咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 313 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 2,002 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 671 篇 工学
    • 465 篇 计算机科学与技术...
    • 219 篇 电气工程
    • 133 篇 信息与通信工程
    • 103 篇 软件工程
    • 81 篇 电子科学与技术(可...
    • 62 篇 控制科学与工程
    • 43 篇 网络空间安全
    • 20 篇 机械工程
    • 12 篇 仪器科学与技术
    • 10 篇 材料科学与工程(可...
    • 8 篇 交通运输工程
    • 5 篇 土木工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 航空宇航科学与技...
  • 93 篇 理学
    • 62 篇 数学
    • 23 篇 物理学
    • 8 篇 化学
    • 5 篇 生物学
    • 3 篇 系统科学
    • 1 篇 科学技术史(分学科...
    • 1 篇 统计学(可授理学、...
  • 68 篇 管理学
    • 66 篇 管理科学与工程(可...
  • 14 篇 文学
    • 14 篇 新闻传播学
  • 8 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 2 篇 中西医结合
    • 2 篇 医学技术(可授医学...
  • 8 篇 军事学
    • 8 篇 军队指挥学

主题

  • 2,002 篇 identity-based e...
  • 344 篇 public key
  • 297 篇 computer science
  • 296 篇 public key crypt...
  • 227 篇 electrical capac...
  • 224 篇 authentication
  • 195 篇 information secu...
  • 174 篇 security
  • 160 篇 cryptography
  • 146 篇 protocols
  • 145 篇 read only memory
  • 132 篇 costs
  • 123 篇 laboratories
  • 122 篇 elliptic curve c...
  • 119 篇 application soft...
  • 111 篇 protection
  • 108 篇 cryptographic pr...
  • 106 篇 educational inst...
  • 96 篇 privacy
  • 84 篇 internet

机构

  • 16 篇 school of comput...
  • 16 篇 department of co...
  • 12 篇 chinese acad sci...
  • 12 篇 shanghai jiao to...
  • 11 篇 state key lab cr...
  • 8 篇 xidian univ stat...
  • 7 篇 shaanxi normal u...
  • 7 篇 college of scien...
  • 7 篇 natl inst adv in...
  • 6 篇 department of co...
  • 6 篇 faculty of engin...
  • 5 篇 nanjing normal u...
  • 5 篇 department of co...
  • 5 篇 univ maryland de...
  • 5 篇 beihang univ sch...
  • 5 篇 univ chinese aca...
  • 5 篇 westone cryptol ...
  • 5 篇 school of comput...
  • 5 篇 zhengzhou inform...
  • 4 篇 indian inst tech...

作者

  • 18 篇 susilo willy
  • 14 篇 mu yi
  • 13 篇 jianhong zhang
  • 12 篇 xu an wang
  • 12 篇 qiuliang xu
  • 11 篇 yi mu
  • 9 篇 zhenfu cao
  • 8 篇 futai zhang
  • 8 篇 guo fuchun
  • 8 篇 weng jian
  • 8 篇 fagen li
  • 8 篇 xiaoyuan yang
  • 8 篇 lee kwangsu
  • 7 篇 yang bo
  • 7 篇 chen kefei
  • 7 篇 liu shengli
  • 7 篇 chen yu
  • 7 篇 wong duncan s.
  • 7 篇 hu yupu
  • 7 篇 zhou yanwei

