您当前的位置:
首页 >
文章列表页 >
Traceable attribute-based encryption scheme with key-delegation abuse resistance
Papers | 更新时间:2024-06-05
    • Traceable attribute-based encryption scheme with key-delegation abuse resistance

    • Journal on Communications   Vol. 41, Issue 4, Pages: 150-161(2020)
    • DOI:10.11959/j.issn.1000-436x.2020016    

      CLC: TP309
    • Online First:2020-04

      Published:25 April 2020

    移动端阅览

  • Xixi YAN, Xu HE, Tao LIU, et al. Traceable attribute-based encryption scheme with key-delegation abuse resistance[J]. Journal on Communications, 2020, 41(4): 150-161. DOI: 10.11959/j.issn.1000-436x.2020016.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1758

下载量

2

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice
Fine-grained model capability access control mechanism based on machine unlearning
Blockchain-based user-friendly data retrieval and sharing scheme in cloud-assisted industrial Internet of things
Cloud-edge computing based dual access control scheme for IoV data
Scalable attribute-based encryption scheme with multiple tracing mechanisms

Related Author

Yiliang HAN
Kaiyang GUO
Riming WU
Kai LIU
Du Haohua
Wang Zhiqiang
Xu Shengwei
Yue Ziyan

Related Institution

College of Cryptographic Engineering, Engineering University of PAP
Key Laboratory of PAP for Cryptology and Information Security
School of Cyber Science and Technology, Beihang University
School of Cyber Science and Technology, University of Science and Technology of China
Department of Cryptography and Science Technology, Beijing Electronic Science and Technology Institute
0