ID-BASED

作品数:115被引量:172H指数:7
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:于代荣熊曾刚陈月辉杨扬李盛阳更多>>
相关机构:东北师范大学北京科技大学中国科学院光电研究院济南大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金广东省自然科学基金国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Journal of Computer Science & Technologyx
条 记 录,以下是1-6
视图:
排序:
Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group被引量:11
《Journal of Computer Science & Technology》2016年第5期1012-1027,共16页Xiao-Fen Wang Yi Mu Rongmao Chen Xiao-Song Zhang 
This work was supported by the National Natural Science Foundation of China under Grant Nos. 61502086 and 61572115.
Data sharing and searching are important functionalities in cloud storage. In this paper, we show how to securely and flexibly search and share cloud data among a group of users without a group manager. We formalize a...
关键词:searchable encryption forward secrecy data sharing peer-to-peer group 
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles被引量:4
《Journal of Computer Science & Technology》2008年第5期832-842,共11页田海博 Willy Susilo 明洋 王育民 
supported by the National Natural Science Foundation of China under Grant No. 60473027;by Sun Yat-Sen University under Grant Nos. 35000-2910025 and 35000-3171912.
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmatio...
关键词:CRYPTOGRAPHY IDENTITY-BASED key agreement random oracles 
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme
《Journal of Computer Science & Technology》2008年第2期265-269,共5页刘胜利 陈晓峰 张方国 
This work is supported by the National Natural Science Foundation of China under Grant Nos.60673077, 60503006, 60773202,and 60633030;the National Natural Science Foundation of China-Korea Science and Engineering Foundation Joint Research Project(Grant No.60611140543);the National Grand Fundamental Research 973 Program of China(Grant No.2006CB303104).
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPB...
关键词:UNFORGEABILITY restrictive partially blind signature ID-based cryptography electronic cash 
ID-Based Fair Off-Line Electronic Cash System with Multiple Banks被引量:2
《Journal of Computer Science & Technology》2007年第3期487-493,共7页王常吉 汤庸 李琴 
This work is supported by the National Natural Science Foundation of China under Grant Nos.60503005 and 60673135;the Natural Science Foundation of Guangdong Province under Grant No.05200302;the Open Fund of Guangdong Province Information Security Key Laboratory and the State Key Laboratory of Information Security.
ID-based public key cryptography (ID-PKC) has many advantages over certificate-based public key cryptography (CA-PKC), and has drawn researchers' extensive attention in recent years. However, the existing electro...
关键词:electronic cash restrictive partially blind signature ID-based cryptography 
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts被引量:1
《Journal of Computer Science & Technology》2007年第1期103-108,共6页柴震川 曹珍富 周渊 
This work is supported by the National Natural Science Foundation of China for Distinguished Young Scholars under Grant No. 60225007, the National Natural Science Foundation of China under Grant Nos. 60572155 and 60673079, and the Special Research Funnds of Huawei.
Multi-decrypter encryption is a typical application in multi-user cryptographic branches. In multi-decrypter encryption, a message is encrypted under multiple decrypters' public keys in the way that only when all the...
关键词:ID-based cryptography multi-user cryptography proven security random oracle 
Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme
《Journal of Computer Science & Technology》2006年第6期997-1011,共15页黄悦民 林华乙 王宗一 
Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobilit...
关键词:ad hoc network PKI CBSRP ID-BASED inter-cluster cluster-based CA (Certificate Authority) 
检索报告 对象比较 聚类工具 使用帮助 返回顶部