Computer Science ›› 2025, Vol. 52 ›› Issue (10): 412-422.doi: 10.11896/jsjkx.240600137
• Information Security • Previous Articles Next Articles
GUO Lifeng, YANG Jieying, MA Tianjun, ZHANG Xialei
CLC Number:
[1]REGEV O.On Lattices,Learning with Errors,Random Linear Codes,and Cryptography[J].Journal of the ACM,2009,56(6):1-40. [2]BOYEN X.Attribute-based Functional Encryption on Lattices[C]//Theory of cryptography conference.Berlin:Springer,2013:122-142. [3]KUCHTA V,MARKOWITCH O.Multi-authority Distributed Attribute-based Encryption with Application to Searchable Encryption on Lattices[C]//Paradigms in Cryptology-Mycrypt 2016.Springer,2017:409-435. [4]SINGAMANENI K K,BUDATI A K,BIKKU T.An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy[J/OL].Wireless Personal Communications.(2024).https://doi.org/10.1007/s11277-024-10908-8. [5]SUN L,ZHAO Z,WANG J,et al.Attribute-based Encryption Scheme Supporting Attribute Revocation in Cloud Storage Environment[J].Journal on Communication/Tongxin Xuebao,2019,40(5):47-56. [6]HAN D Z,PAN N N,KUAN C L.A Traceable and RevocableCiphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection[J].IEEE Transactions on Dependable and Secure Computing,2020,19(1):316-327. [7]WANG S,ZHANG X,ZHANG Y.Efficient Revocable andGrantable Attribute-based Encryption from Lattices with Fine-Grained Access Control[J].IET Information Security,2018,12(2):141-149. [8]CHEN J,LIM H W,LING S,et al.Revocable Identity-based Encryption from Lattices[C]//Information Security and Privacy:17th Australasian Conference.Springer,2012:390-403. [9]WANG Y.Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model[J].Interational Journal of Network Security,2014,16(6):444-451. [10]YANG K,WU G,DONG C,et al.Attribute Based Encryption with Efficient Revocation from Lattices[J].Interational Journal of Network Security,2020,22(1):161-170. [11]ZHAO S,JIANG R,BHARGAVA B.RL-ABE:A Revocable Lattice Attribute-based Encryption Scheme based on R-LWE Problem in Cloud Storage[J].IEEE Transactions on Services Computing,2020,15(2):1026-1035. [12]LUO F,AL-KUWARI S,WANG H,et al.Revocable Attribute-based Encryption from Standard Lattices[J].Computer Stan-dards & Interfaces,2023,84:103698. [13]HUANG B,GAO J,LI X.Efficient Lattice-based revocable attribute-based Encryption Against Decryption Key Exposure for Cloud File Sharing[J].Journal of Cloud Computing,2023,12(1):37. [14]GUO L,WANG L,MA X,et al.New Traceable and Revocable Attribute Based Encryption on Lattices[C]//2023 International Conference on Networking and Network Applications(NaNA).IEEE,2023:359-364. [15]GREE N,MATTHEW D,IAN M.Forward Secure Asyn-chronous Messaging from Puncturable Encryption[C]//2015 IEEE Symposium on Security and Privacy.IEEE,2015:305-320. [16]PHUONG T V X,NING R,XIN C,et al.Puncturable Attri-bute-based Encryption for Secure Data Delivery in Internet of Things[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:1511-1519. [17]DUTTA P,SUSILO W,DUONG D H,et al.Puncturable Identity-based and Attribute-based Encryption from Lattices[J].Theoretical Computer Science,2022,929(11):18-38. [18]YANG M,WANG H,HE D.Puncturable Attribute-based Encryption from Lattices for Classified Document Sharing[J].IEEE Transactions on Information Forensics and Security,2024,929(11):4028-4042. |
[1] | YUAN Mengjiao, LU Tianliang, HUANG Wanxin, HE Houhan. Benign-salient Region Based End-to-End Adversarial Malware Generation Method [J]. Computer Science, 2025, 52(10): 382-394. |
[2] | HAN Yingmei, LI Bin, LI Kun, ZHOU Qinglei, YU Shiliang. Efficient Hardware Implementation of Pipelined NTT for Dynamic Rotation Factor Generation [J]. Computer Science, 2025, 52(9): 160-169. |
[3] | ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375. |
[4] | LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395. |
[5] | TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J. Identity-based Linkable Ring Signcryption on NTRU Lattice [J]. Computer Science, 2025, 52(9): 396-404. |
[6] | FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392. |
[7] | SUN Qiming, HOU Gang, JIN Wenjie, HUANG Chen, KONG Weiqiang. Survey on Fuzzing of Embedded Software [J]. Computer Science, 2025, 52(7): 13-25. |
[8] | ZHANG Linmao, SUN Cong, RAO Xue. Dynamic Library Debloating Enhanced System Call Restriction of Programs [J]. Computer Science, 2025, 52(7): 50-57. |
[9] | LI Jiangxu, CHEN Zemao, ZHANG Liqiang. Lightweight Authentication and Key Agreement Protocol for Cloud-assisted Smart Home Communication [J]. Computer Science, 2025, 52(7): 342-352. |
[10] | ZHANG Guanghua, CHEN Fang, CHANG Jiyou, HU Boning, WANG He. Accelerating Firmware Vulnerability Discovery Through Precise Localization of IntermediateTaint Sources and Dangerous Functions [J]. Computer Science, 2025, 52(7): 379-387. |
[11] | BAO Shenghong, YAO Youjian, LI Xiaoya, CHEN Wen. Integrated PU Learning Method PUEVD and Its Application in Software Source CodeVulnerability Detection [J]. Computer Science, 2025, 52(6A): 241100144-9. |
[12] | ZHANG Jing, WANG Yuping. Dual-platform Key Agreement Protocol Based on Semidirect Product [J]. Computer Science, 2025, 52(6A): 240600036-6. |
[13] | LIU Runjun, XIAO Fengjun, HU Weitong, WANG Xu. Reversible Data Hiding in Fully Encrypted Images Based on Pixel Interval Partitioning andPrediction Recovery [J]. Computer Science, 2025, 52(6A): 240900030-8. |
[14] | XIE Zhenjie, LIU Yiming, CAI Ruijie, LUO Youqiang. Performance Optimization Method for Domestic Cryptographic Algorithm SM9 [J]. Computer Science, 2025, 52(6): 390-396. |
[15] | WANG Qiuli, REN Zhiyu, WU Xiangyu, GUAN Qiuguo, WANG Haichao. Blockchain-based Internet of Things Traceable and Anonymous Cross-domain AuthenticationScheme [J]. Computer Science, 2025, 52(5): 337-344. |
|