-
1
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Aug.
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Crypto, vol. 84, pp. 47-53, Aug. 1984.
-
(1984)
Crypto
, vol.84
, pp. 47-53
-
-
Shamir, A.1
-
2
-
-
84944905011
-
Homomorphic sig-nature schemes
-
Berlin, Germany: Springer
-
R. Johnson, D. Molnar, D. Song, and D. Song, "Homomorphic sig-nature schemes," in Topics in Cryptology-CT-RSA (Lecture Notes in Computer Science), vol 2271. Berlin, Germany: Springer, 2002, pp. 244-262.
-
(2002)
Topics in Cryptology-CT-RSA (Lecture Notes in Computer Science)
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Song, D.4
-
3
-
-
85020050894
-
Insight of the protection for data security under selective opening attacks
-
Oct.
-
Z. Huang, S. Liu, X. Mao, K. Chen, and J. Li, "Insight of the protection for data security under selective opening attacks," Inf. Sci., vols. 412-413, pp. 223-241, Oct. 2017.
-
(2017)
Inf. Sci.
, vol.412-413
, pp. 223-241
-
-
Huang, Z.1
Liu, S.2
Mao, X.3
Chen, K.4
Li, J.5
-
4
-
-
84901032811
-
Secure deduplication with efficient and reliable convergent key management
-
Jun.
-
J. Li, X. Chen, M. Li, J. Li, P. P. C. Lee, andW. Lou, "Secure deduplication with efficient and reliable convergent key management," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, pp. 1615-1625, Jun. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.6
, pp. 1615-1625
-
-
Li, J.1
Chen, X.2
Li, M.3
Li, J.4
Lee, P.P.C.5
Lou, W.6
-
5
-
-
84875220193
-
Inapproximability results for the minimum integral solu-tion problem with preprocessing over l1 norm
-
Mar.
-
W. Chen et al., "Inapproximability results for the minimum integral solu-tion problem with preprocessing over l1 norm," Theor. Comput. Sci., vol. 478, pp. 127-131, Mar. 2013.
-
(2013)
Theor. Comput. Sci.
, vol.478
, pp. 127-131
-
-
Chen, W.1
-
6
-
-
84940722054
-
An improved lower bound for approximating the minimum integral solution problem with preprocessing over l1norm
-
W. Chen et al., "An improved lower bound for approximating the minimum integral solution problem with preprocessing over l1norm," J. Combinat. Optim., vol. 30, no. 3, pp. 447-455, 2015.
-
(2015)
J. Combinat. Optim.
, vol.30
, Issue.3
, pp. 447-455
-
-
Chen, W.1
-
7
-
-
84861691857
-
Improved security for linearly homomorphic signa-tures: A generic framework
-
Berlin, Germany: Springer
-
D. M. Freeman, "Improved security for linearly homomorphic signa-tures: A generic framework," in Public Key Cryptography-PKC (Lecture Notes in Computer Science), vol 7293. Berlin, Germany: Springer, 2012, pp. 697-714.
-
(2012)
Public Key Cryptography-PKC (Lecture Notes in Computer Science)
, vol.7293
, pp. 697-714
-
-
Freeman, D.M.1
-
8
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
Berlin, Germany: Springer
-
D. Boneh, D. Freeman, J. Katz, and B.Waters, "Signing a linear subspace: Signature schemes for network coding," in Public Key Cryptography-PKC (Lecture Notes in Computer Science), vol. 5443. Berlin, Germany: Springer, 2009, pp. 68-87.
-
(2009)
Public Key Cryptography-PKC (Lecture Notes in Computer Science)
, vol.5443
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
9
-
-
84927584035
-
A hybrid cloud approach for secure authorized deduplication
-
May
-
J. Li, Y. K. Li, X. Chen, P. P. C. Lee, andW. Lou, "A hybrid cloud approach for secure authorized deduplication," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206-1216, May 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.5
, pp. 1206-1216
-
-
Li, J.1
Li, Y.K.2
Chen, X.3
Lee, P.P.C.4
Lou, W.5
-
10
-
-
84946905043
-
Secure distributed deduplication systems with improved reli-ability
-
Dec.
-
J. Li et al., "Secure distributed deduplication systems with improved reli-ability," IEEE Trans. Comput., vol. 64, no. 12, pp. 3569-3579, Dec. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.12
, pp. 3569-3579
-
-
Li, J.1
-
12
-
-
79958003537
-
Homomorphic signatures for polynomial functions
-
Berlin, Germany: Springer
-
D. Boneh and D. Freeman, "Homomorphic signatures for polynomial functions," in Advances in Cryptology-EUROCRYPT (Lecture Notes in Computer Science), vol. 6632. Berlin, Germany: Springer, 2011, pp. 149-168.
