Resource Type

Journal Article 1727

Conference Videos 44

Year

2024 4

2023 141

2022 177

2021 165

2020 143

2019 130

2018 106

2017 109

2016 83

2015 90

2014 57

2013 49

2012 42

2011 47

2010 49

2009 53

2008 57

2007 73

2006 50

2005 34

open ︾

Keywords

optimization 18

Machine learning 13

multi-objective optimization 10

topology optimization 10

genetic algorithm 9

neural network 8

Deep learning 7

Reinforcement learning 7

big data 7

algorithm 6

different 5

fault diagnosis 5

sustainable development 5

Adsorption 4

Artificial intelligence 4

Blockchain 4

CO2 capture 4

COVID-19 4

Neural network 4

open ︾

Search scope:

排序: Display mode:

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchicalidentity based encryption (HIBE) scheme in the standard model whose public key size is only ( ) logTo reduce the message-ciphertext expansion factor of the proposed scheme to log , the encryption algorithmof this scheme is built based on Gentry’s encryption scheme, by which m bits of plaintext are encryptedBased on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2,   Pages 258-277 doi: 10.1631/FITEE.2000366

Abstract: A non-interactive identity-based TPRE (IB-TPRE) scheme over is proposed which removes the public keyTo accomplish this scheme, Shamir‘s secret sharing is employed twice, which not only effectively hidesthe delegator‘s private key information, but also decentralizes the proxy power by splitting the re-encryptionThis property is achieved by lattice-based fully homomorphic signatures.The security of the proposed scheme is based on the decisional learning with error hardness assumption

Keywords: Post-quantum cryptography     Threshold proxy re-encryption     Lattices     Robustness     Decentralization    

Integration of current identity-based district-varied health insurance schemes in China: implications

Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo

Frontiers of Medicine 2012, Volume 6, Issue 1,   Pages 79-84 doi: 10.1007/s11684-012-0179-5

Abstract: health insurance schemes in China fall into three categories: urban employee basic health insurance scheme, urban resident scheme, and new rural cooperative medical system.Despite their phasic success, these substantially identity-based, district-varied health insurance schemesTherefore, the establishment of an urban-rural integrated, citizen-based, and nationwide-universal healthinsurance scheme by the government is critically important to attain equality and national connection

Keywords: health insurance     urban employee basic health insurance scheme     urban-resident scheme     new rural cooperative    

Scheme and Techniques for Hierarchical Oranization of Video

Zhang Yujin,Lu Haibin

Strategic Study of CAE 2000, Volume 2, Issue 3,   Pages 18-22

Abstract: This paper proposes a video organization scheme, which arranges video into four layers: video programThis hierarchical structure provides a compact and meaningful video catalogue, which can be easily usedfor non-linear browsing and content-based retrieval of video data.organization results using real video data are presented, which show the effectiveness of this organization scheme

Keywords: video     organization     browsing     shot     episode     key frame     representative frame    

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2,   Pages 135-142 doi: 10.1631/FITEE.1500197

Abstract:

Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteRecently,many efforts have been made to construct identity-based signatures over lattice assumptionsIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.

Keywords: Identity     Signature     Lattice     Number theory research unit (NTRU)    

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless public-key encryptionscheme is proposed, whose security is proved based on the hardness of the classic decisional Diffie-Hellman

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Engineering 2021, Volume 7, Issue 6,   Pages 787-797 doi: 10.1016/j.eng.2021.03.011

Abstract: This paper presents a novel attribute-based encryption (ABE) approach for computer-aided design (CAD)assembly models to effectively support hierarchical access control, integrity verification, and deformationAn assembly hierarchy access tree (AHAT) is designed as the hierarchical access structure.The proposed encryption scheme is demonstrated to be secure under the standard assumption.

