咨询与建议

限定检索结果

文献类型

  • 1,683 篇 会议
  • 313 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 1,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 669 篇 工学
    • 462 篇 计算机科学与技术...
    • 218 篇 电气工程
    • 132 篇 信息与通信工程
    • 102 篇 软件工程
    • 81 篇 电子科学与技术(可...
    • 62 篇 控制科学与工程
    • 43 篇 网络空间安全
    • 20 篇 机械工程
    • 12 篇 仪器科学与技术
    • 10 篇 材料科学与工程(可...
    • 8 篇 交通运输工程
    • 5 篇 土木工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 航空宇航科学与技...
  • 92 篇 理学
    • 60 篇 数学
    • 23 篇 物理学
    • 8 篇 化学
    • 6 篇 生物学
    • 3 篇 系统科学
    • 1 篇 科学技术史(分学科...
    • 1 篇 统计学(可授理学、...
  • 68 篇 管理学
    • 66 篇 管理科学与工程(可...
  • 14 篇 文学
    • 14 篇 新闻传播学
  • 9 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 2 篇 中西医结合
    • 2 篇 医学技术(可授医学...
  • 8 篇 军事学
    • 8 篇 军队指挥学

主题

  • 1,998 篇 identity-based e...
  • 345 篇 public key
  • 297 篇 computer science
  • 297 篇 public key crypt...
  • 227 篇 electrical capac...
  • 223 篇 authentication
  • 196 篇 information secu...
  • 173 篇 security
  • 158 篇 cryptography
  • 145 篇 read only memory
  • 145 篇 protocols
  • 132 篇 costs
  • 123 篇 laboratories
  • 122 篇 elliptic curve c...
  • 119 篇 application soft...
  • 112 篇 protection
  • 108 篇 cryptographic pr...
  • 106 篇 educational inst...
  • 96 篇 privacy
  • 85 篇 internet

机构

  • 16 篇 school of comput...
  • 16 篇 department of co...
  • 12 篇 chinese acad sci...
  • 12 篇 shanghai jiao to...
  • 11 篇 state key lab cr...
  • 8 篇 xidian univ stat...
  • 7 篇 shaanxi normal u...
  • 7 篇 college of scien...
  • 7 篇 natl inst adv in...
  • 6 篇 department of co...
  • 6 篇 faculty of engin...
  • 5 篇 nanjing normal u...
  • 5 篇 department of co...
  • 5 篇 univ maryland de...
  • 5 篇 beihang univ sch...
  • 5 篇 univ chinese aca...
  • 5 篇 westone cryptol ...
  • 5 篇 school of comput...
  • 5 篇 zhengzhou inform...
  • 4 篇 indian inst tech...

作者

  • 18 篇 susilo willy
  • 14 篇 mu yi
  • 13 篇 jianhong zhang
  • 12 篇 xu an wang
  • 12 篇 qiuliang xu
  • 11 篇 yi mu
  • 9 篇 zhenfu cao
  • 8 篇 futai zhang
  • 8 篇 yang bo
  • 8 篇 guo fuchun
  • 8 篇 weng jian
  • 8 篇 zhou yanwei
  • 8 篇 fagen li
  • 8 篇 xiaoyuan yang
  • 8 篇 lee kwangsu
  • 7 篇 chen kefei
  • 7 篇 liu shengli
  • 7 篇 chen yu
  • 7 篇 wong duncan s.
  • 7 篇 hu yupu

