Deep search:Searching for "public key" in 'ABSTRACTGot 18 items.
index Title
16Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:6115  Download:8210  Cited:0  <Full Text>  <PPT> 539
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
17Verifier-local revocation group signatures with backward unlinkability from lattices
Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU,...  Clicked:5793  Download:7371  Cited:0  <Full Text>  <PPT> 326
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.876-892  DOI:10.1631/FITEE.2000507
18Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, ...  Clicked:1592  Download:8470  Cited:0  <Full Text>  <PPT> 340
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE