咨询与建议

限定检索结果

文献类型

  • 16 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 18 篇 计算机科学与技术...
    • 5 篇 信息与通信工程
    • 4 篇 电气工程
    • 3 篇 软件工程
    • 1 篇 控制科学与工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
    • 1 篇 系统科学

主题

  • 18 篇 identity-based p...
  • 3 篇 data security
  • 3 篇 access control
  • 3 篇 cryptography
  • 3 篇 conditional prox...
  • 3 篇 chosen-ciphertex...
  • 2 篇 collusion attack
  • 2 篇 decentralized au...
  • 2 篇 proxy re-encrypt...
  • 2 篇 encryption
  • 2 篇 cloud computing
  • 1 篇 standard model
  • 1 篇 internet of thin...
  • 1 篇 lwe
  • 1 篇 cca-security
  • 1 篇 distributed syst...
  • 1 篇 ibe
  • 1 篇 internet of thin...
  • 1 篇 adaptive securit...
  • 1 篇 key switching me...

机构

  • 3 篇 chinese acad sci...
  • 2 篇 northeastern uni...
  • 2 篇 nanjing univ aer...
  • 2 篇 univ elect sci &...
  • 1 篇 kunsan natl univ...
  • 1 篇 ibm research tri...
  • 1 篇 inst infocomm re...
  • 1 篇 xi dian univ min...
  • 1 篇 peking univ sch ...
  • 1 篇 guangxi key lab ...
  • 1 篇 shanghai jiao to...
  • 1 篇 jiangsu univ tec...
  • 1 篇 renmin univ chin...
  • 1 篇 uestc cdfh joint...
  • 1 篇 beihang univ sch...
  • 1 篇 second res inst ...
  • 1 篇 sichuan univ sch...
  • 1 篇 weifang univ sci...
  • 1 篇 city univ hong k...
  • 1 篇 guangzhou univ s...

作者

  • 3 篇 fang liming
  • 2 篇 ge chunpeng
  • 2 篇 wang jiandong
  • 2 篇 xu jian
  • 2 篇 yin long
  • 2 篇 tan shanru
  • 2 篇 wang chen
  • 1 篇 jin chunhua
  • 1 篇 xue-jia lai
  • 1 篇 xiong hu
  • 1 篇 li zengpeng
  • 1 篇 liming fang
  • 1 篇 sifah emmanuel b...
  • 1 篇 zhong-mei wan
  • 1 篇 kim hyung-jin
  • 1 篇 liang kaitai
  • 1 篇 koo woo kwon
  • 1 篇 xu yongliang
  • 1 篇 tang chunming
  • 1 篇 qiu junjie

