Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Rupeng Yang"'
Publikováno v:
IEEE Access, Vol 7, Pp 37394-37405 (2019)
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation. Our basic
Externí odkaz:
https://doaj.org/article/5410ef7d62a04d9581d71a5d804414ea
Autor:
Ruixian Chen, Jianying Hao, Jinyu Wang, Jianan Li, Yongkun Lin, Hongjie Liu, Rupeng Yang, Rongquan Fan, Kun Wang, Dakui Lin, Xiaodi Tan, Xiao Lin
Publikováno v:
Ultra-High-Definition Imaging Systems VI.
Autor:
Rongquan Fan, Jianying Hao, Ruixian Chen, Jianan Li, Yongkun Lin, Hongjie Liu, Rupeng Yang, Linlin Fan, Kun Wang, Dakui Lin, Xiao Lin, Xiaodi Tan
Publikováno v:
Ultra-High-Definition Imaging Systems VI.
Autor:
Rupeng Yang
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031306198
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::65b5daf1df47524b1d55b05e2b266370
https://doi.org/10.1007/978-3-031-30620-4_6
https://doi.org/10.1007/978-3-031-30620-4_6
Publikováno v:
Optics Letters. 48:2941
We propose a simple and inexpensive method for the fabrication of polarization splitters with designable separation angles and a controllable active area, based on polarization holography of tensor theory. First, we design two polarization holograms
Publikováno v:
Advances in Cryptology – CRYPTO 2022 ISBN: 9783031159787
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f61c6b1382d5c34cc522c21d328722ff
https://doi.org/10.1007/978-3-031-15979-4_22
https://doi.org/10.1007/978-3-031-15979-4_22
Publikováno v:
Computers & Security. 85:353-371
Blacklistable anonymous credential systems provide service providers with a way to authenticate users according to their historical behaviors, while guaranteeing that all users can access services in an anonymous and unlinkable manner, thus are poten
Publikováno v:
IEEE Access, Vol 7, Pp 37394-37405 (2019)
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation. Our basic
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920746
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2a058961042980fafc18a3f68f1f1164
https://doi.org/10.1007/978-3-030-92075-3_16
https://doi.org/10.1007/978-3-030-92075-3_16
Publikováno v:
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648367
ASIACRYPT (1)
ASIACRYPT (1)
Public key encryption (PKE) schemes are usually deployed in an open system with numerous users. In practice, it is common that some users are corrupted. A PKE scheme is said to be receiver selective opening (RSO) secure if it can still protect messag
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bd1a9e2475de8c21de3a3fd0480cced5
https://doi.org/10.1007/978-3-030-64837-4_7
https://doi.org/10.1007/978-3-030-64837-4_7