Resource Type

Journal Article 1616

Conference Videos 42

Year

2024 3

2023 133

2022 171

2021 152

2020 134

2019 122

2018 100

2017 101

2016 74

2015 86

2014 53

2013 43

2012 36

2011 44

2010 47

2009 49

2008 55

2007 69

2006 47

2005 34

open ︾

Keywords

optimization 18

Machine learning 13

multi-objective optimization 10

neural network 10

genetic algorithm 9

Deep learning 7

Reinforcement learning 7

big data 7

different 5

fault diagnosis 5

reliability 5

sustainable development 5

topology optimization 5

Adsorption 4

Artificial intelligence 4

COVID-19 4

Neural network 4

algorithm 4

blockchain 4

open ︾

Search scope:

排序: Display mode:

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2,   Pages 135-142 doi: 10.1631/FITEE.1500197

Abstract:

Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteRecently,many efforts have been made to construct identity-based signatures over lattice assumptionsIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.

Keywords: Identity     Signature     Lattice     Number theory research unit (NTRU)    

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2,   Pages 141-286 doi: 10.1631/FITEE.1900318

Abstract: With the rapid development of electronic information technology, digital signature has become an indispensableIdentity-based cryptosystems can avoid the certificate management issues.To overcome this problem, we construct an IBS scheme on s by employing Lyubashevsky’s signature schemeBased on the shortest vector problem on s, our scheme does not use Gaussian sampling or trapdoor technologiesIn the , it is proved that our scheme is strongly unforgeable against adaptive chosen messages and identity

Keywords: Identity-based signature     Lattice     Strong unforgeability     Random oracle model    

Integration of current identity-based district-varied health insurance schemes in China: implications

Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo

Frontiers of Medicine 2012, Volume 6, Issue 1,   Pages 79-84 doi: 10.1007/s11684-012-0179-5

Abstract: Despite their phasic success, these substantially identity-based, district-varied health insurance schemesTherefore, the establishment of an urban-rural integrated, citizen-based, and nationwide-universal health

Keywords: health insurance     urban employee basic health insurance scheme     urban-resident scheme     new rural cooperative medical system    

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020

Abstract: paper analyzes and sorts out the latest developments and typical applications of network electronic identitymanagement in major countries and regions around the world, and discusses development trends in network identityIt outlines network electronic identity management in China according to the 13th Five-Year Plan, includingthe development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.

Keywords: network electronic identity     identity management     digital signature    

Cryptanalysis of an identity-based public auditing protocol for cloud storage Comment

Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 1972-1977 doi: 10.1631/FITEE.1601530

Abstract: Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloudHowever, in this paper, we pinpoint that NaEPASC is vulnerable to the signature forgery attack in thesetup phase; i.e., a malicious cloud server can forge a valid signature for an arbitrary data blockwork is helpful for cryptographers and engineers to design and implement more secure and efficient identity-based

Keywords: Cloud data     Public auditing     Data integrity     Data privacy    

Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2,   Pages 258-277 doi: 10.1631/FITEE.2000366

Abstract: A non-interactive identity-based TPRE (IB-TPRE) scheme over is proposed which removes the public keyThis property is achieved by lattice-based fully homomorphic signatures.The security of the proposed scheme is based on the decisional learning with error hardness assumptionTwo typical application scenarios, including a file-sharing system based on a blockchain network and

Keywords: Post-quantum cryptography     Threshold proxy re-encryption     Lattices     Robustness     Decentralization    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchicalidentity based encryption (HIBE) scheme in the standard model whose public key size is only ( ) loga novel public key assignment rule is used to averagely assign one random and public matrix to two identityexpansion factor of the proposed scheme to log , the encryption algorithm of this scheme is built basedselective identity and chosen plaintext attacks.

