咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 8 篇 网络空间安全
    • 7 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 信息与通信工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 软件工程
  • 5 篇 理学
    • 5 篇 数学
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...

主题

  • 13 篇 broadcast encryp...
  • 4 篇 traitor tracing
  • 2 篇 rsa
  • 2 篇 dual system encr...
  • 2 篇 provable securit...
  • 1 篇 the standard mod...
  • 1 篇 revocation
  • 1 篇 revocable
  • 1 篇 software protect...
  • 1 篇 multi-key pirate...
  • 1 篇 malicious subscr...
  • 1 篇 diffie-hellman p...
  • 1 篇 pirate decoder
  • 1 篇 the self-adaptiv...
  • 1 篇 digital rights m...
  • 1 篇 short transmissi...
  • 1 篇 dual modes
  • 1 篇 provably secure
  • 1 篇 designation
  • 1 篇 cryptography

机构

  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 department of ma...
  • 1 篇 institute of com...
  • 1 篇 department of el...
  • 1 篇 school of inform...
  • 1 篇 school of comput...
  • 1 篇 national enginee...
  • 1 篇 beijing national...
  • 1 篇 state key labora...
  • 1 篇 nanjing universi...
  • 1 篇 key laboratory o...
  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 key laboratory o...
  • 1 篇 key laboratory o...
  • 1 篇 institute for in...
  • 1 篇 department of ap...
  • 1 篇 school of comput...
  • 1 篇 zhengzhou univer...

作者

  • 2 篇 张乐友
  • 2 篇 胡予濮
  • 1 篇 chen e
  • 1 篇 wang zhiwei
  • 1 篇 xin-fang zhang
  • 1 篇 zhang weidong lu...
  • 1 篇 chen yue
  • 1 篇 吴永东
  • 1 篇 yang kuiwu
  • 1 篇 孙瑾
  • 1 篇 weng jian liu sh...
  • 1 篇 邓慧杰
  • 1 篇 牟宁波
  • 1 篇 mu ning-bo
  • 1 篇 jie tian
  • 1 篇 huang qin-long
  • 1 篇 ou hai-wen
  • 1 篇 jia hongyong
  • 1 篇 zhang yichun liu...
  • 1 篇 guo yuanbo

语言

  • 13 篇 英文
检索条件"主题词=broadcast encryption"
13 条 记 录,以下是1-10 订阅
排序:
broadcast encryption schemes based on RSA
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2009年 第1期16卷 69-75页
作者: MU Ning-bo HU Yu-pu OU Hai-wen The Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Key Laboratory of Information Security and Secrecy Beijing Institute of Electronic Science and Technology Beijing 100070 China
Three broadcast schemes for small receiver set using the property of RSA modulus are presented. They can solve the problem of data redundancy when the size of receiver set is small. In the proposed schemes, the center... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient broadcast encryption Supporting Designation and Revocation Mechanisms
收藏 引用
Chinese Journal of Electronics 2019年 第3期28卷 445-456页
作者: ZHU Yan YU Ruyun CHEN E HUANG Dijiang School of Computer and Communication Engineering University of Science and Technology Beijing School of Computing Informatics and Decision System Engineering Arizona State University
In this paper our objective is to explore approaches of secure group-oriented communication with designation and revocation mechanisms *** present a new scheme of Revocation-based broadcast encryption(RBBE) which is d... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Revocable broadcast encryption with Constant Ciphertext and Private Key Size
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 690-697页
作者: JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei Zhengzhou University State Key Laboratory of Mathematical Engineering and Advanced Computing Nanjing University of Post and Communications
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the revocable broadcast encryption have been found in the secure clo... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Identity-based broadcast encryption with Shorter Transmissions
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2008年 第6期13卷 641-645页
作者: 张乐友 胡予濮 牟宁波 Department of Mathematical Science Xidian University Xi'an 710071China Key Laboratory of Computer Networks and Information Security Ministry of EducationXidian UniversityXi'an 710071China
This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Pirate decoder for the broadcast encryption schemes from Crypto 2005
收藏 引用
Science in China(Series F) 2007年 第3期50卷 318-323页
作者: WENG Jian LIU ShengLi CHEN KeFei Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240China
In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they giv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Chosen Ciphertext Secure Identity-Based broadcast encryption in the Standard Model
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第6期16卷 672-676页
作者: 孙瑾 胡予濮 张乐友 Key Laboratory of Computer Network and Information Security Xidian University Department of Application Mathematics Xi'an University of Technology
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Implementing broadcast encryption Scheme Using Bilinear Map and Group Characteristic
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1554-1558页
作者: ZHANG Yichun LIU Jianbo JIN Libiao LI Jianzeng School of Information Engineering Communication University of China Beijing 100024 China
This paper introduced a novel method for implementing broadcast encryption. Our scheme takes advantages of bilinear map and group characteristic, and shifts most of the storage overhead to the public device instead of... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient broadcast encryption Scheme Based on Number Theory Research Unit
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第3期15卷 247-250页
作者: ZHANG Weidong LU Xixiang LI Hui State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 Shaanxi China
In this paper, a new broadcast encryption scheme is proposed by using the efficient and computationally inexpensive public key cryptosystem NTRU (number theory research unit). In our scheme, we use the idea of RSA a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research on RSA-based broadcast encryption Scheme in Web Multimedia
Research on RSA-based Broadcast Encryption Scheme in Web Mul...
收藏 引用
2012 National Conference on Information Technology and Computer Science
作者: Liang Xue College of Computer Science Sichuan University Chengdu,China Du Zhongjun College of Computer Science Sichuan University Chengdu,Sichuan
With the development of web multimedia technology,broadcast encryption schemes play an important role in multimedia services copyright *** this paper,we propose a new broadcast encryption scheme based on RSA,besides,w... 详细信息
来源: cnki会议 评论
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes
收藏 引用
Journal of Computer Science & Technology 2010年 第2期25卷 362-374页
作者: 吴永东 Member, IEEE 邓慧杰 Institute for Infocomm Research A STAR 138632 Singapore School of Information Systems Singapore Management University 178902 Singapore
In this paper we introduce an architecture for a multi-key pirate decoder which employs decryption keys from multiple traitors. The decoder has built-in monitoring and self protection functionalities and is capable of... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论