Deep search:Searching for "public key" in 'ABSTRACTGot 18 items.
index Title
16Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:6824  Download:10321  Cited:0  <Full Text>  <PPT> 699
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
17Verifier-local revocation group signatures with backward unlinkability from lattices
Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU,...  Clicked:6473  Download:8741  Cited:0  <Full Text>  <PPT> 459
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.876-892  DOI:10.1631/FITEE.2000507
18Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, ...  Clicked:2150  Download:11257  Cited:0  <Full Text>  <PPT> 474
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE