Skip to main content
Log in

A privacy-preserving group encryption scheme with identity exposure

  • Letter
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Chaum D, van Heyst E. Group signatures. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 257–265

  2. Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In: Proceedings of the 22nd Annual International Cryptology Conference Santa Barbara. 2002, 465–480

  3. Zhang L, Liang P, Mu Y. Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 2018, 6: 12736–12745

    Article  Google Scholar 

  4. Zhou T, Shen J, He D, Vijayakumar P, Kumar N. Human-in-the-loop-aided privacy-preserving scheme for smart healthcare. IEEE Transactions on Emerging Topics in Computational Intelligence, 2022, 6(1): 6–15

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by Shandong Major Scientific and Technological Innovation Project (2019JZZY010134).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuan-Kun Wu.

Electronic Supplementary Material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, CK. A privacy-preserving group encryption scheme with identity exposure. Front. Comput. Sci. 16, 165823 (2022). https://doi.org/10.1007/s11704-022-1555-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11704-022-1555-1