IDENTITY-BASED

作品数:99被引量:194H指数:7
导出分析报告
相关作者:孙小强王化群更多>>
相关机构:科尔盖特大学深圳大学南京邮电大学宁波大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Identity-based threshold(multi)signature with private accountability for privacy-preserving blockchain
《High-Confidence Computing》2024年第4期105-115,共11页Jing Tian Yanqi Zhao Xiaoyi Yang Xuan Zhao Ruonan Chen Yong Yu 
supported by the National Key R&D Program of China(2022YFB2701500);the National Natural Science Foun-dation of China(62272385,62202375);Shaanxi Distinguished Youth Project,China(2022JC-47);the Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Re-search,China under Grant(ZR2022ZD03);the Key Research and Development Program of Shaanxi,China(2024GX-ZDCYL-01-09,2024GX-ZDCYL-01-15);Young Talent Fund of Association for Science and Technology in Shaanxi,China(20220134).
Identity-based threshold signature(IDTHS)allows a threshold number of signers to generate signatures to improve the deterministic wallet in the blockchain.However,the IDTHS scheme cannot determine the identity of mali...
关键词:Identity-based signature Threshold(multi)signature ACCOUNTABILITY Blockchain 
Some Remarks on Cocks'Identity-Based Encryption Scheme
《Journal of Donghua University(English Edition)》2024年第4期447-450,共4页ZHAO Xiaopeng 
Rising-Star Program of Shanghai 2023 Science and Technology Innovation Action Plan(Yangfan Special Project),China(No.23YF1401000);Fundamental Research Funds for the Central Universities,China(No.2232022D-25)。
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However...
关键词:identity-based encryption(IBE) quadratic residue SECURITY Cocks’IBE scheme 
Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system被引量:1
《Frontiers of Information Technology & Electronic Engineering》2024年第3期461-471,共11页Huifang YU Xiaoping BAI 
Project supported by the Special Project of Kunlun Talent Teaching Master of Qinghai Province,China(No.[2020]18)。
Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage.To solve these issues,we propose an identity-based searchable attribute signcryption in lattice for a block...
关键词:Blockchain Identity-based searchable attribute signcryption Distributed storage NTRU lattice 
Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
《The Journal of China Universities of Posts and Telecommunications》2023年第5期51-60,共10页Meng Hui Ren Lina Zhao Zongqu 
supported by the Henan Key Laboratory of Network Cryptography Technology(LNCT2022-A11);the Shaanxi Key Laboratory of Information Communication Network and Security(ICNS202006)。
Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-base...
关键词:proxy re-encryption(PRE) learning with errors over ring(RLWE) chosen-ciphertext attack(CCA) ciphertext delegation ciphertext evolution 
Fully distributed identity-based threshold signatures with identifiable aborts
《Frontiers of Computer Science》2023年第5期179-195,共17页Yan JIANG Youwen ZHU Jian WANG Xingxin LI 
support by the National Key R&D Program of China(No.2021YFB3100400);the National Natural Science Foundation of China(Grant Nos.62172216,U20A201092);the Jiangsu Provincial Key Research and Development Program(Nos.BE2022068,BE2022068-2);the Key R&D Program of Guangdong Province(No.2020B0101090002);the Natural Science Foundation of Jiangsu Province(No.BK20211180);the Research Fund of Guangxi Key Laboratory of Trusted Software(No.KX202034);the Research Fund of State Key Laboratory of Integrated Services Networks(Xidian University)(No.ISN23-20);the Fund of Prospective Layout of Scientific Research for NUAA(Nanjing University of Aeronautics and Astronautics);JSPS Postdoctoral Fellowships(No.P21073).
Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Neverthel...
关键词:threshold signatures single points of failure identifiable aborts 
A Novel Construction of Updatable Identity-Based Hash Proof System and Its Applications
《Chinese Journal of Electronics》2023年第3期564-576,共13页QIAO Zirui ZHOU Yanwei YANG Bo ZHANG Wenzheng ZHANG Mingwu 
supported by the National Natural Science Foundation of China(62272287,U2001205);the Sichuan Science and Technology Program(2020JDJQ0076);the Research Funds of Henan Key Laboratory of Network Cryptography Technology(LNCT2021-A04).
In the previous works,to further provide the continuous leakage resilience for the identity-based encryption scheme,a new cryptography primitive,called updatable identity-based hash proof system(U-IB-HPS),was proposed...
关键词:Updatable identity-based hash proof system ANONYMITY Key update Leakage resilience. 
Identity-Based Edge Computing Anonymous Authentication Protocol
《Computers, Materials & Continua》2023年第2期3931-3943,共13页Naixin Kang Zhenhu Ning Shiqiang Zhang Sadaqat ur Rehman Waqas 
Beijing Postdoctoral Research Foundation(No.2021-ZZ-077,No.2020-YJ-006);Chongqing Industrial Control System Security Situational Awareness Platform,2019 Industrial Internet Innovation and Development Project-Provincial Industrial Control System Security Situational Awareness Platform,Center for Research and Innovation in Software Engineering,School of Computer and Information Science(Southwest University,Chongqing 400175,China);Chongqing Graduate Education Teaching Reform Research Project(yjg203032).
With the development of sensor technology and wireless communication technology,edge computing has a wider range of applications.The privacy protection of edge computing is of great significance.In the edge computing ...
关键词:Identity authentication anonymous authentication edge computing 
An Edge-Cloud Collaborative Cross-Domain Identity-Based Authentication Protocol with Privacy Protection被引量:2
《Chinese Journal of Electronics》2022年第4期721-731,共11页SUN Haipeng TAN Yu’an LI Congwu LEI Lei ZHANG Qikun HU Jingjing 
supported by the National Key Research and Development Program of China(2020YFB1712101);the National Natural Science Foundation of China(61772070,61772477,61971380);the Key Technologies R&D Program of Henan Province(212102210089,212102210171,212102210075);the Collaborative Innovation Special Plan Project of Zhengzhou(2021ZDPY0206).
Edge-cloud collaborative application scenario is more complex,it involves collaborative operations among different security domains,frequently accessing and exiting application system of mobile terminals.A cross-domai...
关键词:Identity authentication Privacy protection Edge-cloud collaborative Revocability identity 
Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System
《Computer Modeling in Engineering & Sciences》2022年第6期1497-1513,共17页Yanan Chen Ting Yao Haiping Ren Zehao Gan 
supported by the Network and Data Security Key Laboratory of Sichuan Province under the Grant No.NDS2021-2;in part by Science and Technology Project of Educational Commission of Jiangxi Province under the Grant No.GJJ190464;in part by National Natural Science Foundation of China under the Grant No.71661012.
The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare data.Considering referral treatment for patients,the original signature ne...
关键词:Proxy re-signature key insulation electronic medical record(EHR) random oracle model 
Sharing of Encrypted Lock Keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption被引量:1
《China Communications》2022年第5期164-177,共14页Zhiwei Wang Liping Qian Danwei Chen Guozi sun 
This research is partially supported by the National Natural Science Foundation of China under Grant Nos.61672016;the Jiangsu Qing Lan Project,the Six Talent Peaks Project in Jiangsu Province under Grant RJFW-010;the Guangxi Key Laboratory of Cryptography and Information Security under Grant GCIS201815.
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secu...
关键词:identity-based proxy reencryption time stamp renting houses system blockchain 
检索报告 对象比较 聚类工具 使用帮助 返回顶部