Scheme on user identity attribute preserving based on ring signcryption for cloud computing
Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with dec...
Saved in:
Main Authors: | Shuan-bao LI, Jian-ming FU, Huan-guo ZHANG, Jing CHEN, Jing WANG, Bi-jun REN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.09.010/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Analysis and improvement of an identity-based signature scheme from lattices
by: ANGChun-li Y, et al.
Published: (2015-05-01) -
Certificateless strong designated verifier multi-signature
by: Hong-zhen DU, et al.
Published: (2016-06-01) -
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01) -
Security analysis and improvement of a certificateless signcryption scheme
by: Zhen-guo ZHAO
Published: (2015-03-01) -
Cryptanalysis and design of signature schemes with identity ambiguity in the standard model
by: ZHANG Ming-wu1, et al.
Published: (2011-01-01)