[1] |
Luo Entao, Duan Guoyun, Zhou Lei, Zhu Xiaoyu.
An Anonymous Agent Tracking Privacy Preserving Scheme in Mobile Healthcare System
[J]. Journal of Computer Research and Development, 2020, 57(5): 1070-1079.
|
[2] |
Li Jianmin, Yu Huifang, Xie Yong.
ElGamal Broadcasting Multi-Signcryption Protocol with UC Security
[J]. Journal of Computer Research and Development, 2019, 56(5): 1101-1111.
|
[3] |
Que Mengfei, Zhang Junwei, Yang Chao, Yang Li, Ma Jianfeng, Cui Wenxuan.
Position Based Digital Signature Scheme in IoTs
[J]. Journal of Computer Research and Development, 2018, 55(7): 1421-1431.
|
[4] |
Xu Qian, Tan Chengxiang, Feng Jun, Fan Zhijie, Zhu Wenye.
Lattice-Based Forward Secure and Certificateless Signature Scheme
[J]. Journal of Computer Research and Development, 2017, 54(7): 1510-1524.
|
[5] |
Zhang Yanhua, Hu Yupu.
A New Verifiably Encrypted Signature Scheme from Lattices
[J]. Journal of Computer Research and Development, 2017, 54(2): 305-312.
|
[6] |
Ma Jinhua, Liu Jianghua, Wu Wei, Huang Xinyi.
Survey on Redactable Signatures
[J]. Journal of Computer Research and Development, 2017, 54(10): 2144-2152.
|
[7] |
Ye Qing, Hu Mingxing, Tang Yongli, Liu Kun, Yan Xixi.
Efficient Hierarchical Identity-Based Encryption Scheme from Learning with Errors
[J]. Journal of Computer Research and Development, 2017, 54(10): 2193-2204.
|
[8] |
Ma Haiying, Zeng Guosun, Bao Zhihua, Chen Jianping, Wang Jinhua,Wang Zhanjun.
Attribute-Based Encryption Scheme Resilient Against Continuous Auxiliary-Inputs Leakage
[J]. Journal of Computer Research and Development, 2016, 53(8): 1867-1878.
|
[9] |
Li Zhen, Jiang Han, Zhao Minghao.
A Discretionary Searchable Encryption Scheme in Multi-User Settings
[J]. Journal of Computer Research and Development, 2015, 52(10): 2313-2322.
|
[10] |
Zhong Ting, Han Xiao, Zhao Yulong.
Provable Data Possession by Partial Delegation
[J]. Journal of Computer Research and Development, 2015, 52(10): 2422-2430.
|
[11] |
Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng.
Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion
[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258.
|
[12] |
Sun Xiaochao, Li Bao, and Lu Xianhui.
LWE Problem with Uniform Secret and Errors and Its Application
[J]. 计算机研究与发展, 2014, 51(7): 1515-1519.
|
[13] |
Yuan Ke, Liu Zheli, Jia Chunfu, Ma Haoyu, and Lü Shuwang.
Research on Timed-Release Encryption
[J]. Journal of Computer Research and Development, 2014, 51(6): 1206-1220.
|
[14] |
Ge Lirong, Yu Jia, Cheng Xiangguo, Hao Rong, Zhao Huiyan, and Li Meng.
Strong Key-Insulated Signature Scheme Supporting Multi-Helpers in the Standard Model
[J]. Journal of Computer Research and Development, 2014, 51(5): 1081-1088.
|
[15] |
Li Huixian, Chen Xubao, Ju Longfei, Pang Liaojun, and Wang Yumin.
Improved Multi-Receiver Signcryption Scheme
[J]. , 2013, 50(7): 1418-1425.
|