Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A decade of lattice cryptography
C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
Security and privacy in smart health: Efficient policy-hiding attribute-based access control
With the rapid development of the Internet of Things and cloud computing technologies,
smart health (s-health) is expected to significantly improve the quality of health care …
smart health (s-health) is expected to significantly improve the quality of health care …
Secure cloud-based EHR system using attribute-based cryptosystem and blockchain
H Wang, Y Song - Journal of medical systems, 2018 - Springer
To achieve confidentiality, authentication, integrity of medical data, and support fine-grained
access control, we propose a secure electronic health record (EHR) system based on …
access control, we propose a secure electronic health record (EHR) system based on …
Secure attribute-based data sharing for resource-limited users in cloud computing
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …
platforms because of its convenience and economy. As a potential technique for realizing …
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
Registered attribute-based encryption
Attribute-based encryption (ABE) generalizes public-key encryption and enables fine-
grained control to encrypted data. However, ABE upends the traditional trust model of public …
grained control to encrypted data. However, ABE upends the traditional trust model of public …
Decentralizing attribute-based encryption
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …
system, any party can become an authority and there is no requirement for any global …
Outsourcing the decryption of {ABE} ciphertexts
Attribute-based encryption (ABE) is a new vision for public key encryption that allows users
to encrypt and decrypt messages based on user attributes. For example, a user can create a …
to encrypt and decrypt messages based on user attributes. For example, a user can create a …
Fully homomorphic encryption over the integers
We construct a simple fully homomorphic encryption scheme, using only elementary
modular arithmetic. We use Gentry's technique to construct a fully homomorphic scheme …
modular arithmetic. We use Gentry's technique to construct a fully homomorphic scheme …