Search scope:
排序: Display mode:
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2, Pages 135-142 doi: 10.1631/FITEE.1500197
Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteRecently,many efforts have been made to construct identity-based signatures over lattice assumptionsIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.
Keywords: Identity Signature Lattice Number theory research unit (NTRU)
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2, Pages 141-286 doi: 10.1631/FITEE.1900318
Keywords: Identity-based signature Lattice Strong unforgeability Random oracle model
Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo
Frontiers of Medicine 2012, Volume 6, Issue 1, Pages 79-84 doi: 10.1007/s11684-012-0179-5
Keywords: health insurance urban employee basic health insurance scheme urban-resident scheme new rural cooperative medical system
Development and Application of Network Electronic Identity Management in Major Countries and Regions
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020
Keywords: network electronic identity identity management digital signature
Cryptanalysis of an identity-based public auditing protocol for cloud storage Comment
Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12, Pages 1972-1977 doi: 10.1631/FITEE.1601530
Keywords: Cloud data Public auditing Data integrity Data privacy
Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2, Pages 258-277 doi: 10.1631/FITEE.2000366
Keywords: Post-quantum cryptography Threshold proxy re-encryption Lattices Robustness Decentralization
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation
ZHOU Bing, CUI Guixiang, CHEN Naixiang
Frontiers in Energy 2007, Volume 1, Issue 4, Pages 468-472 doi: 10.1007/s11708-007-0069-z
Keywords: large-eddy simulation Germano identity coefficient subgrid-scale
Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 2, Pages 168-182 doi: 10.1007/s11705-021-2056-8
Keywords: computer-aided molecular design bio-oil additives molecular signature descriptor
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005
This paper analyzes and sorts out the policies, laws, and regulations of network electronic identityIt discusses the development of China's network identity management, and outlines the 13th Five-YearPlan's policies and regulations for network electronic identity management in China, including thedevelopment of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.
Keywords: network electronic identity identity management policies and regulations
Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1, Pages 95-108 doi: 10.15302/J-FASE-2022478
● Consumer preference for environmentally-friendly beverage packaging was investigated.
Keywords: China consumer preference food and beverage packaging green identity label information treatment
The effects of festivals and special events on city image design
LIU Yuan, CHEN Chong
Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2, Pages 255-259 doi: 10.1007/s11709-007-0032-0
Keywords: Visual Identity reversal transmission marketing Behavior Identity
Certificateless broadcast multi-signature for network coding Research Article
Huifang YU, Zhewei QI
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1369-1377 doi: 10.1631/FITEE.2200271
Keywords: Network coding Certificateless multi-signature Linear combination Homomorphic hash function
Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature
Frontiers of Medicine 2023, Volume 17, Issue 4, Pages 768-780 doi: 10.1007/s11684-023-0982-1
Keywords: machine learning methods hypertrophic cardiomyopathy genetic risk
Verifier-local revocation group signatures with backward unlinkability from lattices Research Articles
Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6, Pages 876-892 doi: 10.1631/FITEE.2000507
Keywords: Group signature Lattice-based cryptography Verifier-local revocation Backward unlikability Short
Title Author Date Type Operation
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Journal Article
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Journal Article
Integration of current identity-based district-varied health insurance schemes in China: implications
Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo
Journal Article
Development and Application of Network Electronic Identity Management in Major Countries and Regions
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Journal Article
Cryptanalysis of an identity-based public auditing protocol for cloud storage
Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN
Journal Article
Identity-based threshold proxy re-encryption scheme from lattices and its applications
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation
ZHOU Bing, CUI Guixiang, CHEN Naixiang
Journal Article
Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular
Journal Article
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Journal Article
CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY
Journal Article
The effects of festivals and special events on city image design
LIU Yuan, CHEN Chong
Journal Article
Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature
Journal Article