[1] |
Xinyuan YIN, Xiaojian ZHENG, Jinbo XIONG.
Two-round three-party password-authenticated key exchange protocol over lattices without non-interactive zero-knowledge proof
[J]. Journal of Computer Applications, 2024, 44(3): 805-810.
|
[2] |
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI.
Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding
[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
|
[3] |
Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN.
Traceability storage model of charity system oriented to master-slave chain
[J]. Journal of Computer Applications, 2024, 44(12): 3751-3758.
|
[4] |
Gaimei GAO, Mingbo DUAN, Yaling XUN, Chunxia LIU, Weichao DANG.
SM9-based attribute-based searchable encryption scheme with cryptographic reverse firewall
[J]. Journal of Computer Applications, 2024, 44(11): 3495-3502.
|
[5] |
Haiying MA, Jinzhou LI, Jikun YANG.
Blockchain-based decentralized attribute-based encryption scheme for revocable attributes
[J]. Journal of Computer Applications, 2023, 43(9): 2789-2797.
|
[6] |
Suqing LIN, Shuhua ZHANG.
Attribute-based encryption scheme with verifiable search and non-monotonic access structure
[J]. Journal of Computer Applications, 2022, 42(9): 2772-2779.
|
[7] |
Xiaoqiong PANG, Ting YANG, Wenjun CHEN, Yunting WANG, Tianye LIU.
Digital rights management scheme based on secret sharing in blockchain environment
[J]. Journal of Computer Applications, 2021, 41(11): 3257-3265.
|
[8] |
Lifeng GUO, Qianli WANG.
Adaptive secure outsourced attribute-based encryption scheme with keyword search
[J]. Journal of Computer Applications, 2021, 41(11): 3266-3273.
|
[9] |
YU Qingfei, TU Guangsheng, LI Ningbo, ZHOU Tanping.
Multi-hop multi-policy attributed-based fully homomorphic encryption scheme
[J]. Journal of Computer Applications, 2019, 39(8): 2326-2332.
|
[10] |
LI Zichen, XIE Ting, CAI Juliang, ZHANG Xiaowei.
New post quantum authenticated key exchange protocol based on ring learning with errors problem
[J]. Journal of Computer Applications, 2018, 38(8): 2243-2248.
|
[11] |
LI Cong, YANG Xiaoyuan, BAI Ping, WANG Xu'an.
Traceable and fully verifiable for outsourced decryption for CP-ABE
[J]. Journal of Computer Applications, 2018, 38(8): 2249-2255.
|
[12] |
LI Cong, YANG Xiaoyuan, WANG Xu'an.
Effecient outsourced computing based on extended attribute-based functional encryption
[J]. Journal of Computer Applications, 2018, 38(6): 1633-1639.
|
[13] |
CUI Weirong, DU Chenglie.
Privacy preserving attribute matching method based on CP-ABE in social networks
[J]. Journal of Computer Applications, 2018, 38(4): 1051-1057.
|
[14] |
CHEN Danwei, YANG Sheng.
Dynamic trust level based ciphertext access control scheme
[J]. Journal of Computer Applications, 2017, 37(6): 1587-1592.
|
[15] |
WANG Jingwei, YIN Xinchun.
Ciphertext policy attribute-based encryption scheme with weighted attribute revocation
[J]. Journal of Computer Applications, 2017, 37(12): 3423-3429.
|