[1] |
Diao Yiqing, Ye Ayong, Zhang Jiaomei, Deng Huina, Zhang Qiang, Cheng Baorong.
A Dual Privacy Protection Method Based on Group Signature and Homomorphic Encryption for Alliance Blockchain
[J]. Journal of Computer Research and Development, 2022, 59(1): 172-181.
|
[2] |
Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin.
A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain
[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290.
|
[3] |
Shen Shiyu, He Feng, Zhao Yunlei.
Multi-Platform Efficient Implementation and Optimization of Aigis-enc Algorithm
[J]. Journal of Computer Research and Development, 2021, 58(10): 2238-2252.
|
[4] |
Li Jiguo, Zhu Liufu, Liu Chengdong, Lu Yang, Han Jinguang, Wang Huaqun, Zhang Yichen.
Provably Secure Traceable Attribute-Based Sanitizable Signature Scheme in the Standard Model
[J]. Journal of Computer Research and Development, 2021, 58(10): 2253-2264.
|
[5] |
Peng Cong, Luo Min, He Debiao, Huang Xinyi.
Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
[J]. Journal of Computer Research and Development, 2021, 58(10): 2278-2286.
|
[6] |
Wei Hongru Huang Jingyi.
SOTS: A Hash Function-Based Shorter Post-Quantum Digital Signature Scheme
[J]. Journal of Computer Research and Development, 2021, 58(10): 2300-2309.
|
[7] |
Luo Entao, Duan Guoyun, Zhou Lei, Zhu Xiaoyu.
An Anonymous Agent Tracking Privacy Preserving Scheme in Mobile Healthcare System
[J]. Journal of Computer Research and Development, 2020, 57(5): 1070-1079.
|
[8] |
Li Jinhai, Li Yufei, Mi Yunlong, Wu Weizhi.
Meso-Granularity Labeled Method for Multi-Granularity Formal Concept Analysis
[J]. Journal of Computer Research and Development, 2020, 57(2): 447-458.
|
[9] |
Lu Bingjie, Zhou Jun, Cao Zhenfu.
A Multi-User Forward Secure Dynamic Symmetric Searchable Encryption with Enhanced Security
[J]. Journal of Computer Research and Development, 2020, 57(10): 2104-2116.
|
[10] |
Zhang Yinghui, He Jiangyong, Guo Rui, Zheng Dong.
Server-Aided and Verifiable Attribute-Based Signature for Industrial Internet of Things
[J]. Journal of Computer Research and Development, 2020, 57(10): 2177-2187.
|
[11] |
Jiang Yihan, Li Yong, Zhu Yan.
ACT: Auditable Confidential Transaction Scheme
[J]. Journal of Computer Research and Development, 2020, 57(10): 2232-2240.
|
[12] |
Li Jianmin, Yu Huifang, Xie Yong.
ElGamal Broadcasting Multi-Signcryption Protocol with UC Security
[J]. Journal of Computer Research and Development, 2019, 56(5): 1101-1111.
|
[13] |
Wang Xia, Jiang Shan, Li Junyu, Wu Weizh.
A Construction Method of Triadic Concepts
[J]. Journal of Computer Research and Development, 2019, 56(4): 844-853.
|
[14] |
Zhang Xiangwen, Lu Ziyao, Yang Jing, Lin Qian, Lu Yu, Wang Hongji, Su Jinsong.
Weighted Lattice Based Recurrent Neural Networks for Sentence Semantic Representation Modeling
[J]. Journal of Computer Research and Development, 2019, 56(4): 854-865.
|
[15] |
Li Zengpeng, Ma Chunguang, Zhao Minghao.
Leveled Fully Homomorphic Encryption Against Adaptive Key Recovery Attacks
[J]. Journal of Computer Research and Development, 2019, 56(3): 496-507.
|