-
(2011)
Advances in Cryptology-EUROCRYPT (Lecture Notes in Computer Science)
, vol.6632
, pp. 149-168
-
-
Boneh, D.1
Freeman, D.2
-
13
-
-
79952517275
-
Homomorphic network coding signa-tures in the standard model
-
Berlin, Germany: Springer
-
N. Attrapadung and B. Libert, "Homomorphic network coding signa-tures in the standard model," in Public Key Cryptography-PKC (Lecture Notes in Computer Science), vol 6571. Berlin, Germany: Springer, 2011, pp. 17-34.
-
(2011)
Public Key Cryptography-PKC (Lecture Notes in Computer Science)
, vol.6571
, pp. 17-34
-
-
Attrapadung, N.1
Libert, B.2
-
14
-
-
84905409138
-
Homomorphic signatures with efficient verification for polynomial functions
-
Berlin, Germany: Springer
-
D. Catalano, D. Fiore, and B. Warinschi, "Homomorphic signatures with efficient verification for polynomial functions," in Advances in Cryptology-CRYPTO (Lecture Notes in Computer Science), vol 8616. Berlin, Germany: Springer, 2014, pp. 371-389.
-
(2014)
Advances in Cryptology-CRYPTO (Lecture Notes in Computer Science)
, vol.8616
, pp. 371-389
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
15
-
-
85044261898
-
Homomorphic signatures for polynomial functions with shorter signatures
-
Kyoto, Japan
-
R. Hiromasa, Y. Manabe, and T. Okamoto, "Homomorphic signatures for polynomial functions with shorter signatures," in Proc. 30th Symp. Cryptogr. Inf. Secur., Kyoto, Japan, 2013, pp. 1-8.
-
(2013)
Proc. 30th Symp. Cryptogr. Inf. Secur.
, pp. 1-8
-
-
Hiromasa, R.1
Manabe, Y.2
Okamoto, T.3
-
16
-
-
85028920194
-
Secure attribute-based data sharing for resource-limited users in cloud computing
-
Jan.
-
J. Li, Y. Zhang, X. Chen, and Y. Xiang, "Secure attribute-based data sharing for resource-limited users in cloud computing," Comput. Secur., vol. 72, pp. 1-12, Jan. 2018, doi: 10.1016/j.cose.2017.08.007.
-
(2018)
Comput. Secur.
, vol.72
, pp. 1-12
-
-
Li, J.1
Zhang, Y.2
Chen, X.3
Xiang, Y.4
-
17
-
-
84943000168
-
Adaptively secure fully homo-morphic signatures based on lattices
-
ePrint Arch., Tech. Rep. 2014/916
-
X. Boyen, X. Fan, and E. Shi, "Adaptively secure fully homo-morphic signatures based on lattices," IACR Cryptol. ePrint Arch., Tech. Rep. 2014/916, 2014.
-
(2014)
IACR Cryptol]
-
-
Boyen, X.1
Fan, X.2
Shi, E.3
-
18
-
-
85017138287
-
Privacy-preserving outsourced classification in cloud computing
-
New York, NY, USA: Springer
-
P. Li, J. Li, Z. Huang, C.-Z. Gao, W.-B. Chen, and K. Chen, "Privacy-preserving outsourced classification in cloud computing," in Clus-ter Computing. New York, NY, USA: Springer, 2017, pp. 1-10, doi: 10.1007/s10586-017-0849-9.
-
(2017)
Clus-Ter Computing
, pp. 1-10
-
-
Li, P.1
Li, J.2
Huang, Z.3
Gao, C.-Z.4
Chen, W.-B.5
Chen, K.6
-
19
-
-
84925258036
-
Leveled fully homo-morphic signatures from standard lattices
-
ePrint Arch., Tech. Rep. 2014/897 Online
-
S. Gorbunov, V. Vaikuntanathan, and D. Wichs, "Leveled fully homo-morphic signatures from standard lattices," IACR Cryptol. ePrint Arch., Tech. Rep. 2014/897, 2014. [Online]. Available: http://eprint.iacr.org/
-
(2014)
IACR Cryptol
-
-
Gorbunov, S.1
Vaikuntanathan, V.2
Wichs, D.3
-
20
-
-
84873972598
-
Efficient completely context-hiding quotable and linearly homomorphic signatures
-
Berlin, Germany: Springer
-
N. Attrapadung, B. Libert, and T. Peters, "Efficient completely context-hiding quotable and linearly homomorphic signatures," in Public-Key Cryptography-PKC (Lecture Notes in Computer Science), vol 7778. Berlin, Germany: Springer, 2013, pp. 386-404.
