咨询与建议

限定检索结果

文献类型

  • 17 篇 期刊文献

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 8 篇 网络空间安全
    • 6 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 3 篇 理学
    • 3 篇 数学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 17 篇 identity-based
  • 6 篇 encryption
  • 3 篇 cryptography
  • 2 篇 system
  • 2 篇 key
  • 2 篇 hash
  • 2 篇 bilinear pairing...
  • 2 篇 signature
  • 2 篇 proxy signature
  • 1 篇 standard model
  • 1 篇 uniqueness.
  • 1 篇 multiple
  • 1 篇 elliptic curve
  • 1 篇 k-ary
  • 1 篇 data security
  • 1 篇 bilinear pairing
  • 1 篇 sm9
  • 1 篇 random oracles
  • 1 篇 public key crypt...
  • 1 篇 fuzzy

机构

  • 1 篇 school of inform...
  • 1 篇 school of mathem...
  • 1 篇 state key labora...
  • 1 篇 college of infor...
  • 1 篇 school of comput...
  • 1 篇 guangdong key la...
  • 1 篇 school of comput...
  • 1 篇 state key labora...
  • 1 篇 inst china elect...
  • 1 篇 centre for compu...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 state key labora...
  • 1 篇 college of infor...
  • 1 篇 data assurance a...
  • 1 篇 department of ma...
  • 1 篇 college of infor...
  • 1 篇 shanghai key lab...
  • 1 篇 xidian univ mini...
  • 1 篇 department of ma...

作者

  • 2 篇 yu yong
  • 2 篇 yang bo
  • 1 篇 yuan chen
  • 1 篇 weirong jiang
  • 1 篇 田海博
  • 1 篇 le-you zhang
  • 1 篇 王永涛
  • 1 篇 li hongning
  • 1 篇 shuping liu
  • 1 篇 peili li
  • 1 篇 龙宇
  • 1 篇 王育民
  • 1 篇 yongheng mu
  • 1 篇 shun-meng pan
  • 1 篇 yang yang
  • 1 篇 yu-pu hu
  • 1 篇 tang chunming
  • 1 篇 tianjun ma
  • 1 篇 hong tang
  • 1 篇 yu yong li fagen...

语言

  • 16 篇 英文
  • 1 篇 中文
检索条件"主题词=Identity-Based"
17 条 记 录,以下是1-10 订阅
排序:
identity-based threshold signature and mediated proxy signature schemes
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2007年 第2期14卷 69-74页
作者: YU Yong YANG Bo SUN Ying State Key Laboratorv of ISN Xidian University Xi'an 710071 China College of information South China Agricultural University Guangzhou 510642 China
Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
identity-based Key-Insulated Proxy Signature Without Random Oracles
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第5期16卷 557-566页
作者: 陈剑洪 龙宇 陈克非 王永涛 Department of Computer Science and Engineering Shanghai Jiaotong University School of Computer Engineering Huaiyin Institute of Technology Shanghai Key Laboratory of Scalable Computing and System Shanghai Jiaotong University
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Updatable identity-based Hash Proof System based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
收藏 引用
Journal of Computer Science & Technology 2018年 第6期33卷 1243-1260页
作者: Qi-Qi Lai Bo Yang Yong Yu Zhe Xia Yan-Wei Zhou Yuan Chen School of Computer Science Shaanxi Normal University Xi'an 710119 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computer Science and Technology Wuhan University of Technology Wuhan 430070 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China
identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the relat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Improved identity-based Society Oriented Signature Scheme with Anonymous Signers
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 121-125页
作者: TANG Chunming School of Mathematics and Information Sciences/ Guangdong Province Key Laboratory Institute of Information Security Guangzhou University Guangzhou 510006 Guangdong China
In this paper, we present an improved identity-based society oriented signature scheme with anonymous signers, which satisfies: (1) when members leave or join an organization, the public verification key and the si... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient identity-based Anonymous Signcryption Scheme
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第6期13卷 670-674页
作者: YU Yong LI Fagen XU Chunxiang SUN Ying School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 Sichuan China
Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step more efficiently than sign-then-encrypt approach. Till now, various kinds of signcryption schemes have been pro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
identity-based Steganography in Spatial Domain
收藏 引用
Journal of Computer and Communications 2018年 第3期6卷 68-77页
作者: Xuba Xu Qiankai Nie College of Information Science and Technology Jinan University Guangzhou China
This paper proposed an identity-based steganographic scheme, where a receiver with certain authority can recover the secret message ready for him, but cannot detect the existence of other secret messages. The proposed... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Provably Secure identity-based Authentication Multiple Key Agreement Protocol
收藏 引用
China Communications 2011年 第2期8卷 26-33页
作者: 谭作文 School of Information Technology Jiangxi University of Finance and Economics Key Lab of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An identity-based Scheme of Fair Exchange of Digital Signatures
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1761-1764页
作者: YU Yong YANG Bo YANG Guoqing State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 Shaanxi China College of Information South China Agricultural University Guangzhou 510649 Guangdong China
Fair exchange of digital signatures is an important tool for signing digital contracts, e-payment and other electronic commerce actions. An ID-based scheme of fair exchange of digital signature is proposed in this pap... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient identity-based Homomorphic Broadcast Encryption
收藏 引用
Journal of Computer and Communications 2019年 第2期7卷 23-30页
作者: Mei Cai IT Department Jinan University Library Guangzhou China
Broadcast encryption (BE) allows a sender to broadcast its message to a set of receivers in a single ciphertext. However, in broadcast encryption scheme, ciphertext length is always related to the size of the receiver... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
CCA2 secure biometric identity based encryption with constant-size ciphertext
收藏 引用
Journal of Zhejiang University-Science C(Computers and Electronics) 2011年 第10期12卷 819-827页
作者: Yang YANG Yu-pu HU Le-you ZHANG Chun-hui SUN Department of Communication Engineering Xidian University Xi'an 710071 China Department of Mathematics and Computer Science Fuzhou University Fuzhou 350002 China Department of Mathematics Science Xidian University Xi'an 710071 China
We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论