Deep search:Searching for "public key" in 'ABSTRACT and KEYWORDGot 18 items.
index Title
16Identity-based threshold proxy re-encryption scheme from lattices and its applications
Author(s):Liqiang WU, Yiliang HAN, Xiaoyuan ...  Clicked:5833  Download:5268  Cited:0  <Full Text>  <PPT> 491
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.2 P.258-277  DOI:10.1631/FITEE.2000366
17Verifier-local revocation group signatures with backward unlinkability from lattices
Author(s):Yanhua ZHANG, Ximeng LIU, Yupu HU,...  Clicked:5508  Download:4764  Cited:0  <Full Text>  <PPT> 286
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.6 P.876-892  DOI:10.1631/FITEE.2000507
18Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Author(s):Xuehu YAN, Longlong LI, Jia CHEN, ...  Clicked:1357  Download:3458  Cited:0  <Full Text>  <PPT> 288
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.1 P.88-103  DOI:10.1631/FITEE.2200118
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE