W
Wang Yuxiao
Publications - 7
Citations - 105
Wang Yuxiao is an academic researcher. The author has contributed to research in topics: Ciphertext & Encryption. The author has an hindex of 5, co-authored 7 publications receiving 105 citations.
Papers
More filters
Patent
Block chain privacy data access control method based on attribute encryption
TL;DR: Li et al. as mentioned in this paper proposed a block chain privacy data access control method based on attribute encryption, which mainly solves a problem in the prior art that the real identity of a user in the block chain is anonymously protected but the and transaction privacy information is not encrypted so as to cause privacy leakage.
Patent
Message-based and key-dependent privacy data encryption method
TL;DR: In this article, a message-based and key-dependent privacy data encryption method was proposed to solve the problems of key-related attacks and key exposure accidents due to the neglected consideration of the correlation between plaintexts and keys and the E-mail-based distribution of group public keys.
Patent
Intelligent medical service method based on undistinguishable confusion
TL;DR: In this paper, an intelligent medical service method based on undistinguishable confusion is proposed, which is characterized in that a data owner independently decides allocation for the medical data access authority through carrying out security symmetric encryption on medical information uploaded to a cloud server.
Patent
Privacy protection method of unmanned automobile
TL;DR: In this paper, a privacy protection method of an unmanned automobile is proposed, which mainly solves the problem of privacy leakage caused by the fact that participant identity information is not hidden and the problem that single point failure of a centralized server in the prior art.
Patent
Homomorphic encryption-based virtual asset anonymous ranking method
TL;DR: In this article, a homomorphic encryption-based virtual asset anonymous ranking method is proposed to solve the problems of user privacy disclosure and the narrow range of single-client ciphertext ranking which are caused by a condition that a private key is directly handed over to a proxy server.