[1] |
Guo Lifeng, Li Zhihao, Hu Lei.
Efficient Public Encryption Scheme with Keyword Search for Cloud Storage
[J]. Journal of Computer Research and Development, 2020, 57(7): 1404-1414.
|
[2] |
Song Xiangfu, Gai Min, Zhao Shengnan, Jiang Han.
Privacy-Preserving Statistics Protocol for Set-Based Computation
[J]. Journal of Computer Research and Development, 2020, 57(10): 2221-2231.
|
[3] |
Chen MingYuan Shaoliang.
Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model
[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892.
|
[4] |
Zhong Ting, Han Xiao, Zhao Yulong.
Provable Data Possession by Partial Delegation
[J]. Journal of Computer Research and Development, 2015, 52(10): 2422-2430.
|
[5] |
Lu Yang and Li Jiguo.
Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model
[J]. 计算机研究与发展, 2014, 51(7): 1497-1505.
|
[6] |
Wang Yilei1,2, Zheng Zhihua3, Wang Hao3, and Xu Qiuliang2.
Rational Fair Computation with Computational Sequential Equilibrium
[J]. 计算机研究与发展, 2014, 51(7): 1527-1537.
|
[7] |
Yuan Ke, Liu Zheli, Jia Chunfu, Ma Haoyu, and Lü Shuwang.
Research on Timed-Release Encryption
[J]. Journal of Computer Research and Development, 2014, 51(6): 1206-1220.
|
[8] |
Guo Lifeng and Lu Bo.
Efficient Proxy Re-encryption with Keyword Search Scheme
[J]. Journal of Computer Research and Development, 2014, 51(6): 1221-1228.
|
[9] |
Ge Lirong, Yu Jia, Cheng Xiangguo, Hao Rong, Zhao Huiyan, and Li Meng.
Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model
[J]. Journal of Computer Research and Development, 2014, 51(5): 1081-1088.
|
[10] |
Gao Haiying.
Provable Secure ID-Based Authenticated Key Agreement Protocol
[J]. , 2012, 49(8): 1685-1689.
|
[11] |
Zhou Yousheng, Sun Yanbin, Qing Sihan,, and Yang Yixian.
An Efficient ID-Based Verifiably Encrypted Signature Scheme
[J]. , 2011, 48(8): 1350-1356.
|
[12] |
Yang Xiaoyuan, Cai Weiyi, and Chen Haibin.
Multiple-Authority-Key Functional Encryption: A M-KP-ABE Scheme Based on LMSSS
[J]. , 2011, 48(8): 1363-1369.
|
[13] |
Ren Yongjun, Wang Jiandong, Wang Jian, Xu Dazhuan, and Zhuang Yi.
Identity-Based Authenticated Key Agreement Protocols in the Standard Model
[J]. , 2010, 47(9): 1604-1610.
|
[14] |
Chen Hu, Zhu Changjie, and Song Rushun.
Efficient Certificateless Signature and Group Signature Schemes
[J]. , 2010, 47(2): 231-237.
|
[15] |
Chen Shaozhen, Wang Wenqiang, and Peng Shujuan.
Efficient AttributeBased Ring Signature Schemes
[J]. , 2010, 47(12): -.
|