References
Chaum D, van Heyst E. Group signatures. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 257–265
Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In: Proceedings of the 22nd Annual International Cryptology Conference Santa Barbara. 2002, 465–480
Zhang L, Liang P, Mu Y. Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 2018, 6: 12736–12745
Zhou T, Shen J, He D, Vijayakumar P, Kumar N. Human-in-the-loop-aided privacy-preserving scheme for smart healthcare. IEEE Transactions on Emerging Topics in Computational Intelligence, 2022, 6(1): 6–15
Acknowledgements
This work was supported by Shandong Major Scientific and Technological Innovation Project (2019JZZY010134).
Author information
Authors and Affiliations
Corresponding author
Electronic Supplementary Material
Rights and permissions
About this article
Cite this article
Wu, CK. A privacy-preserving group encryption scheme with identity exposure. Front. Comput. Sci. 16, 165823 (2022). https://doi.org/10.1007/s11704-022-1555-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11704-022-1555-1