[1] |
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Linkable ring signature scheme based on SM9 algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3709-3716.
|
[2] |
Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN.
Cross-chain identity management scheme based on identity-based proxy re-encryption
[J]. Journal of Computer Applications, 2024, 44(12): 3723-3730.
|
[3] |
Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU.
Identity-based ring signature scheme on number theory research unit lattice
[J]. Journal of Computer Applications, 2023, 43(9): 2798-2805.
|
[4] |
Qun WANG, Quan YUAN, Fujuan LI, Lingling XIA.
Review of zero trust network and its key technologies
[J]. Journal of Computer Applications, 2023, 43(4): 1142-1150.
|
[5] |
Wenshuai SONG, Miaolei DENG, Mimi MA, Haochen LI.
Research progress in public-key encryption with keyword search
[J]. Journal of Computer Applications, 2023, 43(3): 794-803.
|
[6] |
Xiaohan GUO, Zhongyuan YAO, Yong ZHANG, Shangkun GUO, Chao WANG, Xueming SI.
Cross-chain privacy protection scheme of consortium blockchain based on improved notary mechanism
[J]. Journal of Computer Applications, 2023, 43(10): 3028-3037.
|
[7] |
Yangnan GUO, Wenbao JIANG, Shuai YE.
Supervisable blockchain anonymous transaction system model
[J]. Journal of Computer Applications, 2022, 42(9): 2757-2764.
|
[8] |
Qi LIU, Rongxin GUO, Wenxian JIANG, Dengji MA.
Parallel chain consensus algorithm optimization scheme based on Boneh-Lynn-Shacham aggregate signature technology
[J]. Journal of Computer Applications, 2022, 42(12): 3785-3791.
|
[9] |
Li LI, Hongfei YANG, Xiuze DONG.
Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(11): 3251-3256.
|
[10] |
LUO Wenjun, WEN Shenglian, CHENG Yu.
Blockchain-based electronic health record sharing scheme
[J]. Journal of Computer Applications, 2020, 40(1): 157-161.
|
[11] |
TU Guangsheng, YANG Xiaoyuan, ZHOU Tanping.
Efficient identity-based multi-identity fully homomorphic encryption scheme
[J]. Journal of Computer Applications, 2019, 39(3): 750-755.
|
[12] |
WANG Zhanjun, MA Haiying, WANG Jinhua, LI Yan.
Revocable identity-based encryption scheme with outsourcing decryption and member revocation
[J]. Journal of Computer Applications, 2019, 39(12): 3563-3568.
|
[13] |
XU Han, LUO Liang, SUN Peng, MENG Sa.
Cloud system security and performance modeling based on Markov model
[J]. Journal of Computer Applications, 2019, 39(11): 3304-3309.
|
[14] |
LI Cong, YANG Xiaoyuan, BAI Ping, WANG Xu'an.
Traceable and fully verifiable for outsourced decryption for CP-ABE
[J]. Journal of Computer Applications, 2018, 38(8): 2249-2255.
|
[15] |
ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan.
Data transmission protocol based on short signature scheme for railway bridge monitoring
[J]. Journal of Computer Applications, 2018, 38(8): 2261-2266.
|