logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 5: 050106(2016) https://doi.org/10.1007/s11432-016-5558-0

New trends of information security---how to change people's life style?

More info
  • ReceivedDec 28, 2015
  • AcceptedJan 16, 2016
  • PublishedApr 12, 2016

Abstract


References

[1] Cao Z F. New Directions of Modern Cryptography. Boca Raton: CRC Press Inc., 2012. 1--400. Google Scholar

[2] Shao J, Cao Z F, Wang L C, et al. Proxy re-signature schemes without random oracles. In: Proceedings of 8th International Conference on Cryptology in India, Chennai, 2007. 197--209. Google Scholar

[3] Shao J, Cao Z F. CCA-secure proxy re-encryption without pairings. In: Proceedings of 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, 2009. 357--376. Google Scholar

[4] Liu Z, Cao Z F, Huang Q, et al. Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles. In: Proceedings of 16th European Symposium on Research in Computer Security, Leuven, 2011. 278--297. Google Scholar

[5] Liang X H, Cao Z F, Lin H, et al. Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, 2009. 343--352. Google Scholar

[6] Lin H, Cao Z F, Liang X H, et al. How to construct interval encryption from binary tree encryption. In: Proceedings of 8th International Conference on Applied Cryptography and Network Security, Beijing, 2010. 19--34. Google Scholar

[7] Cao Z F. J Sichuan Univ Eng Sci Ed, 2015, 47: 1-12 Google Scholar

[8] Liu Z, Cao Z F, Wong D S. IEEE Trans Inf Forensics Secur, 2013, 8: 76-88 Google Scholar

[9] Ning J T, Dong X L, Cao Z F, et al. IEEE Trans Inf Forensics Secur, 2015, 10: 1274-1288 Google Scholar

[10] Liu Z, Cao Z F, Wong D S. Blackbox traceable CP-ABE: How to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, 2013. 475--486. Google Scholar

[11] Liu Z, Cao Z F, Wong D S. IEEE Trans Inf Forensics Secur, 2015, 10: 55-68 Google Scholar

[12] Liang X H, Cao Z F, Lin H, et al. Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, 2009. 276--286. Google Scholar

[13] Qian J L, Dong X L. J Shanghai Jiaotong Univ Sci Ed, 2011, 16: 490-496 Google Scholar

[14] Sahai A, Seyalioglu H, Waters B. Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Proceedings of 32nd Annual Cryptology Conference, Santa Barbara, 2012. 199--217. Google Scholar

[15] Zhou J, Dong X L, Cao Z F, et al. IEEE Trans Inf Forensics Secur, 2015, 10: 1299-1314 Google Scholar

[16] Zhou J, Cao Z F, Dong X L, et al. IEEE Wirel Commun, 2015, 22: 136-144 Google Scholar

[17] Zhang Z Y, Cao Z F, Ding N, et al. Non-malleable statistically hiding commitment from any one-way function. In: Proceedings of 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, 2009. 303--318. Google Scholar

[18] Cao Z F, Visconti I, Zhang Z Y. Constant-round concurrent non-malleable statistically binding commitments and decommitments. In: Proceedings of 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, 2010. 193--208. Google Scholar

[19] Cao Z F, Visconti I, Zhang Z Y. Inf Process Lett, 2011, 111: 883-890 Google Scholar

[20] Dong X L, Wei L F, Zhu H J, et al. IEEE Trans Veh Technol, 2011, 60: 580-591 Google Scholar

[21] Lin H, Zhu X Y, Fang Y G, et al. IEEE J Sel Areas Commun, 2013, 31: 279-290 Google Scholar

[22] Zhu H J, Du S G, Gao Z Y, et al. IEEE Trans Parall Distr Syst, 2014, 25: 22-32 Google Scholar

[23] Zhou J, Lin X D, Dong X L, et al. IEEE Trans Parall Distr Syst, 2015, 26: 1693-1703 Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1