PROVABLY_SECURE

作品数:36被引量:53H指数:5
导出分析报告
相关期刊:《The Journal of China Universities of Posts and Telecommunications》《信息安全与通信保密》《High-Confidence Computing》《China Communications》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金福建省自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices被引量:1
《Science China(Information Sciences)》2024年第1期304-305,共2页Lisha YAO Lin HOU Jian WENG Feixiang ZHAO 
supported by National Key Research and Development Plan of China(Grant No.2020YFB1005600);Major Program of Guangdong Basic and Applied Research Project(Grant No.2019B030302008);National Natural Science Foundation of China(Grant No.61825203);Guangdong Provincial Science and Technology Project(Grant Nos.2017B010111005,2021A0505030033);National Joint Engineering Research Center of Network Security Detection and Protection Technology;Guangdong Key Laboratory of Data Security and Privacy Preserving。
A public-key authenticated encryption with keyword search(PAEKS)[1,2]system overcomes the problem of an inside adversary forging searchable ciphertexts and guessing the keyword information from the given token.This sy...
关键词:authentic OVERCOME TOKEN 
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
《Computer Modeling in Engineering & Sciences》2024年第1期903-915,共13页Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 
This work was supported in part by the National Natural Science Foundation of China(Nos.62072074,62076054,62027827,62002047);the Sichuan Science and Technology Innovation Platform and Talent Plan(Nos.2020JDJQ0020,2022JDJQ0039);the Sichuan Science and Technology Support Plan(Nos.2020YFSY0010,2022YFQ0045,2022YFS0220,2023YFG0148,2021YFG0131);the YIBIN Science and Technology Support Plan(No.2021CG003);the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar...
关键词:KEY-INSULATED SM2 algorithm digital signature Industrial Internet of Things(IIoT) provable security 
Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
《High-Confidence Computing》2023年第4期60-72,共13页Vincent Omollo Nyangaresi 
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions.In addition,they have been deployed in civilian critical infrastructure monitoring.In this environm...
关键词:AUTHENTICATION DRONES Quadratic residues PRIVACY Security Side-channeling UAV 
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
《China Communications》2023年第5期198-216,共19页Liquan Chen Jinlong Wang Bangwei Yin Kunliang Yu Jinguang Han 
supported by the National Key Research and Development Program of China,“Joint Research of IoT Security System and Key Technologies Based on Quantum Key,”under project number 2020YFE0200600.
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ...
关键词:Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement 
PSAP-WSN:A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks
《Computer Modeling in Engineering & Sciences》2023年第4期711-732,共22页Xuanang Li Shuangshuang Liu Saru Kumari Chien-Ming Chen 
Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and w...
关键词:5G wireless sensor networks IOT authentication protocol 
A Provably Secure and Efficient Remote Password Authentication Scheme Using Smart Cards
《Computers, Materials & Continua》2022年第6期6125-6145,共21页Fairuz Shohaimay Eddie Shahril Ismail 
This research is funded by UKM under Grant No.GUP-2020-029.
Communication technology has advanced dramatically amid the 21st century,increasing the security risk in safeguarding sensitive information.The remote password authentication(RPA)scheme is the simplest cryptosystem th...
关键词:Authentication scheme discrete logarithm factorisation PASSWORD provable security 
SBOOSP for Massive Devices in 5G WSNs Using Conformable Chaotic Maps
《Computers, Materials & Continua》2022年第6期4591-4608,共18页Chandrashekhar Meshram Agbotiname Lucky Imoize Sajjad Shaukat Jamal Amer Aljaedi Adel R.Alharbi 
We extend our gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through the research groups programunder grant number R.G.P.1/72/42;The work of Agbotiname Lucky Imoize is supported by the Nigerian Petroleum Technology Development Fund(PTDF)and the German Academic Exchange Service(DAAD)through the Nigerian-German Postgraduate Program under Grant 57473408.
The commercialization of the fifth-generation(5G)wireless network has begun.Massive devices are being integrated into 5G-enabled wireless sensor networks(5GWSNs)to deliver a variety of valuable services to network use...
关键词:Subtree-based online/offline signature procedure(SBOOSP) 5G WSNs provably secure scheme massive devices conformable chaotic maps 
Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
《Computers, Materials & Continua》2018年第9期447-465,共19页Daofeng Li Mingxing Luo Bowen Zhao Xiangdong Che 
This work was supported by the National Natural Science Foundation of China(No.61662004,61772437,61702427);National Natural Science Foundation of Guangxi(No.2016GXNSFAA380215);Sichuan Youth Science and Technique Foundation(No.2017JQ0048);EU ICT COST CryptoAction(No.IC1306).
The secure issues of APK are very important in Android applications.In order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mech...
关键词:Sanitizable SIGNATURE APK SIGNATURE mechanism REDEVELOPMENT ID-BASED SIGNATURE SCHEME 
Provably secure cloud storage for mobile networks with less computation and smaller overhead被引量:3
《Science China(Information Sciences)》2017年第12期175-187,共13页Rui ZHANG Hui MA Yao LU Yang LI 
supported by Strategic Priority Research Program of the Chinese Academy of Sciences(Grant Nos.XDA06010703,XDA06010701);National Natural Science Foundation of China(Grant Nos.61472416,61272478,61632020);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-14-002);CREST,Japan Science and Technolegy Agency
Secure cloud storage(SCS) guarantees the data outsourced to the cloud to remain intact as it was before being outsourced. Previous schemes to ensure cloud storage reliability are either computationally heavy or admi...
关键词:secure cloud storage mobile networks homomorphic MAC domain extension applied cryptography 
A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password被引量:1
《Chinese Journal of Electronics》2017年第2期271-278,共8页ZHANG Gefei FAN Dan ZHANG Yuqing LI Xiaowei 
supported by the National Natural Science Foundation of China(No.61272481,No.61402434);China Post-doctoral Science Foundation Funded Project(No.2014M550085);the Open Fund of State Key Laboratory of Information Security(No.2014-12)
Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password.Most of these protocols are often li...
关键词:General construction Provable secure Smart card Password Key exchange protocol 
检索报告 对象比较 聚类工具 使用帮助 返回顶部