语言

  • 16 篇 英文
  • 2 篇 其他
检索条件"主题词=Identity-based proxy re-encryption"
18 条 记 录,以下是1-10 订阅
排序:
identity-based proxy re-encryption version 2: Making mobile access easy in cloud
收藏 引用
FUTUre GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2016年 62卷 128-139页
作者: Zhou, Yunya Deng, Hua Wu, Qianhong Qin, Bo Liu, Jianwei Ding, Yong Beihang Univ Sch Elect & Informat Engn Beijing 100191 Peoples R China Wuhan Univ Sch Comp Wuhan 430072 Peoples R China Renmin Univ China Sch Informat Key Lab Data Engn & Knowledge Engn Minist Educ Beijing Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian Peoples R China Shandong Univ Minist Educ Key Lab Cryptol Technol & Informat Secur Jinan 250100 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Aerosp Hengxing Sci & Technol Co LTD Beijing Peoples R China Guangxi Key Lab Cryptog & Informat Secur Guilin U Sch Math & Comp Sci Guilin Guangxi Peoples R China
proxy re-encryption (Pre) enables an authorized proxy to convert a ciphertext under Alice's public key into a ciphertext under Bob's public key without exposing the encrypted message. In existing Pre systems, ... 详细信息
来源: 评论
IB-VPre: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2022年 第1期13卷 469-482页
作者: Wu Li-qiang Yang Xiao-yuan Zhang Min-qing Wang Xu-an Natl Univ Def Technol Coll Comp Changsha 410073 Peoples R China Engn Univ Chinese Armed Police Force Coll Cryptog Engn Xian 710086 Shaanxi Peoples R China Xi Dian Univ Minist Educ Key Lab Comp Network & Informat Secur Xian 710071 Shaanxi Peoples R China
identity-based proxy re-encryption (IB-Pre) can convert the ciphertext encrypted under Alice's identity to Bob's ciphertext of the same message by a semi-trusted proxy with the proper transformation key. The m... 详细信息
来源: 评论
On the relation between identity-based proxy re-encryption and Mediated identity-based encryption
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2011年 第1期27卷 243-259页
作者: Wan, Zhong-Mei Weng, Jian Lai, Xue-Jia Liu, Sheng-Li Li, Ji-Guo Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China Hohai Univ Coll Sci Nanjing 210098 Peoples R China Hohai Univ Dept Comp Sci Nanjing 210098 Peoples R China Jinan Univ Dept Comp Sci Guangzhou 510630 Guangdong Peoples R China Singapore Management Univ Sch Informat Syst Singapore 178902 Singapore
identity-based proxy re-encryption (IBPre) is a useful primitive, in the sense that a semi-trust proxy can translate ciphertexts originally intended for one identity into ciphertexts intended for another identity. The... 详细信息
来源: 评论
Towards Multi-Hop Homomorphic identity-based proxy re-encryption via Branching Program
收藏 引用
IEEE ACCESS 2017年 5卷 16214-16228页
作者: Li, Zengpeng Ma, Chunguang Wang, Ding Harbin Engn Univ Coll Comp Sci & Technol Harbin 150001 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Peking Univ Sch Elect Engn & Comp Sci Beijing 100871 Peoples R China
identity-based proxy re-encryption (IBPre) is a powerful cryptographic tool for various applications, such as access control system, secure data sharing, and secure e-mail forwarding. Most of the existing efficient IB... 详细信息
来源: 评论
Key-Private identity-based proxy re-encryption
收藏 引用
Computers, Materials & Continua 2020年 第5期63卷 633-647页
作者: Chunpeng Ge Jinyue Xia Liming Fang College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing210000China IBM Research Triangle ParkNorth Carolina27709USA
An identity-based proxy re-encryption scheme(IB-Pre)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying *** to the fact that the proxy was semi-trusted,i... 详细信息
来源: 评论
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
收藏 引用
INFORMATION SCIENCES 2022年 604卷 80-96页
作者: Zhou, Yuyang Zhao, Liang Jin, Yuqiao Li, Fagen Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China Sichuan Univ Sch Cyber Sci & Engn Chengdu 610065 Peoples R China Second Res Inst CAAC Chengdu 610041 Peoples R China
The wireless body area network (WBAN) provides users with real-time medical services. Meanwhile, the cloud technology provides greater storage space and computing power for medical data. Both of them have contribute t... 详细信息
来源: 评论
A Chosen-Ciphertext Secure Fuzzy identity-based proxy re-encryption Scheme
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第5期10卷 347-360页
作者: Ge, Chunpeng Wang, Jiandong Fang, Liming Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing 210000 Jiangsu Peoples R China
Green and Ateniese introduced the notion of identity-based proxy re-encryption (IB-Pre), whereby the proxy can covert a ciphertext encrypted under the delegator's identity to an encryption under the delegatee'... 详细信息
来源: 评论
Collusion-resistant identity-based proxy re-encryption Without Random Oracles
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2015年 第9期9卷 337-344页
作者: Qiu, JunJie Jo, JungBok Lee, HoonJae Dongseo Univ Grad Sch Dept Ubiquitous IT Busan South Korea Weifang Univ Sci & Technol Weifang Peoples R China
In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice's public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and a... 详细信息
来源: 评论
An identity-based proxy re-encryption for data deduplication in cloud
收藏 引用
JOURNAL OF SYSTEMS ARCHITECTUre 2021年 121卷
作者: Kan, Ge Jin, Chunhua Zhu, Huihui Xu, Yongliang Liu, Nian Huaiyin Inst Technol Fac Comp & Software Engn Huaian 233003 Peoples R China
Cloud computing offers a huge resource pool by centralizing various resources with the rapid growth of digital data. Data storage is the most acceptable service in cloud computing. As one of the key technologies of cl... 详细信息
来源: 评论
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
收藏 引用
THEOreTICAL COMPUTER SCIENCE 2014年 第C期539卷 87-105页
作者: Liang, Kaitai Chu, Cheng-Kang Tan, Xiao Wong, Duncan S. Tang, Chunming Zhou, Jianying City Univ Hong Kong Dept Comp Sci Kowloon Hong Kong Peoples R China Inst Infocomm Res Infocomm Secur Dept Singapore 138632 Singapore Guangzhou Univ Sch Math & Informat Sci Guangzhou 510006 Guangdong Peoples R China
proxy re-encryption (Pre) allows one user to delegate the decryption rights of his/her ciphertexts to another user. Since the introduction of Multi-Hop identity-based Pre (MH-IBPre) by Green and Ateniese, the cipherte... 详细信息
来源: 评论