Journal of Shanghai Jiaotong University ›› 2012, Vol. 46 ›› Issue (09): 1361-1365.
• Automation Technique, Computer Technology • Previous Articles Next Articles
QI Cheng-Jie, DONG Xiao-Lei
Received:
2011-12-21
Online:
2012-09-28
Published:
2012-09-28
CLC Number:
QI Cheng-Jie, DONG Xiao-Lei. An Efficient and Secure Spatial Encryption Scheme[J]. Journal of Shanghai Jiaotong University, 2012, 46(09): 1361-1365.
[1]Shamir A. Identitybased cryptosystems and signature schemes [J]. Lecture Notes in Computer Science, 1985, 196: 4753. [2]Boneh D, Franklin M. Identitybased encryption from weil pairing [J]. Lecture Notes in Computer Science, 2001, 2139: 13229. [3]Cocks C. An identity based encryption scheme based on quadratic residues [J]. Lecture Notes in Computer Science, 2001,2260:360363. [4]Boldyreva A, Goyal V, Kumar V. Identitybased encryption with efficient revocation [C]∥Proceedings of the 15th ACM Conference on Computer and Communications Security. New York, USA: ACM, 2008: 417426. [5]Lewko A, Waters B. New techniques for dual system encryption and full secure HIBE with shortciphertexts [J]. Lecture Notes in Computer Science, 2010, 5978: 455479. [6]Boneh D, Hamburg M. Generalized identity based and broadcast encryption schemes [J]. Lecture Notes in Computer Science, 2008, 5350: 455470. [7]Zhou Muxin, Cao Zhenfu. Spatial encryption under simpler assumption [J]. Lecture Notes in Computer Science, 2009, 5848: 1931. [8]Boneh D, Goh E J, Nissim K. Evaluating 2DNF formulas on ciphertexts [J]. Lecture Notes in Computer Science, 2005, 3378: 325341. |
[1] | LIU Yahui, SHEN Xingwang, GU Xinghai, PENG Tao, BAO Jinsong, ZHANG Dan. A Dual-System Reinforcement Learning Method for Flexible Job Shop Dynamic Scheduling [J]. Journal of Shanghai Jiao Tong University, 2022, 56(9): 1262-1275. |
[2] | ZHANG Liang, QU Gang, LI Huixing, JIN Haochun. Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 103-109. |
[3] | ZHOU Yi, QIN Kangping, SUN Jinwen, FAN Dongqi, ZHENG Yiming. Real-Time Risk Evaluation Method of Power System Equipment and N-m Fault Contingency Plan Generation Under Typhoon Meteorological Environment [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 22-30. |
[4] | WU Nan, CHENG Zhetao, DU Liang, SHEN Yingping. Network Security Inference Method Based on Dempster-Shafer Theory [J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 77-81. |
[5] | ZHANG Taolue∗ (张韬略), TU Huizhao (涂辉招), QIU Wei (邱 炜). Developing High-Precision Maps for Automated Driving in China: Legal Obstacles and the Way to Overcome Them [J]. J Shanghai Jiaotong Univ Sci, 2021, 26(5): 658-669. |
[6] | CHEN Ying, WEI Guoning, TANG Shengyong, KANG Zhiyu. Global Space Security Situation Analysis and Development Proposal [J]. Air & Space Defense, 2021, 4(3): 99-104. |
[7] | WANG Mingzheng, WANG Yijie, WANG Tianyu, HOU Linzao, LI Mian . New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions [J]. J Shanghai Jiaotong Univ Sci, 2020, 25(6): 689-699. |
[8] | YANG Guangyu, QIU Hongbing. Robust Optimization for Energy Efficiency for Secrecy MIMO SWIPT Systems [J]. Journal of Shanghai Jiao Tong University, 2020, 54(4): 369-375. |
[9] | SUN Zhuo,LIU Dong,XIAO Anhong,MING Pingzhou,GUO Wen,ZHOU Junyi,CHEN Junjie. Information Security Analysis of Digital Control System Based on Attack Tree Model [J]. Journal of Shanghai Jiaotong University, 2019, 53(Sup.1): 68-73. |
[10] | HUA Cunqing. A Survey of Security Detection and Protection for Internet of Things [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1307-1313. |
[11] | YI Ping,WANG Kedi,HUANG Cheng,GU Shuangchi,ZOU Futai,LI Jianhua. Adversarial Attacks in Artificial Intelligence: A Survey [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1298-1306. |
[12] | XIA Yubin,CHEN Haibo,GUAN Haibing. Research on Computer System Isolation [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1339-1347. |
[13] | LI Jianhua. A Survey of New E-Government and Its Security Technologies [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1370-1381. |
[14] | Zhang Wei. Research on Key Technologies of Air Space [J]. Air & Space Defense, 2018, 1(1): 13-17. |
[15] | Xijiang CHEN, Guang ZHANG, Xianfeng CHEN, Hao WU. Diversified Safety Science and Engineering Innovation Experiment Platform [J]. Research and Exploration in Laboratory, 2017, 36(5): 260-263. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 383
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 2860
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||