咨询与建议

限定检索结果

文献类型

  • 13 篇 期刊文献
  • 9 篇 会议

馆藏范围

  • 22 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 21 篇 计算机科学与技术...
    • 8 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 软件工程
    • 3 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...

主题

  • 22 篇 key-policy attri...
  • 4 篇 cloud computing
  • 3 篇 data sharing
  • 3 篇 cloud storage
  • 2 篇 standard model
  • 2 篇 access control
  • 2 篇 revocation
  • 2 篇 wireless body ar...
  • 2 篇 dual system encr...
  • 2 篇 user revocation
  • 2 篇 searchable encry...
  • 2 篇 signcryption
  • 1 篇 attribute-based ...
  • 1 篇 functional encry...
  • 1 篇 single-layer del...
  • 1 篇 large universe
  • 1 篇 bilinear pairing
  • 1 篇 sm9
  • 1 篇 static assumptio...
  • 1 篇 identity-based s...

机构

  • 2 篇 xian satellite c...
  • 2 篇 natl univ def te...
  • 2 篇 sun yat sen univ...
  • 2 篇 sun yat sen univ...
  • 2 篇 fujian normal un...
  • 1 篇 nanjing normal u...
  • 1 篇 univ waterloo wa...
  • 1 篇 information and ...
  • 1 篇 tsinghua univ sc...
  • 1 篇 school of teleco...
  • 1 篇 univ london info...
  • 1 篇 nucl power inst ...
  • 1 篇 fujian normal un...
  • 1 篇 guangdong univ f...
  • 1 篇 suqian coll sch ...
  • 1 篇 sun yat sen univ...
  • 1 篇 tsinghua univ de...
  • 1 篇 natl sun yat sen...
  • 1 篇 hohai univ coll ...
  • 1 篇 peking univ natl...

作者

  • 4 篇 wang changji
  • 3 篇 hao jialu
  • 2 篇 xian ming
  • 2 篇 wang huimei
  • 2 篇 jiang shengyi
  • 2 篇 liu jian
  • 2 篇 li jiguo
  • 1 篇 huang cheng
  • 1 篇 shen chen
  • 1 篇 wu jiayuan
  • 1 篇 ma jianfeng
  • 1 篇 ghopur dilxat
  • 1 篇 ye xiaojun
  • 1 篇 bugawa afaf
  • 1 篇 shen xuemin
  • 1 篇 fang jian
  • 1 篇 jiang tao
  • 1 篇 liu qin
  • 1 篇 wang guojun
  • 1 篇 liang kaitai