语言

  • 1,964 篇 英文
  • 30 篇 其他
  • 4 篇 中文
检索条件"主题词=Identity-Based Encryption"
1998 条 记 录,以下是1-10 订阅
排序:
identity-based encryption on RSA Without Pairings and Key Escrow
收藏 引用
Chinese Journal of Electronics 2025年 第4期23卷 842-850页
作者: Yan Zhu Shanbiao Wang Di Ma Rongquan Feng School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China School of Mathematical Sciences Peking University Beijing China Department of Computer and Information Science University of Michigan-Dearborn Michigan USA
We propose a new construction of identity-based encryption without key escrow over the tradition RSA cryptosystems. The security of our scheme follows from the decisional Diffie-Hellman assumption and the difficulty o... 详细信息
来源: 评论
A New Construction of Leakage-Resilient identity-based encryption Scheme  19th
A New Construction of Leakage-Resilient Identity-Based Encry...
收藏 引用
19th International Conference on Information Security Practice and Experience
作者: Qiao, Zirui Xu, Ran Lu, Yonghui Zhou, Yanwei Yang, Bo Shaanxi Normal Univ Sch Comp Sci Xian 710119 Peoples R China Xian Univ Posts & Telecommun Sch Cyberspace Secur Xian 710121 Peoples R China Shaanxi Normal Univ Sch Int Studies Xian 710119 Peoples R China
Although a large number of provably secure cryptographic primitives have been proposed in the literature, many of these schemes might be broken in practice because of various leakage attacks. Therefore, the leakage re... 详细信息
来源: 评论
Anonymous Key Issuing Protocol with Certified Identities in identity-based encryption  19th
Anonymous Key Issuing Protocol with Certified Identities in ...
收藏 引用
19th International Conference on Security and Privacy in Communication Networks
作者: Yang, Yanqing Wang, Jian Nanjing Univ Aeronaut & Astronaut Nanjing 210016 Peoples R China
identity-based encryption can simplify the certificate management problem of traditional public key cryptosystem. But it also has an inherent drawback, called the key escrow problem. A malicious key generation center ... 详细信息
来源: 评论
Hierarchical identity-based encryption based on SM9  2nd
Hierarchical Identity-Based Encryption Based on SM9
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: Chuai, Yi Zhang, Leyou Xie, Shuwei Tian, Runze Shan, Zhuang School of Mathematics and Statistics Xidian University Xi’an China
SM9 is an identification cryptography standard based on bilinear pairs adopted in China in 2016, and becomes an international cryptographic standard by ISO in 2021. But the initial SM9 identification cryptographic alg... 详细信息
来源: 评论
identity-based matchmaking encryption with stronger security and instantiation on lattices
收藏 引用
THEORETICAL COMPUTER SCIENCE 2025年 1029卷
作者: Wang, Yuejun Wang, Baocang Lai, Qiqi Zhan, Yu Xidian Univ State Key Lab Integrated Serv Networks Xian Peoples R China Henan Key Lab Network Cryptog Technol Zhengzhou Henan Peoples R China Shaanxi Normal Univ Sch Comp Sci Xian Peoples R China
An identity-based matchmaking encryption (IB-ME) scheme proposed at JOC 2021 supports anonymous but authenticated communications in a way that communication parties can both specify the senders or receivers on the fly... 详细信息
来源: 评论
identity-based encryption with outsourced equality test in cloud computing
收藏 引用
INFORMATION SCIENCES 2016年 328卷 389-402页
作者: Ma, Sha S China Agr Univ Coll Math & Informat Guangzhou Guangdong Peoples R China
We firstly combine the concepts of public key encryption with equality test (PKEET) and identity-based encryption (IBE) to obtain identity-based encryption with equality test (IBEET). Inheriting the advantage of IBE, ... 详细信息
来源: 评论
identity-based encryption on RSA Without Pairings and Key Escrow
收藏 引用
Chinese Journal of Electronics 2014年 第4期23卷 842-850页
作者: ZHU Yan WANG Shanbiao MA Di FENG Rongquan School of Computer and Communication Engineering University of Science and Technology Beijing School of Mathematical Sciences Peking University Department of Computer and Information Science University of Michigan-Dearborn
We propose a new construction of identitybased encryption without key escrow over the tradition RSA cryptosystems. The security of our scheme follows from the decisional Diffie-Hellman assumption and the difficulty of... 详细信息
来源: 评论
identity-based encryption with leakage-amplified chosen-ciphertext attacks security
收藏 引用
THEORETICAL COMPUTER SCIENCE 2020年 809卷 277-295页
作者: Zhou, Yanwei Yang, Bo Xia, Zhe Zhang, Mingwu Mu, Yi Shaanxi Normal Univ Sch Comp Sci Xian Peoples R China State Key Lab Cryptol POB 5159 Beijing Peoples R China Wuhan Univ Technol Sch Comp Sci Wuhan Peoples R China Guilin Univ Elect Technol Sch Comp Sci & Informat Secur Guilin Peoples R China Fujian Normal Univ Fujian Prov Key Lab Network Secur & Cryptol Fujian Peoples R China
Alwen et al. (EUROCRYPT 2010) proposed the formal definition of identity-based hash proof system (IB-HPS). As an independent interest, they showed that a leakage-resilient identity-based encryption (LR-IBE) scheme can... 详细信息
来源: 评论
identity-based encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 8644-8657页
作者: Lin, Zesheng Li, Hongbo Chen, Xinjian Xiao, Meiyan Huang, Qiong South China Agr Univ Coll Math & Informat Guangzhou 510642 Peoples R China Guangzhou Key Lab Intelligent Agr Guangzhou 510642 Peoples R China
To reduce data storage costs, more individuals are using cloud servers for reliable, scalable, cost-effective, and globally accessible solutions. However, storing data in plaintext on cloud servers can lead to data le... 详细信息
来源: 评论
identity-based encryption from the Diffie-Hellman Assumption
收藏 引用
JOURNAL OF THE ACM 2021年 第3期68卷 1–46页
作者: Doettling, Nico Garg, Sanjam Helmholtz Ctr Informat Secur CISPA Saarbrucken Germany Univ Calif Berkeley 685 Soda Hall Berkeley CA 94720 USA CISPA Campus Stuhlsatzenhaus 5 D-66123 Saarbrucken Germany
We provide the first constructions of identity-based encryption and hierarchical identity-based encryption based on the hardness of the (Computational) Diffie-Hellman Problem (without use of groups with pairings) or F... 详细信息
来源: 评论