咨询与建议

限定检索结果

文献类型

  • 14 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 15 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 4 篇 电气工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 网络空间安全
  • 6 篇 理学
    • 4 篇 数学
    • 2 篇 物理学

主题

  • 19 篇 learning with er...
  • 9 篇 lattice-based cr...
  • 3 篇 standard model
  • 3 篇 dynamic
  • 3 篇 broadcast encryp...
  • 3 篇 anonymity
  • 2 篇 decryption error
  • 2 篇 equality test
  • 2 篇 identity-based e...
  • 2 篇 servers
  • 2 篇 security
  • 2 篇 probability
  • 2 篇 signcryption
  • 2 篇 cryptography
  • 1 篇 ring signcryptio...
  • 1 篇 quantum computin...
  • 1 篇 enumeration algo...
  • 1 篇 small integer so...
  • 1 篇 wireless ad hoc ...
  • 1 篇 the standard mod...

机构

  • 4 篇 shandong jianzhu...
  • 2 篇 engineering rese...
  • 2 篇 engn univ chines...
  • 2 篇 wuhan univ sch c...
  • 2 篇 naval univ engn ...
  • 1 篇 department of ma...
  • 1 篇 univ norte barra...
  • 1 篇 univ elect sci &...
  • 1 篇 xidian univ sch ...
  • 1 篇 sci & technol co...
  • 1 篇 hangzhou normal ...
  • 1 篇 state key labora...
  • 1 篇 natl inst inform...
  • 1 篇 key laboratory o...
  • 1 篇 yokohama natl un...
  • 1 篇 kddi res inc inf...
  • 1 篇 acad mil sci peo...
  • 1 篇 school of mathem...
  • 1 篇 shandong jianzhu...
  • 1 篇 qilu univ techno...

作者

  • 5 篇 wang fenghe
  • 5 篇 wang chunxiao
  • 2 篇 yang zhichao
  • 2 篇 kun tian
  • 2 篇 he debiao
  • 2 篇 zhiyong zheng
  • 1 篇 zhang jiang
  • 1 篇 aono yoshinori
  • 1 篇 lei bi
  • 1 篇 chen kefei
  • 1 篇 zhang zhao
  • 1 篇 wang baocang
  • 1 篇 yunfan lu
  • 1 篇 xiao han
  • 1 篇 roy partha sarat...
  • 1 篇 duong dung hoang
  • 1 篇 licheng wang
  • 1 篇 wang xuan
  • 1 篇 kiyomoto shinsak...
  • 1 篇 xiuhua lu

