Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities
暂无分享,去创建一个
Jian Shen | Xingming Sun | Dengzhi Liu | Yang Xiang | Fushan Wei | Fushan Wei | Xingming Sun | Dengzhi Liu | Jian Shen | Yang Xiang
[1] Wanlei Zhou,et al. Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies , 2017, IEEE Communications Surveys & Tutorials.
[2] Jun Zhang,et al. Detecting and Preventing Cyber Insider Threats: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[3] Jianfeng Ma,et al. New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.
[4] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[5] Rong Hao,et al. A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer , 2017 .
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Lei Zhang,et al. A new certificateless aggregate signature scheme , 2009, Comput. Commun..
[8] Jun Zhang,et al. Network Traffic Classification Using Correlation Information , 2013, IEEE Transactions on Parallel and Distributed Systems.
[9] Zhihui Li,et al. A verifiable secret sharing scheme without dealer in vector space , 2011, 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[10] Jian Shen,et al. A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..
[11] Tatsuaki Okamoto,et al. A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications , 1998, EUROCRYPT.
[12] Elisa Bertino,et al. Robust Multi-Factor Authentication for Fragile Communications , 2014, IEEE Transactions on Dependable and Secure Computing.
[13] Xinyi Huang,et al. Certificate-based encryption resilient to key leakage , 2016, J. Syst. Softw..
[14] Xiaofeng Chen,et al. Secure Distributed Deduplication Systems with Improved Reliability , 2015, IEEE Trans. Computers.
[15] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[16] Mohammad Sayad Haghighi,et al. Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps , 2015, IET Inf. Secur..
[17] Kun Peng. Critical survey of existing publicly verifiable secret sharing schemes , 2012, IET Inf. Secur..
[18] J. Li,et al. Smart city and the applications , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[19] Jian Shen,et al. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.
[20] Jianfeng Ma,et al. Fair (t, n) threshold secret sharing scheme , 2013, IET Inf. Secur..
[21] Jian Shen,et al. Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing , 2020, IEEE Transactions on Emerging Topics in Computing.
[22] Jian Shen,et al. Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[23] Chitra Balakrishna,et al. Enabling Technologies for Smart City Services and Applications , 2012, 2012 Sixth International Conference on Next Generation Mobile Applications, Services and Technologies.
[24] Taraneh Eghlidos,et al. An Efficient Lattice Based Multi-Stage Secret Sharing Scheme , 2017, IEEE Transactions on Dependable and Secure Computing.
[25] Lieven De Marez,et al. Smart Ideas for Smart Cities: Investigating Crowdsourcing for Generating and Selecting Ideas for ICT Innovation in a City Context , 2012, J. Theor. Appl. Electron. Commer. Res..
[26] Jian Shen,et al. An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.
[27] Yuh-Min Tseng,et al. Publicly verifiable multi-secret sharing scheme from bilinear pairings , 2013, IET Inf. Secur..
[28] Qian Wang,et al. Searchable Encryption over Feature-Rich Data , 2018, IEEE Transactions on Dependable and Secure Computing.
[29] Michael Batty,et al. Big data, smart cities and city planning , 2013, Dialogues in human geography.
[30] Xiaodong Liu,et al. A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.
[31] Zahir Tari,et al. Security and Privacy in Cloud Computing: Vision, Trends, and Challenges , 2015, IEEE Cloud Computing.
[32] Lei Wang,et al. One Publicly Verifiable Secret Sharing Scheme based on linear code , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.
[33] Anna Corinna Cagliano,et al. Current trends in Smart City initiatives: some stylised facts , 2014 .
[34] Muhammad Aamir Nadeem. Cloud Computing: Security Issues and Challenges , 2016 .
[35] Narendra Shekokar,et al. Cloud computing security in multi-clouds using Shamir's secret sharing scheme , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[36] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[37] Ching-Nung Yang,et al. Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[38] Ian Goldberg,et al. Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.