[1] |
Li LI, Hongfei YANG, Xiuze DONG.
Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(11): 3251-3256.
|
[2] |
LUO Wenjun, WEN Shenglian, CHENG Yu.
Blockchain-based electronic health record sharing scheme
[J]. Journal of Computer Applications, 2020, 40(1): 157-161.
|
[3] |
TU Guangsheng, YANG Xiaoyuan, ZHOU Tanping.
Efficient identity-based multi-identity fully homomorphic encryption scheme
[J]. Journal of Computer Applications, 2019, 39(3): 750-755.
|
[4] |
WANG Zhanjun, MA Haiying, WANG Jinhua, LI Yan.
Revocable identity-based encryption scheme with outsourcing decryption and member revocation
[J]. Journal of Computer Applications, 2019, 39(12): 3563-3568.
|
[5] |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan.
Data transmission protocol based on short signature scheme for railway bridge monitoring
[J]. Journal of Computer Applications, 2018, 38(8): 2261-2266.
|
[6] |
HAO Wei, YANG Xiaoyuan, WANG Xu'an, WU Liqiang.
Proxy re-encryption scheme based on conditional asymmetric cross-cryptosystem
[J]. Journal of Computer Applications, 2016, 36(9): 2452-2458.
|
[7] |
LIU Mingye, HAN Yiliang, YANG Xiaoyuan.
Signcryption scheme based on low-density generator-matrix code
[J]. Journal of Computer Applications, 2016, 36(9): 2459-2464.
|
[8] |
HAO Wei, YANG Xiaoyuan, WANG Xu'an, ZHANG Yingnan, WU Liqiang.
Asymmetric proxy re-encryption scheme of efficient access to outsourcing data for mobile users
[J]. Journal of Computer Applications, 2016, 36(8): 2225-2230.
|
[9] |
DAI Xiaoming, ZHANG Wei, ZHENG Zhiheng, LI Zhenlin.
GSW-type hierarchical identity-based fully homomorphic encryption scheme from learning with errors
[J]. Journal of Computer Applications, 2016, 36(7): 1856-1860.
|
[10] |
SUN Yiru, LIANG Xiangqian, SHANG Yufang.
Identity based ring signature scheme in ideal lattice
[J]. Journal of Computer Applications, 2016, 36(7): 1861-1865.
|
[11] |
HUANG Wenzhen, YANG Xiaoyuan, WANG Xu'an, WU Liqiang.
Identity-based broadcast encryption based on lattice
[J]. Journal of Computer Applications, 2016, 36(4): 956-961.
|
[12] |
XIANG Wen, YANG Xiaoyuan, WANG Xu'an, WU Liqiang.
Forward secure identity-based signcryption from lattice
[J]. Journal of Computer Applications, 2016, 36(11): 3077-3081.
|
[13] |
REN Xiaokang, CHEN Peilin, CAO Yuan, LI Yanan, YANG Xiaodong.
Partially blind signature scheme with ID-based server-aided verification
[J]. Journal of Computer Applications, 2016, 36(11): 3098-3102.
|
[14] |
WANG Xiong, DENG Lunzhi.
Provably secure undeniable signature scheme based on identity
[J]. Journal of Computer Applications, 2016, 36(10): 2738-2741.
|
[15] |
MING Yang, YUAN Hongping, SUN Bian, QIAO Zhengyang.
Efficient identity-based anonymous broadcast encryption scheme in standard model
[J]. Journal of Computer Applications, 2016, 36(10): 2762-2766.
|