相关期刊:《航空计算技术》《The Journal of China Universities of Posts and Telecommunications》《Journal of Southeast University(English Edition)》《Journal of Computer and Communications》更多>>
supported by the project STRIDE included in the Spoke 5(Cryptography and Distributed Systems Security)of the Re-search and Innovation Program PE00000014-H73C22000880001,“SE-curity and RIghts in the CyberSpace(SERICS)”,under the National Recovery and Resilience Plan,funded by the European Union,NextGen-erationEU.
The interest in Self-Sovereign Identity(SSI)in research,industry,and governments is rapidly increasing.SSI is a paradigm where users hold their identity and credentials issued by authorized entities.SSI is revolutioni...
supported by National Natural Science Foundation of China(Grant Nos.61872359,61936008).
Dear editor,Group signature(GS)[1]is a milestone in privacy-oriented cryptography,which provides authentication for messages and keeps signers anonymous.Trolin and Wikstr¨om[2]properly generalized GS into the notion ...
the National Natural Science Foundation of China(Nos.61802075 and 61772477);the Natural Science Foundation of Henan Province,China(Nos.222300420371 and202300410508)。
For group signature(GS)supporting membership revocation,verifier-local revocation(VLR)mechanism seems to be a more flexible choice,because it requires only that verifiers download up-to-date revocation information for...
To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user ...
partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002);the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001);the National Key Research and Development Program of China (Grant No. 2016YFB0800204);the National Science Foundation of China (No. 61502017);the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in ...
the National Natural Science Foundations of China(Nos.61472309,61672412,61572390and 61402353);the 111 Project(No.B08038);Research Program of Anhui Education Committee(Nos.KJ2016A626,KJ2016A627)
Among several post quantum primitives proposed in the past few decades, lattice-based cryptography is considered as the most promising one, due to its underlying rich combinatorial structure, and the worst-case to ave...
This work is supported by the National High Technology Research and Development Program of China(863 Program)(No.2015AA016007);the National Natural Science Foundation of China(Nos.U1405255,61472310,61372075).
Chandran,et al.introduce the direction of position based cryptography at CRYPTO 2009.In position based cryptography,the position of a party is used to be its unique“credential”in order to realize the cryptographic t...