Fault-tolerant identity-based encryption from SM9

Article Properties
Cite
Liu, Xiaohong, et al. “Fault-Tolerant Identity-Based Encryption from SM9”. Science China Information Sciences, vol. 67, no. 2, 2024, https://doi.org/10.1007/s11432-022-3706-7.
Liu, X., Huang, X., Cheng, Z., & Wu, W. (2024). Fault-tolerant identity-based encryption from SM9. Science China Information Sciences, 67(2). https://doi.org/10.1007/s11432-022-3706-7
Liu, Xiaohong, Xinyi Huang, Zhaohui Cheng, and Wei Wu. “Fault-Tolerant Identity-Based Encryption from SM9”. Science China Information Sciences 67, no. 2 (2024). https://doi.org/10.1007/s11432-022-3706-7.
Liu X, Huang X, Cheng Z, Wu W. Fault-tolerant identity-based encryption from SM9. Science China Information Sciences. 2024;67(2).
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Computer software
Science
Science (General)
Cybernetics
Information theory
Technology
Electrical engineering
Electronics
Nuclear engineering
Electric apparatus and materials
Electric circuits
Electric networks
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Refrences
Title Journal Journal Categories Citations Publication Date
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices Science China Information Sciences
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
1 2024
Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation Science China Information Sciences
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2 2023
Intelligent networking in adversarial environment: challenges and opportunities Science China Information Sciences
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
5 2022
A survey on cryptographic techniques for protecting big data security: present and forthcoming Science China Information Sciences
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
6 2022
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9

The Computer Journal
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
3 2022