Journal of Shanghai Jiaotong University ›› 2012, Vol. 46 ›› Issue (09): 1361-1365.
• Automation Technique, Computer Technology • Previous Articles Next Articles
QI Cheng-Jie, DONG Xiao-Lei
Received:2011-12-21
Online:2012-09-28
Published:2012-09-28
CLC Number:
QI Cheng-Jie, DONG Xiao-Lei. An Efficient and Secure Spatial Encryption Scheme[J]. Journal of Shanghai Jiaotong University, 2012, 46(09): 1361-1365.
| [1]Shamir A. Identitybased cryptosystems and signature schemes [J]. Lecture Notes in Computer Science, 1985, 196: 4753.[2]Boneh D, Franklin M. Identitybased encryption from weil pairing [J]. Lecture Notes in Computer Science, 2001, 2139: 13229.[3]Cocks C. An identity based encryption scheme based on quadratic residues [J]. Lecture Notes in Computer Science, 2001,2260:360363.[4]Boldyreva A, Goyal V, Kumar V. Identitybased encryption with efficient revocation [C]∥Proceedings of the 15th ACM Conference on Computer and Communications Security. New York, USA: ACM, 2008: 417426.[5]Lewko A, Waters B. New techniques for dual system encryption and full secure HIBE with shortciphertexts [J]. Lecture Notes in Computer Science, 2010, 5978: 455479.[6]Boneh D, Hamburg M. Generalized identity based and broadcast encryption schemes [J]. Lecture Notes in Computer Science, 2008, 5350: 455470.[7]Zhou Muxin, Cao Zhenfu. Spatial encryption under simpler assumption [J]. Lecture Notes in Computer Science, 2009, 5848: 1931.[8]Boneh D, Goh E J, Nissim K. Evaluating 2DNF formulas on ciphertexts [J]. Lecture Notes in Computer Science, 2005, 3378: 325341. |
| [1] | HE Ruiwen, YANG Changxin, XIE Haijun, YANG Shenghui, MOHAMMAD Shahidehpour. Analysis Methods and Simulation Technology Implementation for Power Secondary Systems in New Power Systems [J]. Journal of Shanghai Jiao Tong University, 2026, 60(2): 175-185. |
| [2] | LI Hongxin, ZHONG Zuhao, LU Yi, WEN Yunfeng. Optimization of Frequency Control Parameters of Wind Farms Considering Inertia Security Requirement [J]. Journal of Shanghai Jiao Tong University, 2025, 59(3): 323-332. |
| [3] | TANG Cheng, LIANG Yilin, LI Wenjie, CHEN Guoling. Research on Security of Wideband Communication Satellite Situational Awareness Network [J]. Air & Space Defense, 2025, 8(2): 136-141. |
| [4] | CHEN Yi, WANG Han, ZENG Dan, YAN Zheng, XUE Bike, ZHAO Le, XIONG Xuejun, FENG Yuyao. A Fast Calculation Method for N-1 Security-Constrained Economic Dispatch via Low-Rank Approximation Surrogate Model [J]. Journal of Shanghai Jiao Tong University, 2024, 58(10): 1524-1533. |
| [5] | YE Lun, OUYANG Xu, YAO Jiangang, YANG Shengjie, YIN Jungang. Reliability Index Calculation and Reserve Capacity Optimization Considering Multiple Uncertainties [J]. Journal of Shanghai Jiao Tong University, 2024, 58(1): 30-39. |
| [6] | ZHANG Qingguo, LIU Chunyue, LUO Song, WANG Shuili, LIU Qing. Current Status and Prospects of External Security Technology for Offshore Platforms [J]. Ocean Engineering Equipment and Technology, 2023, 10(4): 92-106. |
| [7] | WANG Zhaoxi, SHENG Peng, LI Yunyun, WU Xinkai, HUANG Yuejin. Multiaxial Vibration Security and Validity Verification of Connecting Pieces in Typical Section [J]. Air & Space Defense, 2023, 6(1): 85-95. |
| [8] | LIU Yahui, SHEN Xingwang, GU Xinghai, PENG Tao, BAO Jinsong, ZHANG Dan. A Dual-System Reinforcement Learning Method for Flexible Job Shop Dynamic Scheduling [J]. Journal of Shanghai Jiao Tong University, 2022, 56(9): 1262-1275. |
| [9] | WU Nan, CHENG Zhetao, DU Liang, SHEN Yingping. Network Security Inference Method Based on Dempster-Shafer Theory [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 77-81. |
| [10] | ZHOU Yi, QIN Kangping, SUN Jinwen, FAN Dongqi, ZHENG Yiming. Real-Time Risk Evaluation Method of Power System Equipment and N-m Fault Contingency Plan Generation Under Typhoon Meteorological Environment [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 22-30. |
| [11] | ZHANG Liang, QU Gang, LI Huixing, JIN Haochun. Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 103-109. |
| [12] | ZHANG Taolue∗ (张韬略), TU Huizhao (涂辉招), QIU Wei (邱 炜). Developing High-Precision Maps for Automated Driving in China: Legal Obstacles and the Way to Overcome Them [J]. J Shanghai Jiaotong Univ Sci, 2021, 26(5): 658-669. |
| [13] | CHEN Ying, WEI Guoning, TANG Shengyong, KANG Zhiyu. Global Space Security Situation Analysis and Development Proposal [J]. Air & Space Defense, 2021, 4(3): 99-104. |
| [14] | WANG Mingzheng, WANG Yijie, WANG Tianyu, HOU Linzao, LI Mian . New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions [J]. J Shanghai Jiaotong Univ Sci, 2020, 25(6): 689-699. |
| [15] | YANG Guangyu, QIU Hongbing. Robust Optimization for Energy Efficiency for Secrecy MIMO SWIPT Systems [J]. Journal of Shanghai Jiao Tong University, 2020, 54(4): 369-375. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||