A privacy-preserving group encryption scheme with identity exposure

Chuan-Kun WU

Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (5) : 165823

PDF (359KB)
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (5) : 165823 DOI: 10.1007/s11704-022-1555-1
Information Security
LETTER

A privacy-preserving group encryption scheme with identity exposure

Author information +
History +
PDF (359KB)

Cite this article

Download citation ▾
Chuan-Kun WU. A privacy-preserving group encryption scheme with identity exposure. Front. Comput. Sci., 2022, 16(5): 165823 DOI:10.1007/s11704-022-1555-1

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Chaum D van Heyst E. Group signatures. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 257– 265

[2]

Bresson E Stern J Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In: Proceedings of the 22nd Annual International Cryptology Conference Santa Barbara. 2002, 465– 480

[3]

Zhang L , Liang P , Mu Y . Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 2018, 6: 12736– 12745

[4]

Zhou T , Shen J , He D , Vijayakumar P , Kumar N . Human-in-the-loop-aided privacy-preserving scheme for smart healthcare. IEEE Transactions on Emerging Topics in Computational Intelligence, 2022, 6( 1): 6– 15

RIGHTS & PERMISSIONS

Higher Education Press

AI Summary AI Mindmap
PDF (359KB)

Supplementary files

Highlights

1530

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/