Items where Author is "Sun, Jiameng"
access control
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2902380)
anonymous authentication
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2902380)
attribute based signature
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2902380)
attribute-based encryption
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
cloud computing
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
confidentiality-preserving public verifiable computation (CPPVC)
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
fuzzy identity
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
matrix-vector multiplication
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
Multi-authority
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)
multivariate polynomial evaluation
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
outsourcing computation
Sun, Jiameng, Su, Ye, Qin, Jing, Hu, Jiankun and Ma, Jixin (2019) Outsourced decentralized multi-authority attribute based signature and its application in IoT. IEEE Transactions on Cloud Computing, 9 (3). pp. 1195-1209. ISSN 2168-7161 (Online) (doi:10.1109/TCC.2019.2902380)
public verifiability
Sun, Jiameng ORCID: https://orcid.org/0000-0003-3153-7698, Zhu, Binrui, Qin, Jing ORCID: https://orcid.org/0000-0003-2380-0396, Hu, Jiankun ORCID: https://orcid.org/0000-0003-0230-1432 and Ma, Jixin (2018) Confidentiality-preserving publicly verifiable computation schemes for polynomial evaluation and matrix-vector multiplication. Security and Communication Networks, 2018:5275132. ISSN 1939-0114 (Print), 1939-0122 (Online) (doi:10.1155/2018/5275132)
searchable encryption
Zhu, Binrui, Sun, Jiameng, Qin, Jing and Ma, Jixin (2017) Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Computing, 23 (2). pp. 527-536. ISSN 1432-7643 (Print), 1433-7479 (Online) (doi:10.1007/s00500-017-2849-3)