咨询与建议

限定检索结果

文献类型

  • 15 篇 期刊文献
  • 9 篇 会议

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 23 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 6 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 24 篇 identity-based b...
  • 4 篇 revocation
  • 3 篇 identity-based e...
  • 3 篇 broadcast encryp...
  • 3 篇 dual system encr...
  • 2 篇 accountability
  • 2 篇 full security
  • 2 篇 subgroup
  • 2 篇 cryptography
  • 2 篇 attribute-based ...
  • 2 篇 static assumptio...
  • 1 篇 functional encry...
  • 1 篇 access control
  • 1 篇 sm9
  • 1 篇 private key leak...
  • 1 篇 random oracles
  • 1 篇 semi-static
  • 1 篇 space efficiency
  • 1 篇 smart city
  • 1 篇 bilinear groups

机构

  • 2 篇 sun yat sen univ...
  • 2 篇 jinan univ dept ...
  • 1 篇 jilin univ dept ...
  • 1 篇 nanjing normal u...
  • 1 篇 china elect stan...
  • 1 篇 grad univ chines...
  • 1 篇 hongik univ dept...
  • 1 篇 shenzhen univ gu...
  • 1 篇 south china univ...
  • 1 篇 hong kong polyte...
  • 1 篇 indian stat inst...
  • 1 篇 csiro data61 mar...
  • 1 篇 suqian coll sch ...
  • 1 篇 hohai univ coll ...
  • 1 篇 fujian normal un...
  • 1 篇 xian inst posts ...
  • 1 篇 ecole normale su...
  • 1 篇 indian stat inst...
  • 1 篇 univ wollongong ...
  • 1 篇 univ wollongong ...

作者

  • 4 篇 susilo willy
  • 3 篇 mu yi
  • 2 篇 kim jongkil
  • 2 篇 liu zheli
  • 2 篇 guo fuchun
  • 2 篇 ramanna somindu ...
  • 2 篇 weng jian
  • 2 篇 chen rongmao
  • 2 篇 libert benoit
  • 2 篇 he kai
  • 1 篇 zhang yuqing
  • 1 篇 hu liang
  • 1 篇 camtepe seyit
  • 1 篇 jiang peng
  • 1 篇 gong junqing
  • 1 篇 cheng xiaochun
  • 1 篇 li jin
  • 1 篇 ejiyeh atefeh mo...
  • 1 篇 yang guomin
  • 1 篇 yuan huaqiang

