咨询与建议

限定检索结果

文献类型

  • 26 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 31 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 10 篇 软件工程
    • 9 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
  • 2 篇 理学
    • 2 篇 生物学
    • 1 篇 化学

主题

  • 34 篇 conditional prox...
  • 8 篇 chosen-ciphertex...
  • 6 篇 proxy re-encrypt...
  • 6 篇 cloud computing
  • 5 篇 attribute-based ...
  • 3 篇 internet of thin...
  • 3 篇 data sharing
  • 3 篇 identity-based p...
  • 2 篇 data security
  • 2 篇 without random o...
  • 2 篇 keyword search
  • 2 篇 chosen-ciphertex...
  • 2 篇 identity-based
  • 2 篇 receivers
  • 2 篇 blockchain
  • 2 篇 protocols
  • 2 篇 encryption
  • 2 篇 user revocation
  • 1 篇 emr sharing
  • 1 篇 secret sharing

机构

  • 7 篇 nanjing univ aer...
  • 4 篇 jinan univ dept ...
  • 3 篇 singapore manage...
  • 3 篇 beijing univ pos...
  • 3 篇 beijing univ pos...
  • 2 篇 jiangsu univ tec...
  • 2 篇 univ wollongong ...
  • 1 篇 kennesaw state u...
  • 1 篇 nanjing univ aer...
  • 1 篇 inst infocomm re...
  • 1 篇 natl univ def te...
  • 1 篇 astri secur & da...
  • 1 篇 innopolis univ i...
  • 1 篇 zhejiang gongsha...
  • 1 篇 university of so...
  • 1 篇 nit warangal dep...
  • 1 篇 hanyang univ dep...
  • 1 篇 yangzhou univ de...
  • 1 篇 east china norma...
  • 1 篇 jinan univ coll ...

作者

  • 7 篇 ge chunpeng
  • 6 篇 fang liming
  • 5 篇 weng jian
  • 5 篇 wang jiandong
  • 5 篇 susilo willy
  • 4 篇 yang yixian
  • 4 篇 huang qinlong
  • 3 篇 deng robert h.
  • 2 篇 kim donghyun
  • 2 篇 liang kaitai
  • 2 篇 fu jingyi
  • 2 篇 yue wei
  • 2 篇 ren yongjun
  • 2 篇 wong duncan s.
  • 2 篇 choo kim-kwang r...
  • 2 篇 yang yanjiang
  • 2 篇 chu cheng-kang
  • 2 篇 oh heekuck
  • 2 篇 liu joseph k.
  • 2 篇 hussain rasheed

