咨询与建议

限定检索结果

文献类型

  • 28 篇 期刊文献
  • 23 篇 会议

馆藏范围

  • 51 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 46 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 11 篇 软件工程
    • 7 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
  • 12 篇 理学
    • 11 篇 数学
    • 1 篇 化学
    • 1 篇 生物学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 51 篇 hierarchical ide...
  • 5 篇 standard model
  • 5 篇 identity-based e...
  • 5 篇 bilinear maps
  • 5 篇 dual system encr...
  • 4 篇 key revocation
  • 4 篇 anonymity
  • 3 篇 lattices
  • 3 篇 tight security
  • 3 篇 cryptanalysis
  • 2 篇 bilinear pairing
  • 2 篇 learning with er...
  • 2 篇 full security
  • 2 篇 h-cdh assumption
  • 2 篇 cdh assumption
  • 2 篇 identity-based h...
  • 2 篇 unbounded hierar...
  • 2 篇 key escrow
  • 2 篇 asymmetric pairi...
  • 2 篇 security

机构

  • 3 篇 natl univ def te...
  • 2 篇 chinese acad sci...
  • 2 篇 renmin univ chin...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ chinese aca...
  • 2 篇 shanghai jiao to...
  • 2 篇 xidian univ sch ...
  • 2 篇 univ wollongong ...
  • 2 篇 ntnu norwegian u...
  • 2 篇 xian univ posts ...
  • 2 篇 karlsruhe inst t...
  • 1 篇 beihang univ sch...
  • 1 篇 fudan univ sch c...
  • 1 篇 china natl digit...
  • 1 篇 qingdao univ col...
  • 1 篇 kanazawa univ in...
  • 1 篇 ewha womans univ...
  • 1 篇 sci & technol co...
  • 1 篇 natl inst adv in...
  • 1 篇 south china agr ...

作者

  • 4 篇 wu qing
  • 3 篇 watanabe yohei
  • 3 篇 chen peixin
  • 3 篇 langrehr roman
  • 3 篇 luo song
  • 3 篇 pan jiaxin
  • 3 篇 wang xiaofeng
  • 3 篇 lee dong hoon
  • 3 篇 lee kwangsu
  • 3 篇 park jong hwan
  • 2 篇 chen zhong
  • 2 篇 liu weiran
  • 2 篇 zhang leyou
  • 2 篇 sun suxia
  • 2 篇 su jinshu
  • 2 篇 qin bo
  • 2 篇 wu qianhong
  • 2 篇 mu yi
  • 2 篇 susilo willy
  • 2 篇 emura keita

