咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 6 篇 计算机科学与技术...
    • 6 篇 网络空间安全
    • 4 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 信息与通信工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 生物医学工程(可授...
  • 5 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 9 篇 certificateless ...
  • 2 篇 aggregate signat...
  • 2 篇 bilinear pairing
  • 1 篇 cdh assumption
  • 1 篇 random oracle
  • 1 篇 iot
  • 1 篇 key replacement ...
  • 1 篇 malicious key ge...
  • 1 篇 blockchain
  • 1 篇 random oracle mo...
  • 1 篇 se ck model
  • 1 篇 pairing
  • 1 篇 ind-cca secure
  • 1 篇 pairing-free
  • 1 篇 ring signcryptio...
  • 1 篇 cloud storage au...
  • 1 篇 identity authent...
  • 1 篇 authenticated ke...
  • 1 篇 internet of thin...
  • 1 篇 universal design...

机构

  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 zhengzhou univer...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 guangzhou instit...
  • 1 篇 school of comput...
  • 1 篇 anhui engineerin...
  • 1 篇 department of ap...
  • 1 篇 ansys southpoint...
  • 1 篇 college of compu...
  • 1 篇 guangzhou lianro...
  • 1 篇 state key labora...
  • 1 篇 college of infor...
  • 1 篇 center for advan...
  • 1 篇 school of comput...
  • 1 篇 key laboratory o...
  • 1 篇 the hong kong po...

作者

  • 1 篇 haiyan sun
  • 1 篇 祁正华
  • 1 篇 li-bo he
  • 1 篇 ding long
  • 1 篇 chi-shiang chan
  • 1 篇 zhou enyuan
  • 1 篇 yu-chi chen
  • 1 篇 liang zhao
  • 1 篇 xu rui
  • 1 篇 hong yuxuan
  • 1 篇 cui li
  • 1 篇 gwoboa homg
  • 1 篇 hu xiong
  • 1 篇 任勋益
  • 1 篇 xu yan
  • 1 篇 dong-jie yan
  • 1 篇 li zheng
  • 1 篇 liu lei
  • 1 篇 杨庚
  • 1 篇 pei qingqi

语言

  • 8 篇 英文
  • 1 篇 中文
检索条件"主题词=certificateless cryptography"
9 条 记 录,以下是1-10 订阅
排序:
Utilizing certificateless cryptography for IoT Device Identity Authentication Protocols in Web3
收藏 引用
ZTE Communications 2024年 第2期22卷 30-38页
作者: WU Zhihui HONG Yuxuan ZHOU Enyuan LIU Lei PEI Qingqi Guangzhou Institute of Technology Xidian UniversityGuangzhou 510700China Guangzhou Lianrong Information Technology Co.Ltd. Guangzhou 510700China The Hong Kong Polytechnic University Hong Kong 999077China
Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approac... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cross-domain data cloud storage auditing scheme based on certificateless cryptography
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2021年 第6期28卷 36-47页
作者: Xu Yan Li Zheng Ding Long Xu Rui School of Computer Science and Technology Anhui UniversityHefei 230039China Anhui Engineering Laboratory of IoT Security Technologies Anhui UniversityHefei 230039China School of Computer University of Geosciences(Wuhan)Wuhan 430078China
With the development of Internet of things(IoT), more and more intelligent terminal devices outsource data to cloud servers(CSs). However, the CS is not fully trusted, and the heterogeneity among different domains mak... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 107-122页
作者: Haiyan SUN Qiaoyan WEN Wenmin LI State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Zhengzhou University of Light Industry
certificateless authenticated key agreement(CL-AKA) protocols have been studied a great deal since they neither suffer from a heavy certificate management burden nor have the key escrow problem. Recently, many efficie... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
certificateless universal designated verifier signature schemes
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2007年 第3期14卷 85-90,94页
作者: MING Yang SHEN Xiao-qin WANG Yu-min State Key Laboratory of Integrated Service Network Xidian UniversityXi'an 710071 China
Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unabl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Pairing-Free certificateless Key-Insulated Encryption with Provable Security
收藏 引用
Journal of Electronic Science and Technology 2018年 第1期16卷 50-56页
作者: Li-Bo He Dong-Jie Yan Hu Xiong Zhi-Guang Qin School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054
certificateless encryption attracts a lot of attention so far by eliminating the key escrow problem in identity-based encryption and public key certificates in the traditional public key cryptography. By considering t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient certificateless Aggregate Signature Scheme Designed for VANET
收藏 引用
Computers, Materials & Continua 2020年 第5期63卷 725-742页
作者: Cui Li Gang Wu Lipeng Xing Feng Zhu Liang Zhao College of Information and Communication National University of Defense TechnologyXi’anChina Ansys Southpointe 2600 ANSYS Drive CanonsburgCommonwealth of Pennsylvania15317USA
The Vehicular Ad-hoc Network(VANET)is the fundamental of smart transportation system in the future,but the security of the communication between vehicles and vehicles,between vehicles and roadside infrastructures have... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
certificateless Encryption Scheme Secure in Standard Model
收藏 引用
Tsinghua Science and Technology 2009年 第4期14卷 452-459页
作者: 张国艳 王小云 School of Computer Science and Technology Shandong University Key Laboratory of Cryptologic Technology and Information Security of the Ministry of Education Shandong University Center for Advanced Study Tsinghua University
The scheme introduced by Hwang and Liu in 2008 is shown to be insecure against the key re- placement attack. A more practical attack model is introduced, and according to this model, an efficient cer- tificateless enc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
一种可证安全的无证书环签密方案(英文)
收藏 引用
China Communications 2011年 第3期8卷 99-106页
作者: 祁正华 杨庚 任勋益 College of Computer Science & Technology Nanjing University of Posts and Telecommunications
Ring signcryption enables a user to send a message confidentially and authentically to a specific receiver in an anonymous way.One of the main reasons for the slow adoption of identity-based cryptography is the inhere... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient certificateless Aggregate Signature Scheme
收藏 引用
Journal of Electronic Science and Technology 2012年 第3期10卷 209-214页
作者: Yu-Chi Chen Gwoboa Homg Chao-Liang Liu Yuan-Yu Tsa Chi-Shiang Chan Department of Computer Science and Engineering National Chung-Hsing University Taichung Department of Applied Informatics and Multimedia Asia University Taichung
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before f... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论