语言

  • 33 篇 英文
  • 1 篇 其他
检索条件"主题词=conditional proxy re-encryption"
34 条 记 录,以下是1-10 订阅
排序:
Weighted Attribute Based conditional proxy re-encryption in the Cloud
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
conditional proxy re-encryption(CPre)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
conditional proxy re-encryption for Secure Big Data Group Sharing in Cloud Environment
Conditional Proxy Re-Encryption for Secure Big Data Group Sh...
收藏 引用
33rd IEEE Annual Conference on Computer Communications (IEEE INFOCOM)
作者: Son, Junggab Kim, Donghyun Hussain, Rasheed Oh, Heekuck Hanyang Univ Dept Comp Sci & Engn ERICA Campus Seoul South Korea North Carolina Cent Univ Dept Math & Phys Durham NC 27707 USA
conditional Pre (CPre) is a novel public key primitive which enables the group sharing of confidential data without revealing its plaintext or decryption key to outside the group member. Previously, several efforts ar... 详细信息
来源: 评论
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
收藏 引用
THEOreTICAL COMPUTER SCIENCE 2014年 第C期539卷 87-105页
作者: Liang, Kaitai Chu, Cheng-Kang Tan, Xiao Wong, Duncan S. Tang, Chunming Zhou, Jianying City Univ Hong Kong Dept Comp Sci Kowloon Hong Kong Peoples R China Inst Infocomm Res Infocomm Secur Dept Singapore 138632 Singapore Guangzhou Univ Sch Math & Informat Sci Guangzhou 510006 Guangdong Peoples R China
proxy re-encryption (Pre) allows one user to delegate the decryption rights of his/her ciphertexts to another user. Since the introduction of Multi-Hop Identity-Based Pre (MH-IBPre) by Green and Ateniese, the cipherte... 详细信息
来源: 评论
Identity-based conditional proxy re-encryption with fine grain policy
收藏 引用
COMPUTER STANDARDS & INTERFACES 2017年 52卷 1-9页
作者: Ge, Chunpeng Susilo, Willy Wang, Jiandong Fang, Liming Jiangsu Univ Technol Dept Comp Engn Changzhou Peoples R China Univ Wollongong Sch Comp & Informat Technol CCISR Wollongong NSW Australia Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Jiangsu Peoples R China
An identity-based conditional proxy re-encryption scheme (IB-CPre) allows a semi-trusted proxy to convert a ciphertext satisfying one condition, which is set by the delegator, under one identity to another without the... 详细信息
来源: 评论
On the security of two identity-based conditional proxy re-encryption schemes
收藏 引用
THEOreTICAL COMPUTER SCIENCE 2016年 652卷 18-27页
作者: He, Kai Weng, Jian Deng, Robert H. Liu, Joseph K. Jinan Univ Dept Comp Sci Guangzhou 510632 Guangdong Peoples R China Singapore Management Univ Sch Informat Syst Singapore 178902 Singapore Monash Univ Fac Informat Technol Clayton Vic 3800 Australia
proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying... 详细信息
来源: 评论
A New Kind of conditional proxy re-encryption for Secure Cloud Storage
收藏 引用
IEEE ACCESS 2018年 6卷 70017-70024页
作者: Zeng, Peng Choo, Kim-Kwang Raymond East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA Univ Texas San Antonio Dept Elect & Comp Engn San Antonio TX 78249 USA
Secure cloud storage has important applications in our big data-driven society, and to achieve secure cloud storage, we need to enforce strong access control mechanism. proxy re-encryption (Pre) has been shown to be a... 详细信息
来源: 评论
Interactive conditional proxy re-encryption with fine grain policy
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWAre 2011年 第12期84卷 2293-2302页
作者: Fang, Liming Susilo, Willy Ge, Chunpeng Wang, Jiandong Univ Wollongong Sch Comp Sci & Software Engn CCISR Wollongong NSW 2522 Australia Nanjing Univ Aeronaut & Astronaut Coll Informat Sci & Technol Nanjing 210016 Peoples R China
conditional proxy re-encryption (C-Pre) allows a semi-trusted proxy to convert a ciphertext satisfying one conditional set by sender into an encryption of the same message intended for a different recipient than the o... 详细信息
来源: 评论
Efficient and Fully CCA Secure conditional proxy re-encryption from Hierarchical Identity-Based encryption
收藏 引用
COMPUTER JOURNAL 2015年 第10期58卷 2778-2792页
作者: Liang, Kaitai Susilo, Willy Liu, Joseph K. Wong, Duncan S. Aalto Univ Dept Comp Sci Espoo Finland Univ Wollongong Sch Comp & Informat Technol Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia Monash Univ Fac Informat Technol Melbourne Vic 3004 Australia ASTRI Secur & Data Sci Hong Kong Hong Kong Peoples R China
A proxy re-encryption (Pre) allows a data owner to delegate the decryption rights of some encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud service provider (i.e. the Pre pro... 详细信息
来源: 评论
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
收藏 引用
THEOreTICAL COMPUTER SCIENCE 2012年 462卷 39-58页
作者: Fang, Liming Susilo, Willy Ge, Chunpeng Wang, Jiandong Univ Wollongong Sch Comp Sci & Software Engn Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Jiangsu Peoples R China
Weng et al. introduced the notion of conditional proxy re-encryption (or C-Pre, for short), whereby only the ciphertext satisfying one condition set by the delegator can be transformed by the proxy and then decrypted ... 详细信息
来源: 评论
PreCISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks
收藏 引用
FUTUre GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2018年 86卷 1523-1533页
作者: Huang, Qinlong Yang, Yixian Fu, Jingyi Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Natl Engn Lab Disaster Backup & Recovery Beijing 100876 Peoples R China
Online social networks (OSNs) have become popular around the world due to its openness. Although cryptographic techniques can provide privacy protection for users in OSNs, several issues also remain problematic, such ... 详细信息
来源: 评论