语言

  • 21 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Identity-based broadcast encryption"
24 条 记 录,以下是1-10 订阅
排序:
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2023年 第1-2期78卷 79-90页
作者: Singh, Amit Kumar Acharya, Kamalesh Dutta, Ratna IIT Kharagpur Dept Math Kharagpur 721302 W Bengal India Vellore Inst Technol Sch Adv Sci Div Math Chennai 600127 Tamil Nadu India
Cloud computing has gained widespread popularity in the industry and academia and rapidly becomes an integral part of our everyday life. It offers several benefits including reduced cost on technical support for data ... 详细信息
来源: 评论
KeyD: Secure Key-Deduplication with identity-based broadcast encryption
收藏 引用
IEEE TRANSACTIONS ON CLOUD COMPUTING 2021年 第2期9卷 670-681页
作者: Liu, Ling Zhang, Yuqing Li, Xuejun Xidian Univ Sch Cyber Engn Xian 710071 Peoples R China Grad Univ Chinese Acad Sci Natl Comp Network Intrus Protect Ctr Beijing 100049 Peoples R China
Deduplication, which can save storage cost by enabling us to store only one copy of identical data, becomes unprecedentedly significant with the dramatic increase in data stored in the cloud. For the purpose of ensuri... 详细信息
来源: 评论
identity-based broadcast encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing  19
Identity-Based Broadcast Encryption with Outsourced Partial ...
收藏 引用
ACM Asia Conference on Computer and Communications Security (Asia CCS)
作者: Kim, Jongkil Camtepe, Seyit Susilo, Willy Nepal, Surya Baek, Joonsang Univ Wollongong Wollongong NSW Australia CSIRO Data61 Marsfield Australia
Each layer of nodes and communication networks in edge computing, from cloud to the end device (i.e, often considered as resource-constrained IoT devices), exhibits a different level of trust for each stakeholder - e.... 详细信息
来源: 评论
identity-based broadcast encryption with continuous leakage resilience
收藏 引用
INFORMATION SCIENCES 2018年 429卷 177-193页
作者: Li, Jiguo Yu, Qihong Zhang, Yichen Hohai Univ Coll Comp & Informat Nanjing 211100 Jiangsu Peoples R China Suqian Coll Sch Comp Sci Suqian 223800 Peoples R China
identity-based broadcast encryption (IBBE) is an important type of broadcast encryption. In the paper, we put forward the formal definition and security model of IBBE with leakage resilience. Furthermore, we propose a... 详细信息
来源: 评论
Anonymous identity-based broadcast encryption technology for smart city information system
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2017年 第5期21卷 841-853页
作者: He, Kai Weng, Jian Mao, Yijun Yuan, Huaqiang DongGuan Univ Technol Sch Comp & Network Secur Dongguan Guangdong Peoples R China Jinan Univ Dept Comp Sci Guangzhou Guangdong Peoples R China Shenzhen Univ Guangdong Prov Big Data Collaborat Innovat Ctr Shenzhen Peoples R China South China Univ Agr Sch Math & Informat Guangzhou Guangdong Peoples R China
A smart city can utilize information and communication technologies to minimize energy, waste, and resource consumption and attain high-efficiency services, so it directly improves the life quality of all residents. H... 详细信息
来源: 评论
Recipient Revocable identity-based broadcast encryption How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext  16
Recipient Revocable Identity-Based Broadcast Encryption How ...
收藏 引用
11th ACM Asia Conference on Computer and Communications Security (ASIA CCS)
作者: Susilo, Willy Chen, Rongmao Guo, Fuchun Yang, Guomin Mu, Yi Chow, Yang-Wai Univ Wollongong Wollongong NSW 2522 Australia
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption scheme. In this notion, a content provider will produce encrypted content and send them to a third party (which is a broa... 详细信息
来源: 评论
Anonymous identity-based broadcast encryption with Chosen-Ciphertext Security  16
Anonymous Identity-Based Broadcast Encryption with Chosen-Ci...
收藏 引用
11th ACM Asia Conference on Computer and Communications Security (ASIA CCS)
作者: He, Kai Weng, Jian Liu, Jia-Nan Liu, Joseph K. Liu, Wei Deng, Robert H. Jinan Univ Dept Comp Sci Guangzhou 510632 Guangdong Peoples R China Monash Univ Fac Informat Technol Clayton Vic 3800 Australia Singapore Management Univ Sch Informat Syst Singapore 178902 Singapore
In this paper, we propose the first identity-based broadcast encryption scheme, which can simultaneously achieves confidentiality and full anonymity against adaptive chosen-ciphertext attacks under a standard assumpti... 详细信息
来源: 评论
Adaptively Secure identity-based broadcast encryption With a Constant-Sized Ciphertext
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2015年 第3期10卷 679-693页
作者: Kim, Jongkil Susilo, Willy Au, Man Ho Seberry, Jennifer Univ Wollongong Sch Comp Sci & Software Engn Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia Hong Kong Polytech Univ Dept Comp Hong Kong Hong Kong Peoples R China
In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are bo... 详细信息
来源: 评论
identity-based broadcast Proxy Re-encryption for Flexible Data Sharing in VANETs
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2023年 18卷 4830-4842页
作者: Zhang, Jing Su, Shuangshuang Zhong, Hong Cui, Jie He, Debiao Anhui Univ Sch Comp Sci & Technol Key Lab Intelligent Comp & Signal Proc Minist Educ Hefei Peoples R China Anhui Univ Sch Comp Sci & Technol Anhui Engn Lab IoT Secur Technol Hefei 230039 Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Peoples R China
Data sharing is an integral part of vehicular ad hoc networks (VANETs), which provide drivers with safe and comfortable driving environments. However, when data are shared among multiple vehicles, they must be encrypt... 详细信息
来源: 评论
Real-Time Lightweight Cloud-based Access Control for Wearable IoT Devices: A Zero Trust Protocol  1
Real-Time Lightweight Cloud-Based Access Control for Wearabl...
收藏 引用
1st International Workshop on Security and Privacy of Sensing Systems (Sensors S and P) Part of SenSys Conference
作者: Ejiyeh, Atefeh Mohseni Univ Calif Santa Barbara Santa Barbara CA 93106 USA
In IoT, smart sensors enable data collection, real-time monitoring, decision-making, and automation, but their proliferation exposes them to cybersecurity threats. Zero Trust Architecture enhances IoT security by chal... 详细信息
来源: 评论