咨询与建议

限定检索结果

文献类型

  • 15 篇 期刊文献
  • 9 篇 会议

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24 篇 工学
    • 23 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 6 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 24 篇 identity-based b...
  • 4 篇 revocation
  • 3 篇 identity-based e...
  • 3 篇 broadcast encryp...
  • 3 篇 dual system encr...
  • 2 篇 accountability
  • 2 篇 full security
  • 2 篇 subgroup
  • 2 篇 cryptography
  • 2 篇 attribute-based ...
  • 2 篇 static assumptio...
  • 1 篇 functional encry...
  • 1 篇 access control
  • 1 篇 sm9
  • 1 篇 private key leak...
  • 1 篇 random oracles
  • 1 篇 semi-static
  • 1 篇 space efficiency
  • 1 篇 smart city
  • 1 篇 bilinear groups

机构

  • 2 篇 sun yat sen univ...
  • 2 篇 jinan univ dept ...
  • 1 篇 jilin univ dept ...
  • 1 篇 nanjing normal u...
  • 1 篇 china elect stan...
  • 1 篇 grad univ chines...
  • 1 篇 hongik univ dept...
  • 1 篇 shenzhen univ gu...
  • 1 篇 south china univ...
  • 1 篇 hong kong polyte...
  • 1 篇 indian stat inst...
  • 1 篇 csiro data61 mar...
  • 1 篇 suqian coll sch ...
  • 1 篇 hohai univ coll ...
  • 1 篇 fujian normal un...
  • 1 篇 xian inst posts ...
  • 1 篇 ecole normale su...
  • 1 篇 indian stat inst...
  • 1 篇 univ wollongong ...
  • 1 篇 univ wollongong ...

作者

  • 4 篇 susilo willy
  • 3 篇 mu yi
  • 2 篇 kim jongkil
  • 2 篇 zhang leyou
  • 2 篇 liu zheli
  • 2 篇 guo fuchun
  • 2 篇 ramanna somindu ...
  • 2 篇 weng jian
  • 2 篇 hu yupu
  • 2 篇 chen rongmao
  • 2 篇 wu qing
  • 2 篇 libert benoit
  • 2 篇 he kai
  • 1 篇 zhang yuqing
  • 1 篇 hu liang
  • 1 篇 camtepe seyit
  • 1 篇 jiang peng
  • 1 篇 gong junqing
  • 1 篇 cheng xiaochun
  • 1 篇 li jin

