Cross-chain trusted information match scheme with privacy-perserving and auditability
Zheng Chen, Jiageng Chen, Zejun Lu
Verifiable Attribute-Based Proxy Re-Encryption with Non-repudiation based on Block-Chain
Yaorui He, Ting Liang, Pei Huang, Zhe Xia
A distributed lightweight identity authentication method in Satellite network
Bo Tang, Shixiong Yao, Pei Li, Xiaokaiti Aini
Blockchain-Based Hierarchical Access Control with Efficient Revocation in mHealth System
Ting Liang, Yaorui He, Pei Huang, Zhe Xia
A suvey of algorithms for addressing the Shortest Vector Problem (SVP)
Errui He, Tianyu Xu, Mengsi Wu, Jiageng Chen, Shixiong Yao, Pei Li
DRSA: Debug Register-Based Self-relocating Attack against software-based remote authentication
Zheng Zhang, Jingfeng Xue, Tianshi Mu, Ting Yu, Kefan Qiu, Tian Chen, YuanZhang Li
Intellectual Property Data Trading through NFTization
Ziyang Ji, Jie Zhang, Steve Guan, Ka Lok Man
Fuzz Testing of UAV Configurations Based on Evolutionary Algorithms
Yuexuan Ma, Xiao Yu, Yuanzhang Li, Li Zhang, Yuan Tan
PSWS: Private Support-Weighted Sum Protocol for Privacy-Preserving Blockchain-Based Voting with Ballot Secrecy
Chenyu Deng, Mingwu Zhang
Identity-Based Key Verifiable Inner Product Functional Encryption Scheme
Mingwu Zhang, Chao He, Gang Shen