A privacy-preserving group encryption scheme with identity exposure

Chuan-Kun WU

PDF(359 KB)
PDF(359 KB)
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (5) : 165823. DOI: 10.1007/s11704-022-1555-1
LETTER

A privacy-preserving group encryption scheme with identity exposure

Author information +
History +

Cite this article

Download citation ▾
Chuan-Kun WU. A privacy-preserving group encryption scheme with identity exposure. Front. Comput. Sci., 2022, 16(5): 165823 https://doi.org/10.1007/s11704-022-1555-1

References

[1]
Chaum D van Heyst E. Group signatures. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 257– 265
[2]
Bresson E Stern J Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In: Proceedings of the 22nd Annual International Cryptology Conference Santa Barbara. 2002, 465– 480
[3]
Zhang L , Liang P , Mu Y . Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 2018, 6: 12736– 12745
[4]
Zhou T , Shen J , He D , Vijayakumar P , Kumar N . Human-in-the-loop-aided privacy-preserving scheme for smart healthcare. IEEE Transactions on Emerging Topics in Computational Intelligence, 2022, 6( 1): 6– 15

Acknowledgements

This work was supported by Shandong Major Scientific and Technological Innovation Project (2019JZZY010134).

RIGHTS & PERMISSIONS

2022 Higher Education Press
AI Summary AI Mindmap
PDF(359 KB)

Accesses

Citations

Detail

Sections
Recommended

/