T
Ting Li
Researcher at Northwest Normal University
Publications - 11
Citations - 166
Ting Li is an academic researcher from Northwest Normal University. The author has contributed to research in topics: Public-key cryptography & Key escrow. The author has an hindex of 4, co-authored 10 publications receiving 43 citations.
Papers
More filters
Journal ArticleDOI
Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology
TL;DR: Results of the analysis show that the scheme satisfies the requirements for confidentiality and unforgeability in the random oracle model, and that the proposed scheme offers higher computational performance than other similar schemes.
Journal ArticleDOI
Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain
TL;DR: A certificateless multi-replica and multi-cloud data public audit scheme based on blockchain technology that uses the unpredictability of blocks in the blockchain to construct fair challenge information, thereby preventing malicious TPA and cloud servers from colluding to deceive users.
Journal ArticleDOI
Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain
TL;DR: This work proposes a multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain that avoids the problems of certificate management in traditional cryptosystem and key escrow in identity-based cryptosSystem, and proves that the proposed scheme is secure against inside keyword guessing attacks in the random oracle model.
Journal ArticleDOI
A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud
TL;DR: This work proposes a blockchain-assisted verifiable outsourced attribute-based signcryption scheme (BVOABSC) which realizes the secure sharing of EHRs in a multi-authority cloud storge environment and uses blockchain technology to protect outsourced Ehrs from tampering by illegal users.
Journal ArticleDOI
Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability
TL;DR: This work uses certificateless signature technology to construct a privacy-preserving cloud auditing scheme for multiple users with authorization and traceability and introduces an identity authentication process between the third-party auditor (TPA) and the CSP to prevent the denial of service attack.