Privacy protection key distribution protocol for edge computing
Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifica...
Saved in:
Main Authors: | Jian SHEN, Tianqi ZHOU, Chen WANG, Huijie YANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021010 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
by: Ashutosh Bhatia, et al.
Published: (2025-01-01) -
Method of privacy protection based on multiple edge servers in personalized search
by: Qiang ZHANG, et al.
Published: (2019-02-01) -
Edge computing privacy protection method based on blockchain and federated learning
by: Chen FANG, et al.
Published: (2021-11-01) -
Trusted edge computing for smart healthcare
by: Shaoliang PENG, et al.
Published: (2020-06-01) -
Research on ciphertext search and sharing technology in edge computing mode
by: Jifeng WANG, et al.
Published: (2022-04-01)