A privacy-preserving group encryption scheme with identity exposure
Chuan-Kun WU
A privacy-preserving group encryption scheme with identity exposure
[1] |
Chaum D van Heyst E. Group signatures. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 257– 265
|
[2] |
Bresson E Stern J Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In: Proceedings of the 22nd Annual International Cryptology Conference Santa Barbara. 2002, 465– 480
|
[3] |
Zhang L , Liang P , Mu Y . Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 2018, 6: 12736– 12745
|
[4] |
Zhou T , Shen J , He D , Vijayakumar P , Kumar N . Human-in-the-loop-aided privacy-preserving scheme for smart healthcare. IEEE Transactions on Emerging Topics in Computational Intelligence, 2022, 6( 1): 6– 15
|
/
〈 | 〉 |