Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[BUKU][B] Mobile cloud computing: foundations and service models
Mobile Cloud Computing: Foundations and Service Models combines cloud computing,
mobile computing and wireless networking to bring new computational resources for mobile …
mobile computing and wireless networking to bring new computational resources for mobile …
Revocable identity-based encryption revisited: Security model and construction
Abstract In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …
Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE) …
Secure data sharing in cloud computing using revocable-storage identity-based encryption
J Wei, W Liu, X Hu - IEEE Transactions on Cloud Computing, 2016 - ieeexplore.ieee.org
Cloud computing provides a flexible and convenient way for data sharing, which brings
various benefits for both the society and individuals. But there exists a natural resistance for …
various benefits for both the society and individuals. But there exists a natural resistance for …
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Revocable identity-based encryption (RIBE) is an extension of IBE that supports a key
revocation mechanism, which is an indispensable feature for practical cryptographic …
revocation mechanism, which is an indispensable feature for practical cryptographic …
Revocable attribute-based encryption from standard lattices
Attribute-based encryption (ABE) is an attractive extension of public key encryption, which
provides fine-grained and role-based access to encrypted data. In its key-policy flavor, the …
provides fine-grained and role-based access to encrypted data. In its key-policy flavor, the …
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing
Cloud computing provides enterprises and individuals with unlimited computing resources
and expandable storage space. However, data leakage occurs frequently due to the lack of …
and expandable storage space. However, data leakage occurs frequently due to the lack of …
Efficient identity-based distributed decryption scheme for electronic personal health record sharing system
The rapid development of the Internet of Things (IoT) has led to the emergence of more and
more novel applications in recent years. One of them is the e-health system, which can …
more novel applications in recent years. One of them is the e-health system, which can …
Efficient delegation of key generation and revocation functionalities in identity-based encryption
In the public key cryptosystems, revocation functionality is required when a secret key is
corrupted by hacking or the period of a contract expires. In the public key infrastructure …
corrupted by hacking or the period of a contract expires. In the public key infrastructure …
Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance
A revocable identity-based encryption (RIBE) scheme, proposed by Boldyreva et al.,
provides a revocation functionality for managing a number of users dynamically and …
provides a revocation functionality for managing a number of users dynamically and …
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Revoking corrupted users is a desirable functionality for cryptosystems. Since Boldyreva,
Goyal, and Kumar (ACM CCS 2008) proposed a notable result for scalable revocation …
Goyal, and Kumar (ACM CCS 2008) proposed a notable result for scalable revocation …