|
|
A privacy-preserving group encryption scheme with identity exposure |
Chuan-Kun WU() |
School of Information Science and Engineering, Linyi University, Linyi 276000, China |
|
|
|
Corresponding Author(s):
Chuan-Kun WU
|
Just Accepted Date: 15 March 2022
Issue Date: 22 April 2022
|
|
1 |
D Chaum E van Heyst. Group signatures. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 257– 265
|
2 |
E Bresson J Stern M Szydlo. Threshold ring signatures and applications to ad-hoc groups. In: Proceedings of the 22nd Annual International Cryptology Conference Santa Barbara. 2002, 465– 480
|
3 |
L Zhang , P Liang , Y Mu . Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 2018, 6: 12736– 12745
|
4 |
T Zhou , J Shen , D He , P Vijayakumar , N Kumar . Human-in-the-loop-aided privacy-preserving scheme for smart healthcare. IEEE Transactions on Emerging Topics in Computational Intelligence, 2022, 6( 1): 6– 15
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|