语言

  • 50 篇 英文
  • 1 篇 其他
检索条件"主题词=hierarchical identity-based encryption"
51 条 记 录,以下是31-40 订阅
排序:
Leveled hierarchical identity-based Fully Homomorphic encryption from Learning with Rounding  14th
Leveled Hierarchical Identity-Based Fully Homomorphic Encryp...
收藏 引用
14th International Conference on Information Security Practice and Experience (ISPEC)
作者: Luo, Fucai Wang, Kunpeng Lin, Changlu Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China Fujian Normal Univ Coll Math & Informat Fuzhou Fujian Peoples R China
hierarchical identity-based fully homomorphic encryption (HIBFHE) aggregates the advantages of both fully homomorphic encryption (FHE) and hierarchical identity-based encryption (HIBE) that permits data encrypted by H... 详细信息
来源: 评论
identity-based hierarchical Key-Insulated encryption Without Random Oracles  19th
Identity-Based Hierarchical Key-Insulated Encryption Without...
收藏 引用
19th IACR International Conference on the Theory and Practice of Public-Key Cryptography (PKC)
作者: Watanabe, Yohei Shikata, Junji Yokohama Natl Univ Grad Sch Environm & Informat Sci Yokohama Kanagawa Japan Yokohama Natl Univ Inst Adv Sci Yokohama Kanagawa Japan AIST Informat Technol Res Inst Tokyo Japan
Key-insulated encryption is one of the effective solutions to a key exposure problem. Recently, identity-based encryption (IBE) has been used as one of fundamental cryptographic primitives in a wide range of various a... 详细信息
来源: 评论
Dual trapdoor identity-based encryption with keyword search
收藏 引用
SOFT COMPUTING 2017年 第10期21卷 2599-2607页
作者: Liu, Jia'nan Lai, Junzuo Huang, Xinyi Jinan Univ Coll Informat Sci & Technol Guangzhou 510632 Guangdong Peoples R China Fujian Normal Univ Sch Math & Comp Sci Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350007 Peoples R China Nanjing Univ Informat Sci & Technol Nanjing Jiangsu Peoples R China
identity-based encryption with keyword search (IBEKS) is a useful cryptographic primitive for cloud computing, i.e., it allows a data owner to encrypt and store his data in a cloud storage server, and later the owner ... 详细信息
来源: 评论
Quantum-Safe HIBE: Does It Cost a Latte?
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 2680-2695页
作者: Zhao, Raymond K. Mccarthy, Sarah Steinfeld, Ron Sakzad, Amin O'Neill, Maire Monash Univ Fac Informat Technol Clayton Vic 3800 Australia CSIROs Data61 Marsfield NSW 2122 Australia Univ Waterloo Inst Quantum Comp Waterloo ON N2L 3G1 Canada Queens Univ Belfast Ctr Secure Informat Technol Belfast BT3 9DT North Ireland
The United Kingdom (UK) government is considering advanced primitives such as identity-based encryption (IBE) for adoption as they transition their public-safety communications network from TETRA to an LTE-based servi... 详细信息
来源: 评论
Anonymous HIBE with short ciphertexts: full security in prime order groups
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2015年 第2期74卷 395-425页
作者: Lee, Kwangsu Park, Jong Hwan Lee, Dong Hoon Korea Univ Ctr Informat Secur Technol Seoul South Korea Columbia Univ Dept Comp Sci New York NY 10027 USA Sangmyung Univ Div Comp Sci Seoul South Korea
Anonymous hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE), and it provides not only a message hiding property but also an identity hiding property. Anonymous HIBE schem... 详细信息
来源: 评论
Algorithms for the Generalized NTRU Equations and their Storage Analysis
收藏 引用
FUNDAMENTA INFORMATICAE 2020年 第2期177卷 115-139页
作者: Cho, Gook Hwa Lim, Seongan Lee, Hyang-Sook Ewha Womans Univ Inst Math Sci Seoul South Korea Ewha Womans Univ Dept Math Seoul South Korea
In LATTE, a lattice based hierarchical identity-based encryption (HIBE) scheme, each hierarchical level user delegates a trapdoor basis to the next level by solving a generalized NTRU equation of level l >= 3. For ... 详细信息
来源: 评论
Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2019年 第2期18卷 141-162页
作者: Zheng, Jian-Wu Zhao, Jing Guan, Xin-Ping Shijiazhuang Tiedao Univ Shijiazhuang 050043 Hebei Peoples R China Shanghai Jiao Tong Univ Shanghai 200240 Peoples R China
It has been almost one and a half decades since the introduction of the concept of hierarchical identity-based encryption (HIBE) systems, and many pairing-based HIBE systems have been proposed;however, how to achieve ... 详细信息
来源: 评论
Time-specific encryption from forward-secure encryption: generic and direct constructions
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2016年 第5期15卷 549-571页
作者: Kasamatsu, Kohei Matsuda, Takahiro Emura, Keita Attrapadung, Nuttapong Hanaoka, Goichiro Imai, Hideki NTT Software Corp Yokohama Kanagawa Japan Natl Inst Adv Ind Sci & Technol Tokyo Japan Natl Inst Informat & Commun Technol NICT Tokyo Japan Univ Tokyo Tokyo Japan
Paterson and Quaglia (SCN 2010) proposed the concept of time-specific encryption (TSE) and its efficient constructions. TSE is a type of public-key encryption with an additional functionality where an encryptor can sp... 详细信息
来源: 评论
Bonsai Trees, or How to Delegate a Lattice Basis
收藏 引用
JOURNAL OF CRYPTOLOGY 2012年 第4期25卷 601-639页
作者: Cash, David Hofheinz, Dennis Kiltz, Eike Peikert, Chris IBM TJ Watson Res Ctr Hawthorne NY USA Karlsruhe Inst Technol Karlsruhe Germany Ruhr Univ Bochum Dept Math Bochum Germany Georgia Inst Technol Atlanta GA 30332 USA
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area. Applications of bonsai trees include an efficient, stateless 'hash-and... 详细信息
来源: 评论
Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys
收藏 引用
COMPUTER JOURNAL 2019年 第8期62卷 1087-1091页
作者: Lin, Xi-Jun Sun, Lin Qu, Haipeng Xian, He-Qun Ocean Univ China Dept Comp Sci & Technol Qingdao 266100 Shandong Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Shaanxi Peoples R China Qingdao Univ Coll Liberal Arts Qingdao 266071 Shandong Peoples R China Qingdao Univ Coll Comp Sci & Technol Qingdao 266071 Shandong Peoples R China
Recently, Zhang et al. proposed a new anonymous hierarchical identity-based encryption (anonymous HIBE) over prime order groups to achieve both constant size private key and constant size ciphertext. Moreover, a doubl... 详细信息
来源: 评论