语言

  • 1,967 篇 英文
  • 31 篇 其他
  • 4 篇 中文
检索条件"主题词=Identity-based Encryption"
2002 条 记 录,以下是11-20 订阅
排序:
identity-based encryption with equality test and datestamp-based authorization mechanism
收藏 引用
THEORETICAL COMPUTER SCIENCE 2021年 861卷 117-132页
作者: Lin, Xi-Jun Wang, Qihui Sun, Lin Qu, Haipeng Ocean Univ China Dept Comp Sci & Technol Qingdao Peoples R China Qingdao Univ Coll Liberal Arts Qingdao Peoples R China
Due to the advancement of cloud computing, public key encryption with equality test has become a hot topic in the cryptography community. The notion was extended to the identity-based setting to obtain a new primitive... 详细信息
来源: 评论
A New Construction of Leakage-Resilient identity-based encryption Scheme  19th
A New Construction of Leakage-Resilient Identity-Based Encry...
收藏 引用
19th International Conference on Information Security Practice and Experience
作者: Qiao, Zirui Xu, Ran Lu, Yonghui Zhou, Yanwei Yang, Bo Shaanxi Normal Univ Sch Comp Sci Xian 710119 Peoples R China Xian Univ Posts & Telecommun Sch Cyberspace Secur Xian 710121 Peoples R China Shaanxi Normal Univ Sch Int Studies Xian 710119 Peoples R China
Although a large number of provably secure cryptographic primitives have been proposed in the literature, many of these schemes might be broken in practice because of various leakage attacks. Therefore, the leakage re... 详细信息
来源: 评论
Two-Level identity-based encryption Scheme for Internet of Things  36
Two-Level Identity-Based Encryption Scheme for Internet of T...
收藏 引用
36th Chinese Control and Decision Conference (CCDC)
作者: Han, Yiliang Li, Yu Wang, Chao Wu, Xuguang Cryptog Engn Univ PAP Engn Coll Xian Peoples R China
In the application layer of the Internet of Things, there are multiple levels of user identities in the user management system. When the cloud and intelligent connected devices exchange big data among users, the sensi... 详细信息
来源: 评论
Anonymous Key Issuing Protocol with Certified Identities in identity-based encryption  19th
Anonymous Key Issuing Protocol with Certified Identities in ...
收藏 引用
19th International Conference on Security and Privacy in Communication Networks
作者: Yang, Yanqing Wang, Jian Nanjing Univ Aeronaut & Astronaut Nanjing 210016 Peoples R China
identity-based encryption can simplify the certificate management problem of traditional public key cryptosystem. But it also has an inherent drawback, called the key escrow problem. A malicious key generation center ... 详细信息
来源: 评论
Wildcarded identity-based encryption from lattices
收藏 引用
THEORETICAL COMPUTER SCIENCE 2022年 902卷 41-53页
作者: Minh Thuy Truc Pham Ngoc Ai Van Nguyen Jiang, Mei Dung Hoang Duong Susilo, Willy Univ Wollongong Sch Comp & Informat Technol Inst Cybersecur & Cryptol Northfields Ave Wollongong NSW 2522 Australia Vietnam Natl Univ Univ Informat Technol Dept Math & Phys Ho Chi Minh City Vietnam
Wildcard identity-based encryption (WIRE) is a generalization of hierarchical identity-based encryption (HIRE) where a sender can simultaneously encrypt messages to a group of users matching a certain pattern, defined... 详细信息
来源: 评论
Hierarchical identity-based encryption based on SM9  2nd
Hierarchical Identity-Based Encryption Based on SM9
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: Chuai, Yi Zhang, Leyou Xie, Shuwei Tian, Runze Shan, Zhuang School of Mathematics and Statistics Xidian University Xi’an China
SM9 is an identification cryptography standard based on bilinear pairs adopted in China in 2016, and becomes an international cryptographic standard by ISO in 2021. But the initial SM9 identification cryptographic alg... 详细信息
来源: 评论
Receiver Selective Opening Chosen Ciphertext Secure identity-based encryption
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2022年 第3期E105A卷 160-172页
作者: Hara, Keisuke Matsuda, Takahiro Tanaka, Keisuke Tokyo Inst Technol Dept Informat Sci Tokyo 1528550 Japan Tokyo Inst Technol Tokyo 1528550 Japan Natl Inst Adv Ind Sci & Technol Tokyo 1350064 Japan
In the situation where there are one sender and multiple receivers, a receiver selective opening (RSO) attack for an identity-based encryption (IBE) scheme considers adversaries that can corrupt some of the receivers ... 详细信息
来源: 评论
Receiver selective opening security for identity-based encryption in the multi-challenge setting
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2022年 第4期91卷 1233-1259页
作者: Huang, Zhengan Lai, Junzuo Zeng, Gongxian Mu, Xin Peng Cheng Lab Shenzhen Peoples R China Jinan Univ Coll Informat Sci & Technol Guangzhou Peoples R China
Receiver selective opening (RSO) security requires that in a situation where there are one sender and multiple receivers, even if an adversary has access to all ciphertexts and adaptively corrupts some fraction of the... 详细信息
来源: 评论
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2022年 第1期25卷 633-646页
作者: Choi, Seongbong Lee, Hyung Tae Chung Ang Univ Sch Comp Sci & Engn Seoul South Korea
Recently, Elhabob et al. proposed an identity-based encryption with authorized equivalence test (IBE-AET), which allows authorized testers to check whether messages in two ciphertexts are the same or not under the ide... 详细信息
来源: 评论
Anonymous (Hierarchical) identity-based encryption from Broader Assumptions  21st
Anonymous (Hierarchical) Identity-Based Encryption from Broa...
收藏 引用
21st International Conference on Applied Cryptography and Network Security (ACNS)
作者: Wu, Huangting Chow, Sherman S. M. Chinese Univ Hong Kong Dept Informat Engn Shatin Hong Kong Peoples R China
Dottling and Garg (CRYPTO 2017) introduced a non-black-box approach to identity-based encryption (IBE). This paves the way for the first and still the only anonymous IBE (AIBE) scheme from the computational Diffie-Hel... 详细信息
来源: 评论