-
(2013)
Public-Key Cryptography-PKC (Lecture Notes in Computer Science)
, vol.7778
, pp. 386-404
-
-
Attrapadung, N.1
Libert, B.2
Peters, T.3
-
21
-
-
84921381171
-
Identity-based encryption with outsourced revocation in cloud computing
-
Feb.
-
J. Li, J. Li, X. Chen, C. Jia, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Trans. Comput., vol. 64, no. 2, pp. 425-437, Feb. 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.2
, pp. 425-437
-
-
Li, J.1
Li, J.2
Chen, X.3
Jia, C.4
Lou, W.5
-
22
-
-
84946840347
-
Short signatures from the Weil pairing
-
Berlin, Germany: Springer
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," in Advances in Cryptology-ASIACRYPT (Lecture Notes in Computer Science), vol 2248. Berlin, Germany: Springer, 2001, pp. 514-532.
-
(2001)
Advances in Cryptology-ASIACRYPT (Lecture Notes in Computer Science)
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
23
-
-
79952503806
-
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
-
Berlin, Germany: Springer
-
D. Boneh and D. Freeman, "Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures," in Public Key Cryptography-PKC (Lecture Notes in Computer Science), vol 6571. Berlin, Germany: Springer, 2011, pp. 1-16.
-
(2011)
Public Key Cryptography-PKC (Lecture Notes in Computer Science)
, vol.6571
, pp. 1-16
-
-
Boneh, D.1
Freeman, D.2
-
24
-
-
84916244146
-
Authenticating computation on groups: New homomorphic primitives and applications
-
D. Catalano, A. Marcedone, and O. Puglisi, "Authenticating computation on groups: New homomorphic primitives and applications," in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Secur., 2014, pp. 193-212.
-
(2014)
Proc. Int. Conf. Theory Appl. Cryptol. Inf. Secur.
, pp. 193-212
-
-
Catalano, D.1
Marcedone, A.2
Puglisi, O.3
-
25
-
-
84871547968
-
Computing on authenti-cated data: New privacy definitions and constructions
-
Berlin, Germany: Springer
-
N. Attrapadung, B. Libert, and T. Peters, "Computing on authenti-cated data: New privacy definitions and constructions," in Advances in Cryptology-ASIACRYPT (Lecture Notes in Computer Science), vol 7658. Berlin, Germany: Springer, 2012, pp. 367-385.
-
(2012)
Advances in Cryptology-ASIACRYPT (Lecture Notes in Computer Science)
, vol.7658
, pp. 367-385
-
-
Attrapadung, N.1
Libert, B.2
Peters, T.3
-
26
-
-
84964344073
-
Lattice-based linearly homomorphic signa-tures in the standard model
-
Jun.
-
W. Chen, H. Lei, and K. Qi, "Lattice-based linearly homomorphic signa-tures in the standard model," Theor. Comput. Sci., vol. 634, pp. 47-54, Jun. 2016.
-
(2016)
Theor. Comput. Sci.
, vol.634
, pp. 47-54
-
-
Chen, W.1
Lei, H.2
Qi, K.3
-
27
-
-
85018906248
-
Multi-key privacy-preserving deep learning in cloud comput-ing
-
Sep.
-
P. Li et al., "Multi-key privacy-preserving deep learning in cloud comput-ing," Future Generat. Comput. Syst., vol. 74, pp. 76-85, Sep. 2017.
-
(2017)
Future Generat. Comput. Syst.
, vol.74
, pp. 76-85
-
-
Li, P.1
-
28
-
-
84994682630
-
Leakage-resilient ID-based signature scheme in the generic bilinear group model
-
J.-D. Wu, Y.-M. Tseng, and S.-S. Huang, "Leakage-resilient ID-based signature scheme in the generic bilinear group model," Secur. Commun. Netw., vol. 9, no. 17, pp. 3987-4001, 2016.
-
(2016)
Secur. Commun. Netw.
, vol.9
, Issue.17
, pp. 3987-4001
-
-
Wu, J.-D.1
Tseng, Y.-M.2
Huang, S.-S.3
-
29
-
-
85038401634
-
Asecure ID-based proxy signature scheme from bilinear pairings
-
P. Sarde and A. Banerjee, "Asecure ID-based proxy signature scheme from bilinear pairings," Int. J. Comput. Appl., vol. 124, no. 9, pp. 1-4, 2015.
