2017
DOI: 10.1016/j.jcss.2016.12.004
|View full text |Cite
|
Sign up to set email alerts
|

CDPS: A cryptographic data publishing system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Real-time performance is an important requirement of CPS [39]. The industry needs CPS to track the running status of physical entities in real time.…”
Section: Safety Analysis and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Real-time performance is an important requirement of CPS [39]. The industry needs CPS to track the running status of physical entities in real time.…”
Section: Safety Analysis and Discussionmentioning
confidence: 99%
“…The key to the erroneous data judgment is the CRC check. The CRC32 algorithm is used in this design, and it is considered that CRC32 can reliably detect the error of the communication data frame [39]. Smart contracts are unique in blockchains.…”
Section: B Blockchain Design and Safety Protection For Cps Functionamentioning
confidence: 99%
“…is will improve the computational efficiency of our cryptosystem. ( 2 [26][27][28]. However, as we point out previously, the cryptographic system based on ME problem over tropical matrix has no high computational efficiency, since the number of matrices n and the order k of the matrix are large in order to ensure security.…”
Section: Conclusion and Further Researchmentioning
confidence: 99%
“…In cloud computing, the ownership of data is separated from the management rights of data. To protect the confidentiality and privacy of data, cloud data must be encrypted before they are outsourced to the cloud [4,5]. A central advantage of using cryptographic primitives such as symmetric-key encryption is that the safety of a large amount of sensitive data can be reduced to the safety of a very small key [6].…”
Section: Introductionmentioning
confidence: 99%