咨询与建议

限定检索结果

文献类型

  • 1,683 篇 会议
  • 313 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 1,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 669 篇 工学
    • 462 篇 计算机科学与技术...
    • 217 篇 电气工程
    • 131 篇 信息与通信工程
    • 102 篇 软件工程
    • 81 篇 电子科学与技术(可...
    • 62 篇 控制科学与工程
    • 43 篇 网络空间安全
    • 20 篇 机械工程
    • 12 篇 仪器科学与技术
    • 10 篇 材料科学与工程(可...
    • 8 篇 交通运输工程
    • 5 篇 土木工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 航空宇航科学与技...
  • 92 篇 理学
    • 60 篇 数学
    • 23 篇 物理学
    • 8 篇 化学
    • 6 篇 生物学
    • 3 篇 系统科学
    • 1 篇 科学技术史(分学科...
    • 1 篇 统计学(可授理学、...
  • 68 篇 管理学
    • 66 篇 管理科学与工程(可...
  • 14 篇 文学
    • 14 篇 新闻传播学
  • 9 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 2 篇 中西医结合
    • 2 篇 医学技术(可授医学...
  • 8 篇 军事学
    • 8 篇 军队指挥学

主题

  • 1,998 篇 identity-based e...
  • 345 篇 public key
  • 297 篇 computer science
  • 297 篇 public key crypt...
  • 227 篇 electrical capac...
  • 223 篇 authentication
  • 196 篇 information secu...
  • 173 篇 security
  • 158 篇 cryptography
  • 145 篇 read only memory
  • 145 篇 protocols
  • 132 篇 costs
  • 123 篇 laboratories
  • 122 篇 elliptic curve c...
  • 119 篇 application soft...
  • 112 篇 protection
  • 108 篇 cryptographic pr...
  • 106 篇 educational inst...
  • 96 篇 privacy
  • 85 篇 internet

机构

  • 16 篇 school of comput...
  • 16 篇 department of co...
  • 12 篇 chinese acad sci...
  • 12 篇 shanghai jiao to...
  • 11 篇 state key lab cr...
  • 8 篇 xidian univ stat...
  • 7 篇 shaanxi normal u...
  • 7 篇 college of scien...
  • 7 篇 natl inst adv in...
  • 6 篇 department of co...
  • 6 篇 faculty of engin...
  • 5 篇 nanjing normal u...
  • 5 篇 department of co...
  • 5 篇 univ maryland de...
  • 5 篇 beihang univ sch...
  • 5 篇 univ chinese aca...
  • 5 篇 westone cryptol ...
  • 5 篇 school of comput...
  • 5 篇 zhengzhou inform...
  • 4 篇 indian inst tech...

作者

  • 18 篇 susilo willy
  • 14 篇 mu yi
  • 13 篇 jianhong zhang
  • 12 篇 xu an wang
  • 12 篇 qiuliang xu
  • 11 篇 yi mu
  • 9 篇 zhenfu cao
  • 8 篇 futai zhang
  • 8 篇 yang bo
  • 8 篇 guo fuchun
  • 8 篇 weng jian
  • 8 篇 zhou yanwei
  • 8 篇 fagen li
  • 8 篇 xiaoyuan yang
  • 8 篇 lee kwangsu
  • 7 篇 chen kefei
  • 7 篇 liu shengli
  • 7 篇 chen yu
  • 7 篇 wong duncan s.
  • 7 篇 hu yupu

