Resource Type

Journal Article 25

Year

2023 6

2022 2

2021 1

2020 2

2019 3

2018 3

2017 2

2016 1

2015 1

2011 2

2004 1

2000 1

open ︾

Keywords

Encryption 4

Attribute-based encryption 3

Cloud storage 3

Access control 2

Block cipher 2

Embedded security 2

Internet of Things (IoT) 2

Lightweight cryptography 2

User privacy 2

encryption 2

Adaptive watermarking 1

Aggregation-induced emission 1

Anonymity 1

Anticounterfeiting 1

Authenticated cipher 1

Balance between usability and privacy 1

Bilinear pairing 1

Blockchain 1

CAD assembly models 1

open ︾

Search scope:

排序: Display mode:

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypteddata with support for data owners to share an aggregate searchable key with a user delegating search

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Searchable public key encryption enables a storage server to retrieve the publicly encrypted data withoutMotivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract:

As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.

Keywords: WLAN     encryption     WEP     rekey    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryptionTo reduce the message-ciphertext expansion factor of the proposed scheme to log , the encryption algorithmof this scheme is built based on Gentry’s encryption scheme, by which m bits of plaintext are encryptedinto m log q bits of ciphertext by a one time encryption operation.

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

BORON: an ultra-lightweight and low power encryption design for pervasive computing Article

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3,   Pages 317-331 doi: 10.1631/FITEE.1500415

Abstract: We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents (GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role.

Keywords: Lightweight cryptography     SP network     Block cipher     Internet of Things (IoT)     Encryption     Embedded security    

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Engineering 2021, Volume 7, Issue 6,   Pages 787-797 doi: 10.1016/j.eng.2021.03.011

Abstract: This paper presents a novel attribute-based encryption (ABE) approach for computer-aided design (CAD)The proposed encryption scheme is demonstrated to be secure under the standard assumption.

Keywords: Information security     Cloud-based design and manufacture     Co-design     CAD assembly models     Attribute-based encryption    

Research on overall encryption adjustment technology of offshore oil field

Zhang Fengjiu,Luo Xianbo,Liu Yingxian,Zhao Chunming

Strategic Study of CAE 2011, Volume 13, Issue 5,   Pages 34-40

Abstract:

Take SZ36-1 oilfield as an example, offshore fields of heavy oil have stepped into later stage in development life and revealed problems gradually for serious injection/production contradiction, big variation for producing reserves in interlayer and plane, much higher for well-controlled reserves, lower for both of oil production rate and oil recovery, changing fast for composite water cut rising and production decline. In view of the challenge for development of offshore fields of heavy oil in China, we put forward the study of comprehensive adjustment for offshore fields in large scale firstly. Because of the special development mode of offshore fields, the proven research thinking and technical route for comprehensive adjustment used by onshore oilfields could not be copied to offshore fields. The research technology of comprehensive adjustment for integral well pattern thickening faces many technical difficulties, so now this research makes a combination of self-characteristics and development mode of SZ36-1 oilfield to put forward a full suite of research thinking and research methods for integral potential tapping and adjustment, and the proposal of comprehensive adjustment for integral well pattern thickening in SZ36-1 oilfield phase I. A water injection well pattern of inverted nine spot is transformed into a well pattern of line drive after pattern adjustment to try a development modes of "direction well & horizontal well network" . The implementation effect of integral well pattern thickening makes a good effect for greatly improved state of water flooding, improved from 80.5 % before adjustment to 91.3 % after adjustment for producing degree of water flooding, forecasting greatly improved recovery for 10.4 %. The technique of adjustment for integral well pattern thickening is sure to be popularized and applied among the similar oilfields.

