您当前的位置:
首页 >
文章列表页 >
Attribute-based encryption with hidden policies in the access tree
academic paper | 更新时间:2024-06-05
    • Attribute-based encryption with hidden policies in the access tree

    • Journal on Communications   Vol. 36, Issue 9, Pages: 119-126(2015)
    • DOI:10.11959/j.issn.1000-436x.2015135    

      CLC: TP309.7
    • Online First:2015-09

      Published:25 September 2015

    移动端阅览

  • Yan SONG, Zhen HAN, Feng-mei LIU, et al. Attribute-based encryption with hidden policies in the access tree[J]. Journal on Communications, 2015, 36(9): 119-126. DOI: 10.11959/j.issn.1000-436x.2015135.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

2355

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice
Algorithm of blockchain data provenance based on ABE
Multi-authority attribute-based access control system in mHealth with traceability
Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks
Multi-authority attribute-based encryption with efficient revocation

Related Author

Kaiyang GUO
Riming WU
Kai LIU
Yiliang HAN
Tao FENG
Zuan WANG
Kedi YANG
Youliang TIAN

Related Institution

Key Laboratory of PAP for Cryptology and Information Security
College of Cryptographic Engineering, Engineering University of PAP
School of Computer and Communication, Lanzhou University of Technology
College of Mathematics and Statistics,Guizhou University
Institute of Cryptography &Data Security, Guizhou University
0