语言

  • 22 篇 英文
检索条件"主题词=Key-policy attribute-based encryption"
22 条 记 录,以下是1-10 订阅
排序:
key-policy attribute-based encryption based on SM9
收藏 引用
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 2025年 第1期40卷 267-282页
作者: Liu, Xiao-Hong Huang, Xin-Yi Wu, Wei Ning, Jian-Ting Fujian Normal Univ Coll Comp & Cyber Secur Fuzhou 350117 Peoples R China Yuncheng Univ Maths & Informat Technol Sch Yuncheng 04400 Peoples R China Hong Kong Univ Sci & Technol Guangzhou Artificial Intelligence Thrust Informat Hub Guangzhou 511455 Peoples R China Fujian Normal Univ Sch Math & Stat Fuzhou 350117 Peoples R China
attribute-based encryption (ABE) is a type of encryption derived from identity-based encryption, implementing access control over encrypted data based on attributes rather than on specific identities. SM9 is the Chine... 详细信息
来源: 评论
key-policy attribute-based encryption against continual auxiliary input leakage
收藏 引用
INFORMATION SCIENCES 2019年 470卷 175-188页
作者: Li, Jiguo Yu, Qihong Zhang, Yichen Shen, Jian Fujian Normal Univ Coll Math & Informat Fuzhou 350117 Fujian Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Suqian Coll Sch Comp Sci Suqian 223800 Peoples R China Nanjing Univ Posts & Telecommun Jiangsu Key Lab Big Data Secur & Intelligent Proc Nanjing 210023 Jiangsu Peoples R China Nanjing Univ Informat Sci & Technol Sch Comp & Software 219 Ningliu Rd Nanjing 210044 Jiangsu Peoples R China
attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as fine-grained access control, audit log applications, cloud ... 详细信息
来源: 评论
Hierarchical and non-monotonic key-policy attribute-based encryption and its application
收藏 引用
INFORMATION SCIENCES 2022年 611卷 591-627页
作者: Li, Cong Shen, Qingni Xie, Zhikang Dong, Jisheng Feng, Xinyu Fang, Yuejian Wu, Zhonghai Peking Univ Sch Comp Sci Beijing 100871 Peoples R China Peking Univ Sch Software & Microelect Beijing 102600 Peoples R China Peking Univ Natl Engn Res Ctr Software Engn Beijing 100871 Peoples R China
Hierarchical-authority attribute-based encryption (HABE) can resolve the performance bottleneck of the key generation center in the traditional attribute-based encryption (ABE) system. HABE has numerous applications, ... 详细信息
来源: 评论
Puncturable key-policy attribute-based encryption Scheme for Efficient User Revocation
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2023年 第6期16卷 3999-4011页
作者: Ghopur, Dilxat Ma, Jianfeng Ma, Xindi Hao, Jialu Jiang, Tao Wang, Xiangyu Xidian Univ Sch Cyber Engn Xian 710071 Peoples R China Xian Satellite Control Ctr Xian 710043 Peoples R China
Cloud computing, which provides a brand-new service model, has become an important infrastructure in the information age, and has been widely used in numerous fields. The key-policy attribute-based encryption (KP-ABE)... 详细信息
来源: 评论
A key-policy attribute-based encryption Scheme with Constant Size Ciphertext
A Key-policy Attribute-based Encryption Scheme with Constant...
收藏 引用
8th International Conference on Computational Intelligence and Security (CIS)
作者: Wang, Chang-Ji Luo, Jian-Fa Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510275 Guangdong Peoples R China
attribute-based encryption (ABE) is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. key-policy attribu... 详细信息
来源: 评论
Fully Secure Unbounded Revocable key-policy attribute-based encryption Scheme  9th
Fully Secure Unbounded Revocable Key-Policy Attribute-Based ...
收藏 引用
9th International Conference on Security, Privacy, and Anonymity in Computation, Communication and Storage (SpaCCS)
作者: Wang, Changji Fang, Jian Xie, Jianguo Guangdong Univ Foreign Studies Collaborat Innovat Ctr 21st Century Maritime Silk Cisco Sch Informat Guangzhou 510006 Guangdong Peoples R China Sun Yat Sen Univ Sch Data & Comp Sci Guangzhou 510006 Guangdong Peoples R China
attribute-based encryption (ABE) is a promising cryptographic primitive which can provide fine-grained access control over encrypted data. Providing an efficient revocation mechanism for ABE scheme is crucial since us... 详细信息
来源: 评论
An Efficient key-policy attribute-based Searchable encryption in Prime-Order Groups  11th
An Efficient Key-Policy Attribute-Based Searchable Encryptio...
收藏 引用
11th International Conference on Provable Security (ProvSec)
作者: Meng, Ru Zhou, Yanwei Ning, Jianting Liang, Kaitai Han, Jinguang Susilo, Willy Shaanxi Normal Univ Sch Comp Sci Xian Peoples R China Natl Univ Singapore Dept Comp Sci Singapore Singapore Univ Surrey Dept Comp Sci Guildford Surrey England Univ Wollongong Inst Cybersecur & Cryptol Sch Comp & Informat Technol Wollongong NSW Australia
Public key encryption with keyword search (PEKS) is a promising cryptographic mechanism to enable secure search over encrypted data in cloud. The mechanism allows a semi-trusted cloud server to return related encrypte... 详细信息
来源: 评论
A scalable encryption scheme for multi-privileged group communications
收藏 引用
JOURNAL OF SUPERCOMPUTING 2013年 第3期64卷 1075-1091页
作者: Wang, Guojun Du, Qiushuang Zhou, Wei Liu, Qin Cent South Univ Sch Informat Sci & Engn Changsha 410083 Hunan Peoples R China Temple Univ Dept Comp & Informat Sci Philadelphia PA 19122 USA
In multi-privileged group communications, since users, who can subscribe to different data streams according to their interests, have multiple access privileges, security issues are more difficult to be solved than th... 详细信息
来源: 评论
Expressive Public-key encryption With keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups
收藏 引用
IEEE ACCESS 2020年 8卷 93-103页
作者: Shen, Chen Lu, Yang Li, Jiguo Hohai Univ Coll Comp & Informat Nanjing 211100 Peoples R China Nanjing Normal Univ Sch Comp Sci & Technol Nanjing 210097 Peoples R China Fujian Normal Univ Coll Math & Informat Fuzhou 350007 Peoples R China State Key Lab Cryptol Beijing 100878 Peoples R China
Public key encryption with keyword search (PEKS) allows a cloud server to retrieve particular ciphertexts without leaking the contents of the searched ciphertexts. This kind of cryptographic primitive gives users a sp... 详细信息
来源: 评论
SCMP-V: A secure multiple relays cooperative downloading scheme with privacy preservation in VANETs
收藏 引用
PEER-TO-PEER NETWORKING AND APPLICATIONS 2022年 第1期15卷 340-354页
作者: Liu, Xuejiao Wang, Chuanhua Chen, Wei Xia, Yingjie Zhu, Gaoxiang Hangzhou Normal Univ Sch Informat Sci & Technol Hangzhou Peoples R China Zhejiang Univ Coll Comp Sci & Technol Hangzhou Peoples R China Hangzhou Yuantiao Technol Co Hangzhou Peoples R China
In vehicular ad hoc networks (VANETs), vehicle-to-vehicle cooperative downloading schemes have been provided to solve the problem of data download in the communication blind zone. However, how to realize the secure an... 详细信息
来源: 评论