语言

  • 21 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=Identity-based broadcast encryption"
24 条 记 录,以下是1-10 订阅
排序:
identity-based broadcast encryption with continuous leakage resilience
收藏 引用
INFORMATION SCIENCES 2018年 429卷 177-193页
作者: Li, Jiguo Yu, Qihong Zhang, Yichen Hohai Univ Coll Comp & Informat Nanjing 211100 Jiangsu Peoples R China Suqian Coll Sch Comp Sci Suqian 223800 Peoples R China
identity-based broadcast encryption (IBBE) is an important type of broadcast encryption. In the paper, we put forward the formal definition and security model of IBBE with leakage resilience. Furthermore, we propose a... 详细信息
来源: 评论
identity-based broadcast encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing  19
Identity-Based Broadcast Encryption with Outsourced Partial ...
收藏 引用
ACM Asia Conference on Computer and Communications Security (Asia CCS)
作者: Kim, Jongkil Camtepe, Seyit Susilo, Willy Nepal, Surya Baek, Joonsang Univ Wollongong Wollongong NSW Australia CSIRO Data61 Marsfield Australia
Each layer of nodes and communication networks in edge computing, from cloud to the end device (i.e, often considered as resource-constrained IoT devices), exhibits a different level of trust for each stakeholder - e.... 详细信息
来源: 评论
Adaptively Secure identity-based broadcast encryption With a Constant-Sized Ciphertext
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2015年 第3期10卷 679-693页
作者: Kim, Jongkil Susilo, Willy Au, Man Ho Seberry, Jennifer Univ Wollongong Sch Comp Sci & Software Engn Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia Hong Kong Polytech Univ Dept Comp Hong Kong Hong Kong Peoples R China
In this paper, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are bo... 详细信息
来源: 评论
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2012年 第3期85卷 708-716页
作者: Zhao, Xingwen Zhang, Fangguo Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510275 Guangdong Peoples R China Guangdong Key Lab Informat Secur Technol Guangzhou 510275 Guangdong Peoples R China
The concept of accountable authority identity-based encryption was introduced as a convenient tool to reduce the amount of trust in authorities in identity-based encryption. In this model, if the Private Key Generator... 详细信息
来源: 评论
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2023年 第1-2期78卷 79-90页
作者: Singh, Amit Kumar Acharya, Kamalesh Dutta, Ratna IIT Kharagpur Dept Math Kharagpur 721302 W Bengal India Vellore Inst Technol Sch Adv Sci Div Math Chennai 600127 Tamil Nadu India
Cloud computing has gained widespread popularity in the industry and academia and rapidly becomes an integral part of our everyday life. It offers several benefits including reduced cost on technical support for data ... 详细信息
来源: 评论
KeyD: Secure Key-Deduplication with identity-based broadcast encryption
收藏 引用
IEEE TRANSACTIONS ON CLOUD COMPUTING 2021年 第2期9卷 670-681页
作者: Liu, Ling Zhang, Yuqing Li, Xuejun Xidian Univ Sch Cyber Engn Xian 710071 Peoples R China Grad Univ Chinese Acad Sci Natl Comp Network Intrus Protect Ctr Beijing 100049 Peoples R China
Deduplication, which can save storage cost by enabling us to store only one copy of identical data, becomes unprecedentedly significant with the dramatic increase in data stored in the cloud. For the purpose of ensuri... 详细信息
来源: 评论
Anonymous identity-based broadcast encryption technology for smart city information system
收藏 引用
PERSONAL AND UBIQUITOUS COMPUTING 2017年 第5期21卷 841-853页
作者: He, Kai Weng, Jian Mao, Yijun Yuan, Huaqiang DongGuan Univ Technol Sch Comp & Network Secur Dongguan Guangdong Peoples R China Jinan Univ Dept Comp Sci Guangzhou Guangdong Peoples R China Shenzhen Univ Guangdong Prov Big Data Collaborat Innovat Ctr Shenzhen Peoples R China South China Univ Agr Sch Math & Informat Guangzhou Guangdong Peoples R China
A smart city can utilize information and communication technologies to minimize energy, waste, and resource consumption and attain high-efficiency services, so it directly improves the life quality of all residents. H... 详细信息
来源: 评论
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
收藏 引用
MATHEMATICAL AND COMPUTER MODELLING 2012年 第1-2期55卷 12-18页
作者: Zhang, Leyou Hu, Yupu Wu, Qing Xidian Univ Dept Math Sci Xian 710071 Shaanxi Provinc Peoples R China Xidian Univ Minist Educ Key Lab Comp Networks & Informat Secur Xian 710071 Shaanxi Provinc Peoples R China Xian Inst Posts & Telecommun Sch Automat Xian 710121 Shaanxi Provinc Peoples R China
The main challenge in building efficient broadcast systems is to encrypt messages with short ciphertexts. The well-known constructions of identity-based broadcast encryption (IBBE) with constant size ciphertexts in th... 详细信息
来源: 评论
Efficient identity-based broadcast encryption without Random Oracles
收藏 引用
JOURNAL OF COMPUTERS 2010年 第3期5卷 331-336页
作者: Hu, Liang Liu, Zheli Cheng, Xiaochun Jilin Univ Dept Comp Sci & Technol Changchun Jilin Peoples R China Middlesex Univ Dept Comp Commun London England
We propose a new efficient identity-based broadcast encryption scheme without random oracles and prove that it achieves selective identity, chosen plaintext security. Our scheme is constructed based on bilinear Diffie... 详细信息
来源: 评论
Recipient Revocable identity-based broadcast encryption How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext  16
Recipient Revocable Identity-Based Broadcast Encryption How ...
收藏 引用
11th ACM Asia Conference on Computer and Communications Security (ASIA CCS)
作者: Susilo, Willy Chen, Rongmao Guo, Fuchun Yang, Guomin Mu, Yi Chow, Yang-Wai Univ Wollongong Wollongong NSW 2522 Australia
In this paper, we present the notion of recipient-revocable identity-based broadcast encryption scheme. In this notion, a content provider will produce encrypted content and send them to a third party (which is a broa... 详细信息
来源: 评论