-
(2015)
Int. J. Comput. Appl.
, vol.124
, Issue.9
, pp. 1-4
-
-
Sarde, P.1
Banerjee, A.2
-
30
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
31
-
-
84911471015
-
An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem
-
C. Meshram, "An efficient ID-based cryptographic encryption based on discrete logarithm problem and integer factorization problem," Inf. Pro-cess. Lett., vol. 115, no. 2, pp. 351-358, 2015.
-
(2015)
Inf. Pro-Cess. Lett.
, vol.115
, Issue.2
, pp. 351-358
-
-
Meshram, C.1
-
33
-
-
84989847479
-
Inductive hierarchical identity based key agreement with pre-deployment interactions
-
P. Sarkar and M. Chowdhury, "Inductive hierarchical identity based key agreement with pre-deployment interactions," in Proc. Int. Conf. Appl. Techn. Inf. Secur., 2016, pp. 106-114.
-
(2016)
Proc. Int. Conf. Appl. Techn. Inf. Secur.
, pp. 106-114
-
-
Sarkar, P.1
Chowdhury, M.2
-
34
-
-
85046557152
-
An efficient identity-based homomorphic signature scheme for network coding
-
Y. Zhang, Y. Jiang, B. Li, and M. Zhang, "An efficient identity-based homomorphic signature scheme for network coding," in Proc. Int. Conf. Emerg. Internetwork., Data Web Technol., 2017, pp. 524-531.
-
(2017)
Proc. Int. Conf. Emerg. Internetwork., Data Web Technol.
, pp. 524-531
-
-
Zhang, Y.1
Jiang, Y.2
Li, B.3
Zhang, M.4
-
36
-
-
84930542540
-
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
-
May
-
J. Li, Z. Liu, X. Chen, "L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing," Knowl.-Based Syst., vol. 79, pp. 18-26, May 2015.
-
(2015)
Knowl.-Based Syst.
, vol.79
, pp. 18-26
-
-
Li, J.1
Liu, Z.2
Chen, X.3
-
37
-
-
84945936179
-
Leveled strongly-unforgeable identity-based fully homomorphic signatures
-
F. Wang, K. Wang, B. Li, and Y. Gao, "Leveled strongly-unforgeable identity-based fully homomorphic signatures," in Proc. ISC, 2015, pp. 42-60.
-
(2015)
Proc. ISC
, pp. 42-60
-
-
Wang, F.1
Wang, K.2
Li, B.3
Gao, Y.4
-
38
-
-
84927626362
-
Homomorphic signatures and message authentication codes
-
Cham, Switzerland: Springer
-
D. Catalano, "Homomorphic signatures and message authentication codes," in Security and Cryptography for Networks (Lecture Notes in Computer Science), vol 8642. Cham, Switzerland: Springer, 2014, pp. 514-519.
-
(2014)
Security and Cryptography for Networks (Lecture Notes in Computer Science)
, vol.8642
, pp. 514-519
-
-
Catalano, D.1
-
39
-
-
79958003300
-
Adaptive pseudo-free groups and applications
-
Berlin, Germany: Springer
-
D. Catalano, D. Fiore, and B. Warinschi, "Adaptive pseudo-free groups and applications," in Advances in Cryptology-EUROCRYPT (Lecture Notes in Computer Science), vol 6632. Berlin, Germany: Springer, 2011, pp. 207-223.
-
(2011)
Advances in Cryptology-EUROCRYPT (Lecture Notes in Computer Science)
, vol.6632
, pp. 207-223
-
-
Catalano, D.1
Fiore, D.2
Warinschi, B.3
-
40
-
-
77956567551
-
Signatures for network coding
-
Mar.
-
D. Charles, K. Jain, and K. Lauter, "Signatures for network coding," Int. J. Inf. Coding Theory, vol. 1, no. 1, pp. 3-14, Mar. 2009.
-
(2009)
Int. J. Inf. Coding Theory
, vol.1
, Issue.1
, pp. 3-14
-
-
Charles, D.1
Jain, K.2
Lauter, K.3
-
41
-
-
78649897589
-
Secure network coding over the integers
-
Berlin, Germany: Springer
-
R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin, "Secure network coding over the integers," in Public Key Cryptography-PKC (Lecture Notes in Computer Science), vol 6056. Berlin, Germany: Springer, 2010, pp. 142-160.
-
(2010)
Public Key Cryptography-PKC (Lecture Notes in Computer Science)
, vol.6056
, pp. 142-160
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
|