scispace - formally typeset
T

Ting Li

Researcher at Northwest Normal University

Publications -  11
Citations -  166

Ting Li is an academic researcher from Northwest Normal University. The author has contributed to research in topics: Public-key cryptography & Key escrow. The author has an hindex of 4, co-authored 10 publications receiving 43 citations.

Papers
More filters
Journal ArticleDOI

Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology

TL;DR: Results of the analysis show that the scheme satisfies the requirements for confidentiality and unforgeability in the random oracle model, and that the proposed scheme offers higher computational performance than other similar schemes.
Journal ArticleDOI

Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain

TL;DR: A certificateless multi-replica and multi-cloud data public audit scheme based on blockchain technology that uses the unpredictability of blocks in the blockchain to construct fair challenge information, thereby preventing malicious TPA and cloud servers from colluding to deceive users.
Journal ArticleDOI

Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain

TL;DR: This work proposes a multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain that avoids the problems of certificate management in traditional cryptosystem and key escrow in identity-based cryptosSystem, and proves that the proposed scheme is secure against inside keyword guessing attacks in the random oracle model.
Journal ArticleDOI

A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud

TL;DR: This work proposes a blockchain-assisted verifiable outsourced attribute-based signcryption scheme (BVOABSC) which realizes the secure sharing of EHRs in a multi-authority cloud storge environment and uses blockchain technology to protect outsourced Ehrs from tampering by illegal users.
Journal ArticleDOI

Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability

TL;DR: This work uses certificateless signature technology to construct a privacy-preserving cloud auditing scheme for multiple users with authorization and traceability and introduces an identity authentication process between the third-party auditor (TPA) and the CSP to prevent the denial of service attack.