Search scope:
排序: Display mode:
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2, Pages 258-277 doi: 10.1631/FITEE.2000366
Keywords: Post-quantum cryptography Threshold proxy re-encryption Lattices Robustness Decentralization
Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo
Frontiers of Medicine 2012, Volume 6, Issue 1, Pages 79-84 doi: 10.1007/s11684-012-0179-5
Keywords: health insurance urban employee basic health insurance scheme urban-resident scheme new rural cooperative
Scheme and Techniques for Hierarchical Oranization of Video
Zhang Yujin,Lu Haibin
Strategic Study of CAE 2000, Volume 2, Issue 3, Pages 18-22
Keywords: video organization browsing shot episode key frame representative frame
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2, Pages 135-142 doi: 10.1631/FITEE.1500197
Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteRecently,many efforts have been made to construct identity-based signatures over lattice assumptionsIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.
Keywords: Identity Signature Lattice Number theory research unit (NTRU)
Aleakage-resilient certificateless public key encryption scheme withCCA2security None
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4, Pages 481-493 doi: 10.1631/FITEE.1601849
Keywords: Certificateless public-key encryption Leakage-resilience Provable security CCA2 security Decisional Diffie-Hellman
A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article
Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng
Engineering 2021, Volume 7, Issue 6, Pages 787-797 doi: 10.1016/j.eng.2021.03.011
Keywords: Information security Cloud-based design and manufacture Co-design CAD assembly models Attribute-basedencryption
A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation
ZHOU Bing, CUI Guixiang, CHEN Naixiang
Frontiers in Energy 2007, Volume 1, Issue 4, Pages 468-472 doi: 10.1007/s11708-007-0069-z
Keywords: large-eddy simulation Germano identity coefficient subgrid-scale
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2, Pages 141-286 doi: 10.1631/FITEE.1900318
Keywords: Identity-based signature Lattice Strong unforgeability Random oracle model
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations Research Article
Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6, Pages 813-827 doi: 10.1631/FITEE.2200645
Keywords: Compressive sensing Coupled map lattice (CML) DNA operations Semi-tensor product
Development and Application of Network Electronic Identity Management in Major Countries and Regions
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020
Keywords: network electronic identity identity management digital signature
Generic user revocation systems for attribute-based encryption in cloud storage None
Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11, Pages 1362-1384 doi: 10.1631/FITEE.1800405
Cloud-based storage is a service model for businesses and individual users that involves paid or freeAttribute-based encryption (ABE) not only protects data secrecy, but also has ciphertexts or decryptiongeneric user revocation systems for ABE with user privacy protection, user revocation via ciphertext re-encryption(UR-CRE) and user revocation via cloud storage providers (UR-CSP), which work with any type of ABE scheme
Keywords: Attribute-based encryption Generic user revocation User privacy Cloud storage Access control
Zhaoxing HAN, Zhenyao SHEN, Yongwei GONG, Qian HONG
Frontiers of Environmental Science & Engineering 2011, Volume 5, Issue 1, Pages 119-129 doi: 10.1007/s11783-011-0272-z
Keywords: emission trading water functional zone water quality control
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005
This paper analyzes and sorts out the policies, laws, and regulations of network electronic identityIt discusses the development of China's network identity management, and outlines the 13th Five-YearPlan's policies and regulations for network electronic identity management in China, including thedevelopment of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.
Keywords: network electronic identity identity management policies and regulations
Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1, Pages 95-108 doi: 10.15302/J-FASE-2022478
● Consumer preference for environmentally-friendly beverage packaging was investigated.
Keywords: China consumer preference food and beverage packaging green identity label information treatment
Title Author Date Type Operation
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
Identity-based threshold proxy re-encryption scheme from lattices and its applications
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Journal Article
Integration of current identity-based district-varied health insurance schemes in China: implications
Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo
Journal Article
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Journal Article
Aleakage-resilient certificateless public key encryption scheme withCCA2security
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Journal Article
A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models
Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng
Journal Article
A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation
ZHOU Bing, CUI Guixiang, CHEN Naixiang
Journal Article
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Journal Article
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn
Journal Article
Development and Application of Network Electronic Identity Management in Major Countries and Regions
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Journal Article
Generic user revocation systems for attribute-based encryption in cloud storage
Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI
Journal Article
Temporal dimension and water quality control in an emission trading scheme based on water environmental
Zhaoxing HAN, Zhenyao SHEN, Yongwei GONG, Qian HONG
Journal Article
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Journal Article