Keywords: Information security     Cloud-based design and manufacture     Co-design     CAD assembly models     Attribute-basedencryption    

A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation

ZHOU Bing, CUI Guixiang, CHEN Naixiang

Frontiers in Energy 2007, Volume 1, Issue 4,   Pages 468-472 doi: 10.1007/s11708-007-0069-z

Abstract: Current dynamic procedures in large-eddy simulation treat the two subgrid-scale stresses in the Germano identity

Keywords: large-eddy simulation     Germano identity     coefficient     subgrid-scale    

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2,   Pages 141-286 doi: 10.1631/FITEE.1900318

Abstract: Identity-based cryptosystems can avoid the certificate management issues.To overcome this problem, we construct an IBS scheme on s by employing Lyubashevsky’s signature schemeBased on the shortest vector problem on s, our scheme does not use Gaussian sampling or trapdoor technologiesIn the , it is proved that our scheme is strongly unforgeable against adaptive chosen messages and identityThe security level of our scheme is strongly unforgeable, which is a higher level than the existential

Keywords: Identity-based signature     Lattice     Strong unforgeability     Random oracle model    

A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations Research Article

Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6,   Pages 813-827 doi: 10.1631/FITEE.2200645

Abstract: In this paper, an efficient image encryption scheme based on a novel mixed linear–nonlinear coupled mapproposed NMLNCML system strengthens the chaotic characteristics of the system, and is applicable for image encryptionAn SHA-384 function is used to produce plaintext secret keys and thus makes the proposed encryption algorithmSimulation results and performance analyses verify the security and effectiveness of our scheme.

Keywords: Compressive sensing     Coupled map lattice (CML)     DNA operations     Semi-tensor product    

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020

Abstract: paper analyzes and sorts out the latest developments and typical applications of network electronic identitymanagement in major countries and regions around the world, and discusses development trends in network identityIt outlines network electronic identity management in China according to the 13th Five-Year Plan, includingthe development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.

Keywords: network electronic identity     identity management     digital signature    

Generic user revocation systems for attribute-based encryption in cloud storage None

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11,   Pages 1362-1384 doi: 10.1631/FITEE.1800405

Abstract:

Cloud-based storage is a service model for businesses and individual users that involves paid or freeAttribute-based encryption (ABE) not only protects data secrecy, but also has ciphertexts or decryptiongeneric user revocation systems for ABE with user privacy protection, user revocation via ciphertext re-encryption(UR-CRE) and user revocation via cloud storage providers (UR-CSP), which work with any type of ABE scheme

Keywords: Attribute-based encryption     Generic user revocation     User privacy     Cloud storage     Access control    

Temporal dimension and water quality control in an emission trading scheme based on water environmental

Zhaoxing HAN, Zhenyao SHEN, Yongwei GONG, Qian HONG

Frontiers of Environmental Science & Engineering 2011, Volume 5, Issue 1,   Pages 119-129 doi: 10.1007/s11783-011-0272-z

Abstract: In this study, a new emission trading scheme was addressed based on WEFZ, accounting for both the temporalA temporal factor of emission trading was proposed based on variations in the environmental capacityA water quality-control scheme was suggested based on the water quality requirement in the water functionalThe temporal and spatial factors above should be incorporated into the emission trading scheme based

Keywords: emission trading     water functional zone     water quality control    

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005

Abstract:

This paper analyzes and sorts out the policies, laws, and regulations of network electronic identityIt discusses the development of China's network identity management, and outlines the 13th Five-YearPlan's policies and regulations for network electronic identity management in China, including thedevelopment of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.

Keywords: network electronic identity     identity management     policies and regulations    

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1,   Pages 95-108 doi: 10.15302/J-FASE-2022478

Abstract:

● Consumer preference for environmentally-friendly beverage packaging was investigated.

Keywords: China     consumer preference     food and beverage packaging     green identity label     information treatment    

Title Author Date Type Operation

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

Identity-based threshold proxy re-encryption scheme from lattices and its applications

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Journal Article

Integration of current identity-based district-varied health insurance schemes in China: implications

Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo

Journal Article

Scheme and Techniques for Hierarchical Oranization of Video

Zhang Yujin,Lu Haibin

Journal Article

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Journal Article

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Journal Article

A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation

ZHOU Bing, CUI Guixiang, CHEN Naixiang

Journal Article

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Journal Article

A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations

Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn

Journal Article

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Journal Article

Generic user revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Journal Article

Temporal dimension and water quality control in an emission trading scheme based on water environmental

Zhaoxing HAN, Zhenyao SHEN, Yongwei GONG, Qian HONG

Journal Article

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Journal Article

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Journal Article