An efficient identity-based proxy signcryption using lattice
暂无分享,去创建一个
Ye Wang | Xiaochun Cheng | Hongfei Zhu | Chonghua Wang | Xiaochun Cheng | Chonghua Wang | Hongfei Zhu | Ye Wang
[1] Caixue Zhou,et al. Identity Based Generalized Proxy Signcryption Scheme , 2016, Inf. Technol. Control..
[2] Yuan Xue,et al. An Identity-Based Proxy Signature on NTRU Lattice , 2018 .
[3] Hu Xiong,et al. A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing , 2020, KSII Trans. Internet Inf. Syst..
[4] Xiaojiang Du,et al. Biometric-based authentication scheme for Implantable Medical Devices during emergency situations , 2019, Future Gener. Comput. Syst..
[5] Sherali Zeadally,et al. A brief overview of intelligent mobility management for future wireless mobile networks , 2017, EURASIP J. Wirel. Commun. Netw..
[6] Xiaojun Zhang,et al. A post-quantum communication secure identity-based proxy-signcryption scheme , 2015, Int. J. Electron. Secur. Digit. Forensics.
[7] Xiaojiang Du,et al. Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.
[8] Yingying Zhang,et al. Multi-proxy Multi-signature without Pairing from Certificateless Cryptography , 2018, Int. J. Netw. Secur..
[9] Roayat Ismail Abdelfatah,et al. A Novel Proxy Signcryption Scheme and its Elliptic Curve Variant , 2017 .
[10] Kim-Kwang Raymond Choo,et al. A smartphone-based wearable sensors for monitoring real-time physiological data , 2017, Comput. Electr. Eng..
[11] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[12] Kofi Sarpong Adu-Manu,et al. Prolonging the Lifetime of Wireless Sensor Networks: A Review of Current Techniques , 2018, Wirel. Commun. Mob. Comput..
[13] Jian Shen,et al. A Short Linearly Homomorphic Proxy Signature Scheme , 2018, IEEE Access.
[14] Yaser Jararweh,et al. An intrusion detection system for connected vehicles in smart cities , 2019, Ad Hoc Networks.
[15] Zhiyuan Tan,et al. Social-aware peer discovery and resource allocation for device-to-device communication , 2016, 2016 Digital Media Industry & Academic Forum (DMIAF).
[16] Xiaoqi Ma. Managing Identities in Cloud Computing Environments , 2015, 2015 2nd International Conference on Information Science and Control Engineering.
[17] Longfei Wu,et al. Cross-lingual multi-keyword rank search with semantic extension over encrypted data , 2020, Inf. Sci..
[18] Gautam Srivastava,et al. A Node Density Control Learning Method for the Internet of Things , 2019, Sensors.
[19] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[20] Johannes A. Buchmann,et al. Perspectives for cryptographic long-term security , 2006, CACM.
[21] P. Pardalos,et al. Group testing with geometry of classical groups over finite fields , 2018, Journal of Algebraic Combinatorics.
[22] Yong Gan,et al. A Self-certified Cross-Cluster Asymmetric Group Key Agreement for Wireless Sensor Networks , 2019 .
[23] Fahad Bin Muhaya,et al. Lattice‐based signcryption , 2013, Concurr. Comput. Pract. Exp..
[24] Jianmin Li,et al. Identity-Based Proxy Signcryption Protocol with Universal Composability , 2018, Secur. Commun. Networks.
[25] Y. Sreenivasa Rao,et al. A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing , 2017, Future Gener. Comput. Syst..
[26] P. Vasudeva Reddy,et al. Pairing Free Identity-Based Blind Signature Scheme with Message Recovery , 2017, Cryptogr..
[27] Vadim Lyubashevsky,et al. Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..
[28] Huifang Yu,et al. Construction of Certificateless Proxy Signcryption Scheme From CMGs , 2019, IEEE Access.
[29] Mianxiong Dong,et al. Identity-based signcryption from lattices , 2015, Secur. Commun. Networks.
[30] Liusheng Huang,et al. Identity-based Signatures from Lattices: Simpler, Faster, Shorter , 2016, Fundam. Informaticae.
[31] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[32] Chunhua Su,et al. Am I eclipsed? A smart detector of eclipse attacks for Ethereum , 2020, Comput. Secur..
[33] Longfei Wu,et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid , 2019, Science China Information Sciences.
[34] Shaobo Zhang,et al. A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services , 2019, Future Gener. Comput. Syst..
[35] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[36] Chen Liang,et al. Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..
[37] Chen Liang,et al. A sensitive network jitter measurement for covert timing channels over interactive traffic , 2018, Multimedia Tools and Applications.
[38] Li Li,et al. An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System , 2018, Secur. Commun. Networks.
[39] Liehuang Zhu,et al. A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..
[40] Fagen Li,et al. Efficient Signcryption With Proxy Re-Encryption and its Application in Smart Grid , 2019, IEEE Internet of Things Journal.
[41] Yaser Jararweh,et al. Data and Service Management in Densely Crowded Environments: Challenges, Opportunities, and Recent Developments , 2019, IEEE Communications Magazine.
[42] Qiming Zou,et al. Research on Cost-Driven Services Composition in an Uncertain Environment , 2019 .
[43] Yueshen Xu,et al. QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment , 2019, Mob. Networks Appl..
[44] Qiaoyan Wen,et al. Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation , 2019, Symmetry.
[45] Guangquan Xu,et al. A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems , 2020, IEEE Transactions on Industrial Informatics.
[46] Victor C. M. Leung,et al. Virtual Resource Allocation for Heterogeneous Services in Full Duplex-Enabled SCNs With Mobile Edge Computing and Caching , 2017, IEEE Transactions on Vehicular Technology.
[47] Yu Li,et al. Group-Wise Itinerary Planning in Temporary Mobile Social Network , 2019, IEEE Access.
[48] Gautam Srivastava,et al. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.
[49] Kim-Kwang Raymond Choo,et al. GDTN: Genome-Based Delay Tolerant Network Formation in Heterogeneous 5G Using Inter-UA Collaboration , 2016, PloS one.
[50] Honghao Gao,et al. Applying Probabilistic Model Checking to Path Planning in an Intelligent Transportation System Using Mobility Trajectories and Their Statistical Data , 2019, Intelligent Automation and Soft Computing.