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation

ZHOU Bing, CUI Guixiang, CHEN Naixiang

Frontiers in Energy 2007, Volume 1, Issue 4,   Pages 468-472 doi: 10.1007/s11708-007-0069-z

Abstract: Current dynamic procedures in large-eddy simulation treat the two subgrid-scale stresses in the Germano identity

Keywords: large-eddy simulation     Germano identity     coefficient     subgrid-scale    

Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular

Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 2,   Pages 168-182 doi: 10.1007/s11705-021-2056-8

Abstract: different property prediction models consist different levels of structural information, molecular signature

Keywords: computer-aided molecular design     bio-oil additives     molecular signature descriptor    

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005

Abstract:

This paper analyzes and sorts out the policies, laws, and regulations of network electronic identityIt discusses the development of China's network identity management, and outlines the 13th Five-YearPlan's policies and regulations for network electronic identity management in China, including thedevelopment of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.

Keywords: network electronic identity     identity management     policies and regulations    

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1,   Pages 95-108 doi: 10.15302/J-FASE-2022478

Abstract:

● Consumer preference for environmentally-friendly beverage packaging was investigated.

Keywords: China     consumer preference     food and beverage packaging     green identity label     information treatment    

The effects of festivals and special events on city image design

LIU Yuan, CHEN Chong

Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2,   Pages 255-259 doi: 10.1007/s11709-007-0032-0

Abstract: The unique image of the city could be identified by the City Mind Identity, the City Visual Identityand the City Behavior Identity concerned with festivals and special events.

Keywords: Visual Identity     reversal     transmission     marketing     Behavior Identity    

Certificateless broadcast multi-signature for network coding Research Article

Huifang YU, Zhewei QI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1369-1377 doi: 10.1631/FITEE.2200271

Abstract: To solve these problems, the certificateless broadcast multi-signature for (NC-CLBMS) method is devised, where each source node user generates a multi-signature about the message vector, and the intermediateNC-CLBMS is a multi-source multi-signature method with anti-pollution and anti-forgery advantages; moreover, it has a fixed signature length and its computation efficiency is very high.

Keywords: Network coding     Certificateless multi-signature     Linear combination     Homomorphic hash function    

Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature

Frontiers of Medicine 2023, Volume 17, Issue 4,   Pages 768-780 doi: 10.1007/s11684-023-0982-1

Abstract: of each HCM subtype by using machine learning modeling and interactome network detection techniques basedMachine learning modeling based on personal whole-exome data identified 46 genes with mutation burden

Keywords: machine learning methods     hypertrophic cardiomyopathy     genetic risk    

Verifier-local revocation group signatures with backward unlinkability from lattices Research Articles

Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6,   Pages 876-892 doi: 10.1631/FITEE.2000507

Abstract: flexible choice, because it requires only that verifiers download up-to-date revocation information for signaturecryptographic counterpart of classical number-theoretic cryptographic constructions, the first lattice-basedHowever, none of the contemporary lattice-based VLR-GS schemes provide backward unlinkability (BU), whichIn this study, we introduce the first lattice-based VLR-GS scheme with BU security (VLR-GS-BU), and thus

Keywords: Group signature     Lattice-based cryptography     Verifier-local revocation     Backward unlikability     Short    

Title Author Date Type Operation

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Journal Article

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Journal Article

Integration of current identity-based district-varied health insurance schemes in China: implications

Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo

Journal Article

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Journal Article

Cryptanalysis of an identity-based public auditing protocol for cloud storage

Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN

Journal Article

Identity-based threshold proxy re-encryption scheme from lattices and its applications

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation

ZHOU Bing, CUI Guixiang, CHEN Naixiang

Journal Article

Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular

Journal Article

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Journal Article

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Journal Article

The effects of festivals and special events on city image design

LIU Yuan, CHEN Chong

Journal Article

Certificateless broadcast multi-signature for network coding

Huifang YU, Zhewei QI

Journal Article

Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature

Journal Article

Verifier-local revocation group signatures with backward unlinkability from lattices

Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA

Journal Article