(MMJJ20180209)
With the development and application of information technology, the problem of personal privacy leakage is becoming more and more serious. Most attribute-based broadcast encryption(ABBE) schemes focus on data security...
关键词:smart city ATTRIBUTE-BASED BROADCAST ENCRYPTION PRIVACY PRESERVING full security 
A Generic Construction of Ciphertext-Policy Attribute- Based Encryption Supporting Attribute Revocation被引量:7
《China Communications》2014年第A01期93-100,共8页WU Qiuxin 
Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its ap...
关键词:attribute revocation attribute based encryption ciphertext-Policy generic construction. 
检索报告 对象比较 聚类工具 使用帮助 返回顶部