scispace - formally typeset
W

Wang Yuxiao

Publications -  7
Citations -  105

Wang Yuxiao is an academic researcher. The author has contributed to research in topics: Ciphertext & Encryption. The author has an hindex of 5, co-authored 7 publications receiving 105 citations.

Papers
More filters
Patent

Block chain privacy data access control method based on attribute encryption

TL;DR: Li et al. as mentioned in this paper proposed a block chain privacy data access control method based on attribute encryption, which mainly solves a problem in the prior art that the real identity of a user in the block chain is anonymously protected but the and transaction privacy information is not encrypted so as to cause privacy leakage.
Patent

Message-based and key-dependent privacy data encryption method

TL;DR: In this article, a message-based and key-dependent privacy data encryption method was proposed to solve the problems of key-related attacks and key exposure accidents due to the neglected consideration of the correlation between plaintexts and keys and the E-mail-based distribution of group public keys.
Patent

Intelligent medical service method based on undistinguishable confusion

TL;DR: In this paper, an intelligent medical service method based on undistinguishable confusion is proposed, which is characterized in that a data owner independently decides allocation for the medical data access authority through carrying out security symmetric encryption on medical information uploaded to a cloud server.
Patent

Privacy protection method of unmanned automobile

TL;DR: In this paper, a privacy protection method of an unmanned automobile is proposed, which mainly solves the problem of privacy leakage caused by the fact that participant identity information is not hidden and the problem that single point failure of a centralized server in the prior art.
Patent

Homomorphic encryption-based virtual asset anonymous ranking method

TL;DR: In this article, a homomorphic encryption-based virtual asset anonymous ranking method is proposed to solve the problems of user privacy disclosure and the narrow range of single-client ciphertext ranking which are caused by a condition that a private key is directly handed over to a proxy server.