Resource Type

Journal Article 13

Year

2023 1

2022 1

2021 2

2019 1

2017 1

2016 4

2012 1

2007 2

open ︾

Keywords

Lattice 2

identity management 2

network electronic identity 2

Anti-jamming 1

Behavior Identity 1

China 1

Cloud data 1

Cross-eye jamming 1

Data integrity 1

Data privacy 1

Decentralization 1

Gaussian 1

Germano identity 1

Hierarchical identity based encryption scheme 1

Identity 1

Identity-based signature 1

Kaya identity 1

Lattice-based cryptography 1

Lattices 1

Learning with errors problem 1

open ︾

Search scope:

排序: Display mode:

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020

Abstract: paper analyzes and sorts out the latest developments and typical applications of network electronic identitymanagement in major countries and regions around the world, and discusses development trends in network identityIt outlines network electronic identity management in China according to the 13th Five-Year Plan, includingthe development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.

Keywords: network electronic identity     identity management     digital signature    

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005

Abstract:

This paper analyzes and sorts out the policies, laws, and regulations of network electronic identityIt discusses the development of China's network identity management, and outlines the 13th Five-YearPlan's policies and regulations for network electronic identity management in China, including thedevelopment of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system.

Keywords: network electronic identity     identity management     policies and regulations    

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1,   Pages 95-108 doi: 10.15302/J-FASE-2022478

Abstract:

● Consumer preference for environmentally-friendly beverage packaging was investigated.

Keywords: China     consumer preference     food and beverage packaging     green identity label     information treatment    

The effects of festivals and special events on city image design

LIU Yuan, CHEN Chong

Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2,   Pages 255-259 doi: 10.1007/s11709-007-0032-0

Abstract: The unique image of the city could be identified by the City Mind Identity, the City Visual Identityand the City Behavior Identity concerned with festivals and special events.

Keywords: Visual Identity     reversal     transmission     marketing     Behavior Identity    

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2,   Pages 135-142 doi: 10.1631/FITEE.1500197

Abstract:

Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteRecently,many efforts have been made to construct identity-based signatures over lattice assumptionsIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.

Keywords: Identity     Signature     Lattice     Number theory research unit (NTRU)    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identitya novel public key assignment rule is used to averagely assign one random and public matrix to two identityhardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

Integration of current identity-based district-varied health insurance schemes in China: implications

Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo

Frontiers of Medicine 2012, Volume 6, Issue 1,   Pages 79-84 doi: 10.1007/s11684-012-0179-5

Abstract: Despite their phasic success, these substantially identity-based, district-varied health insurance schemes

Keywords: health insurance     urban employee basic health insurance scheme     urban-resident scheme     new rural cooperative medical system    

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2,   Pages 141-286 doi: 10.1631/FITEE.1900318

Abstract: Identity-based cryptosystems can avoid the certificate management issues.In the , it is proved that our scheme is strongly unforgeable against adaptive chosen messages and identity

Keywords: Identity-based signature     Lattice     Strong unforgeability     Random oracle model    

A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation

ZHOU Bing, CUI Guixiang, CHEN Naixiang

Frontiers in Energy 2007, Volume 1, Issue 4,   Pages 468-472 doi: 10.1007/s11708-007-0069-z

Abstract: Current dynamic procedures in large-eddy simulation treat the two subgrid-scale stresses in the Germano identity

Keywords: large-eddy simulation     Germano identity     coefficient     subgrid-scale    

Cryptanalysis of an identity-based public auditing protocol for cloud storage Comment

Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 1972-1977 doi: 10.1631/FITEE.1601530

Abstract: Recently, Tan and Jia (2014) proposed an identity-based public verification (NaEPASC) protocol for cloudwork is helpful for cryptographers and engineers to design and implement more secure and efficient identity-based

Keywords: Cloud data     Public auditing     Data integrity     Data privacy    

Energy Demand and Carbon Emission Peak Paths for the Rise of Central China

Cheng Yunhe, Dong Hongguang, Geng Jichao, He Jishan

Strategic Study of CAE 2021, Volume 23, Issue 1,   Pages 68-78 doi: 10.15302/J-SSCAE-2021.01.014

Abstract: Using the Kaya identity, this study categorizes the energy consumption demand brought by the rise of

Keywords: energy revolution     rise of Central China     Kaya identity     scenario analysis     carbon emission peak    

Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2,   Pages 258-277 doi: 10.1631/FITEE.2000366

Abstract: A non-interactive identity-based TPRE (IB-TPRE) scheme over is proposed which removes the public key

Keywords: Post-quantum cryptography     Threshold proxy re-encryption     Lattices     Robustness     Decentralization    

A novel algorithm to counter cross-eye jamming based on a multi-target model Research Articles

Zhi-yong SONG, Xing-lin SHEN, Qiang FU

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7,   Pages 988-1001 doi: 10.1631/FITEE.1800394

Abstract: Particle identity labels that represent the properties of target and jamming are introduced into the

Keywords: Particle identity labels     Probability hypothesis density     Cross-eye jamming     Anti-jamming     Random finite    

Title Author Date Type Operation

Development and Application of Network Electronic Identity Management in Major Countries and Regions

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Journal Article

A Study on the Policies and Regulations of Network Electronic Identity Management

Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing

Journal Article

CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY

Journal Article

The effects of festivals and special events on city image design

LIU Yuan, CHEN Chong

Journal Article

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

Integration of current identity-based district-varied health insurance schemes in China: implications

Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo

Journal Article

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Journal Article

A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation

ZHOU Bing, CUI Guixiang, CHEN Naixiang

Journal Article

Cryptanalysis of an identity-based public auditing protocol for cloud storage

Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN

Journal Article

Energy Demand and Carbon Emission Peak Paths for the Rise of Central China

Cheng Yunhe, Dong Hongguang, Geng Jichao, He Jishan

Journal Article

Identity-based threshold proxy re-encryption scheme from lattices and its applications

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Journal Article

A novel algorithm to counter cross-eye jamming based on a multi-target model

Zhi-yong SONG, Xing-lin SHEN, Qiang FU

Journal Article