语言

  • 1,964 篇 英文
  • 30 篇 其他
  • 4 篇 中文
检索条件"主题词=Identity-Based Encryption"
1998 条 记 录,以下是1-10 订阅
排序:
identity-based encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 8644-8657页
作者: Lin, Zesheng Li, Hongbo Chen, Xinjian Xiao, Meiyan Huang, Qiong South China Agr Univ Coll Math & Informat Guangzhou 510642 Peoples R China Guangzhou Key Lab Intelligent Agr Guangzhou 510642 Peoples R China
To reduce data storage costs, more individuals are using cloud servers for reliable, scalable, cost-effective, and globally accessible solutions. However, storing data in plaintext on cloud servers can lead to data le... 详细信息
来源: 评论
identity-based encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption
收藏 引用
COMPUTER JOURNAL 2023年 第4期66卷 924-940页
作者: Zhou, Yanwei Wang, Zhaolong Qiao, Zirui Wang, Ying Yang, Bo Mu, Yi Zhang, Mingwu Shaanxi Normal Univ Sch Comp Sci Xian 710062 Peoples R China Henan Key Lab Network Cryptog Technol Zhengzhou 450040 Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Cryptog & Informat Secur Guilin 541004 Peoples R China Aviat Ind Corp China Xian Aeronaut Comp Tech Res Inst Xian 710068 Peoples R China City Univ Macau Inst Data Sci Macau 999078 Peoples R China
Although a large number of provably secure cryptographic primitives have been proposed in the literature, many of these schemes might be broken in practice because of various leakage attacks. Therefore, the leakage re... 详细信息
来源: 评论
identity-based encryption with security against the KGC: A formal model and its instantiations
收藏 引用
THEORETICAL COMPUTER SCIENCE 2022年 900卷 97-119页
作者: Emura, Keita Katsumata, Shuichi Watanabe, Yohei Natl Inst Informat & Commun Technol NICT Koganei Tokyo Japan Natl Inst Adv Ind Sci & Technol Tokyo Japan Univ Electrocommun Chofu Tokyo Japan
The key escrow problem is one of the main barriers to the widespread real-world use of identity-based encryption (IBE). Specifically, a key generation center (KGC), which generates secret keys for a given identity, ha... 详细信息
来源: 评论
LMIBE: Lattice-based Matchmaking identity-based encryption for Internet of Things
收藏 引用
IEEE ACCESS 2023年 11卷 9851-9858页
作者: Tao, Xufeng Qiang, Yan Wang, Peng Wang, Yingsen Taiyuan Univ Technol Coll Informat & Comp Taiyuan 030600 Peoples R China Chongqing Univ Sci & Technol Sch Intelligent Technol & Engn Chongqing 401331 Peoples R China
Under the usage of new technologies, Internet of Things (IoT) develops rapidly and provides a great convenience for our lives. It is critical for ensuring security to IoT systems as the tremendous growth of IoT applic... 详细信息
来源: 评论
identity-based encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
收藏 引用
JOURNAL OF CRYPTOLOGY 2024年 第2期37卷 12-12页
作者: Hofheinz, Dennis Koch, Jessica Striecks, Christoph Swiss Fed Inst Technol Zurich Switzerland AIT Austrian Inst Technol Vienna Austria
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many instances of the scheme and many encryptions per instance. In this se... 详细信息
来源: 评论
identity-based encryption on RSA Without Pairings and Key Escrow
收藏 引用
Chinese Journal of Electronics 2025年 第4期23卷 842-850页
作者: Yan Zhu Shanbiao Wang Di Ma Rongquan Feng School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China School of Mathematical Sciences Peking University Beijing China Department of Computer and Information Science University of Michigan-Dearborn Michigan USA
We propose a new construction of identity-based encryption without key escrow over the tradition RSA cryptosystems. The security of our scheme follows from the decisional Diffie-Hellman assumption and the difficulty o... 详细信息
来源: 评论
identity-based encryption in DDH Hard Groups  13th
Identity-Based Encryption in DDH Hard Groups
收藏 引用
13th International Conference on the Theory and Application of Cryptographic Techniques in Africa (AFRICACRYPT)
作者: Blazy, Olivier Kakvi, Saqib A. Ecole Polytech Inst Polytech Paris INRIA LIXCNRS F-91120 Palaiseau France Univ London Royal Holloway London England
The concept of identity-based encryption was first introduced by Shamir (CRYPTO 1984) but were not realised until much later by Sakai, Ohgishi and Kasahara (SCIS 2000), Boneh and Franklin (CRYPTO 2001) and Cocks (IMAC... 详细信息
来源: 评论
An Efficient identity-based encryption With Equality Test in Cloud Computing
收藏 引用
IEEE TRANSACTIONS ON CLOUD COMPUTING 2023年 第3期11卷 2983-2992页
作者: Yang, Zhichao He, Debiao Qu, Longjiang Ye, Qing Naval Univ Engn Dept Informat Secur Wuhan 430000 Peoples R China Qilu Univ Technol Shandong Acad Sci Shandong Prov Key Lab Comp Networks Jinan 250014 Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan 430000 Peoples R China Natl Univ Def Technol Coll Liberal Arts & Sci Changsha 410000 Peoples R China
identity-based encryption with equality test (IBEET) provides a feasible way for cloud server partitioning or searching on ciphertexts in the cloud. In that case, the server can judge if two different ciphertexts encr... 详细信息
来源: 评论
identity-based encryption from the Diffie-Hellman Assumption
收藏 引用
JOURNAL OF THE ACM 2021年 第3期68卷 1–46页
作者: Doettling, Nico Garg, Sanjam Helmholtz Ctr Informat Secur CISPA Saarbrucken Germany Univ Calif Berkeley 685 Soda Hall Berkeley CA 94720 USA CISPA Campus Stuhlsatzenhaus 5 D-66123 Saarbrucken Germany
We provide the first constructions of identity-based encryption and hierarchical identity-based encryption based on the hardness of the (Computational) Diffie-Hellman Problem (without use of groups with pairings) or F... 详细信息
来源: 评论
Delegate and Verify the Update Keys of Revocable identity-based encryption
收藏 引用
IEEE ACCESS 2023年 11卷 52636-52652页
作者: Lee, Kwangsu Yonsei Univ Comp Sci Seoul South Korea Korea Adv Inst Sci & Technol Comp Sci Daejeon South Korea Korea Univ Informat Secur Seoul South Korea Sejong Univ Dept Comp & Informat Secur Seoul South Korea
Revocable identity-based encryption (RIBE) is an extension of identity-based encryption (IBE) and it supports efficient revocation of private keys. In the past, many efficient RIBE schemes have been proposed, but rese... 详细信息
来源: 评论