Keywords: heavy oil     overall encryption     well pattern adjustment     water flooding     simulation    

AIE-Active Freeze-Tolerant Hydrogels Enable Multistage Information Encryption and Decryption at Subzero Article

Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang

Engineering 2023, Volume 23, Issue 4,   Pages 82-89 doi: 10.1016/j.eng.2022.03.021

Abstract: aggregation-induced emission (AIE)-active freeze-tolerant hydrogels are developed, which enable information encryptionluminogens presents turn-off/-on fluorescence, thereby enabling the use of these hydrogels for information encryption

Keywords: Freeze-tolerant hydrogels     Aggregation-induced emission     Encryption     Decryption     Anticounterfeiting    

Generic user revocation systems for attribute-based encryption in cloud storage None

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11,   Pages 1362-1384 doi: 10.1631/FITEE.1800405

Abstract: Attribute-based encryption (ABE) not only protects data secrecy, but also has ciphertexts or decryptiongeneric user revocation systems for ABE with user privacy protection, user revocation via ciphertext re-encryption

Keywords: Attribute-based encryption     Generic user revocation     User privacy     Cloud storage     Access control    

Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2,   Pages 258-277 doi: 10.1631/FITEE.2000366

Abstract: the delegator‘s private key information, but also decentralizes the proxy power by splitting the re-encryption

Keywords: Post-quantum cryptography     Threshold proxy re-encryption     Lattices     Robustness     Decentralization    

Generic attribute revocation systems for attribute-based encryption in cloud storage Research Papers

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 773-786 doi: 10.1631/FITEE.1800512

Abstract:

Attribute-based encryption (ABE) has been a preferred encryption technology to solve the problems

Keywords: Attribute-based encryption     Generic attribute revocation     User privacy     Cloud storage     Access control    

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless public-key encryption

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

The Value Added Tax Anti-Fake and Control System and Its Security Design

Wei Qingfu

Strategic Study of CAE 2000, Volume 2, Issue 11,   Pages 84-87

Abstract: A special data encryption mechanism is adopted in the system to implement the detection and countercheck

As an especial commercial encryption application, the system must work properly under all kindssecurity design technique according to the secure model for the system in respect of the kernel hardware, encryption

Keywords: value-added tax     anti-fake     encryption     security    

Lignin-derived dual-function red light carbon dots for hypochlorite detection and anti-counterfeiting

Frontiers of Chemical Science and Engineering 2023, Volume 17, Issue 7,   Pages 966-975 doi: 10.1007/s11705-022-2244-1

Abstract: Furthermore, a new type of visible-light and fluorescence dual-channel information encryption platformLow-concentration hypochlorite can be employed as an accessible and efficient information encryption/

Keywords: alkali lignin     red light carbon dots     hypochlorite     encryption and anti-counterfeiting    

ImgFS: a transparent cryptography for stored images using a filesystem in userspace

Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1,   Pages 28-42 doi: 10.1631/FITEE.1400133

Abstract: Real-time encryption and decryption of digital images stored on end-user devices is a challenging taskTraditional software encryption applications generally suffered from the expense of user convenience,To overcome these limitations, the concept of transparent encryption has been proposed.This type of encryption mechanism can be implemented most efficiently with kernel file systems.ImgFS can provide a sophisticated way to access, manage, and monitor all encryption and key management

Keywords: Storage image security     Cryptographic file system     Filesystem in userspace (FUSE)     Transparent encryption    

Title Author Date Type Operation

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

BORON: an ultra-lightweight and low power encryption design for pervasive computing

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Journal Article

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Journal Article

Research on overall encryption adjustment technology of offshore oil field

Zhang Fengjiu,Luo Xianbo,Liu Yingxian,Zhao Chunming

Journal Article

AIE-Active Freeze-Tolerant Hydrogels Enable Multistage Information Encryption and Decryption at Subzero

Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang

Journal Article

Generic user revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Journal Article

Identity-based threshold proxy re-encryption scheme from lattices and its applications

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Journal Article

Generic attribute revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Journal Article

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

The Value Added Tax Anti-Fake and Control System and Its Security Design

Wei Qingfu

Journal Article

Lignin-derived dual-function red light carbon dots for hypochlorite detection and anti-counterfeiting

Journal Article

ImgFS: a transparent cryptography for stored images using a filesystem in userspace

Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN

Journal Article