Cargando…

Obfuscating encrypted threshold signature algorithm and its applications in cloud computing

Current cloud computing causes serious restrictions to safeguarding users’ data privacy. Since users’ sensitive data is submitted in unencrypted forms to remote machines possessed and operated by untrusted service providers, users’ sensitive data may be leaked by service providers. Program obfuscati...

Descripción completa

Detalles Bibliográficos
Autores principales: Li, Yahong, Wei, Jianzhou, Wu, Bin, Wang, Chunli, Wang, Caifen, Zhang, Yulei, Yang, Xiaodong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8051800/
https://www.ncbi.nlm.nih.gov/pubmed/33861767
http://dx.doi.org/10.1371/journal.pone.0250259