语言

  • 17 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=Learning with Errors Problem"
19 条 记 录,以下是1-10 订阅
排序:
LPbT-SSO: Password-Based Threshold Single-Sign-On Authentication From LWE
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2025年 第1期22卷 491-504页
作者: Cao, Chenchen Xu, Chunxiang Jiang, Changsong Zhang, Zhao Dong, Xinfeng Chen, Kefei Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China Univ Elect Sci & Technol China Yangtze Delta Reg Inst Huzhou Huzhou 313001 Peoples R China Sci & Technol Commun Secur Lab Chengdu 610041 Peoples R China Hangzhou Normal Univ Dept Math Hangzhou 310027 Peoples R China
In networks, clients access various servers. Servers need to authenticate clients' identities and provide services to clients who pass the authentication. Password-based threshold single-sign-on authentication (Pb... 详细信息
来源: 评论
A lattice-based signcryption scheme without random oracles
收藏 引用
Frontiers of Computer Science 2014年 第4期8卷 667-675页
作者: Xiuhua LU Qiaoyan WEN Zhengping JIN Licheng WANG Chunli YANG State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Mathematics and Information Science Langfang Teachers University Langfang 065000 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China
In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112-2122] and Wang Fenghe et al. [Applied Mathematics & Inf... 详细信息
来源: 评论
An Efficient Identity-Based Encryption With Equality Test in Cloud Computing
收藏 引用
IEEE TRANSACTIONS ON CLOUD COMPUTING 2023年 第3期11卷 2983-2992页
作者: Yang, Zhichao He, Debiao Qu, Longjiang Ye, Qing Naval Univ Engn Dept Informat Secur Wuhan 430000 Peoples R China Qilu Univ Technol Shandong Acad Sci Shandong Prov Key Lab Comp Networks Jinan 250014 Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan 430000 Peoples R China Natl Univ Def Technol Coll Liberal Arts & Sci Changsha 410000 Peoples R China
Identity-based encryption with equality test (IBEET) provides a feasible way for cloud server partitioning or searching on ciphertexts in the cloud. In that case, the server can judge if two different ciphertexts encr... 详细信息
来源: 评论
Security estimation of LWE via BKW algorithms
收藏 引用
Cybersecurity 2024年 第1期7卷 71-87页
作者: Yu Wei Lei Bi Xianhui Lu Kunpeng Wang SKLOIS Institute of Information EngineeringCASBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
The learning With errors(LWE)problem is widely used in lattice-based cryptography,which is the most promising post-quantum cryptography *** are a variety of LWE-solving methods,which can be classified into four groups... 详细信息
来源: 评论
Full secure identity-based encryption scheme with short public key size over lattices in the standard model
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 2016年 第6期93卷 854-863页
作者: Wang, Fenghe Liu, ZhenHua Wang, Chunxiao Shandong Jianzhu Univ Dept Math & Phys Jinan Peoples R China Xidian Univ Sch Math & Stat Xian Peoples R China
An efficient identity-based encryption (IBE) scheme over lattice is proposed in this paper. Under the hardness of the learning with errors (LWE) problem, the proposed scheme is semantic secure against adaptive chosen ... 详细信息
来源: 评论
Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme  10
Lattice-based Dynamical and Anonymous Broadcast Encryption S...
收藏 引用
10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 3PGCIC
作者: Wang Fenghe Wang Xuan Wang Chunxiao Shandong Jianzhu Univ Dept Math & Phys Jinan 250014 Peoples R China Engn Univ Chinese Armed Police Force Xian 710086 Peoples R China
This paper proposes a broadcast encryption scheme over lattice which is dynamical and anonymous simultaneously. The dynamic property means that the authorized user is not fixed in proposed scheme, and the broadcaster ... 详细信息
来源: 评论
Cold Boot Attacks on Bliss  6th
Cold Boot Attacks on Bliss
收藏 引用
6th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT)
作者: Villanueva-Polanco, Ricardo Univ Norte Barranquilla Colombia
In this paper, we examine the feasibility of cold boot attacks against the BLISS signature scheme. We believe this to be the first time that this has been attempted. Our work is the continuation of the trend to develo... 详细信息
来源: 评论
Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE  22nd
Anonymous Broadcast Authentication with Logarithmic-Order Ci...
收藏 引用
22nd International Conference on Cryptology and Network Security
作者: Aono, Yoshinori Shikata, Junji Yokohama Natl Univ Inst Adv Sci 79-5 TokiwadaiHodogaya Ku Yokohama Kanagawa 2408501 Japan Natl Inst Informat & Commun Technol 4-2-1 Nukui Kitamachi Koganei Tokyo Japan Yokohama Natl Univ Grad Sch Environm & Informat Sci 79-7 TokiwadaiHodogaya Ku Yokohama Kanagawa 2408501 Japan
We propose an anonymous broadcast authentication (ABA) scheme to simultaneously control massive numbers of devices within practical resources. As a theoretical foundation, we find a barrier to construct an ABA working... 详细信息
来源: 评论
Full Secure Identity-based Encryption Scheme over Lattices in the Standard Model  10
Full Secure Identity-based Encryption Scheme over Lattices i...
收藏 引用
10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 3PGCIC
作者: Wang Jizhong Wang Chunxiao Shandong Jianzhu Univ Dept Math & Phys Jinan 250014 Peoples R China
Using a known lattice-based chosen plain-text secure encryption scheme and the Bonsai trees primitive, a identity-based encryption (IBE) scheme is proposed in this paper. A public matrices chosen rule that has been us... 详细信息
来源: 评论
Efficient hierarchical identity based encryption scheme in the standard model over lattices
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2016年 第8期17卷 781-791页
作者: Feng-he WANG Chun-xiao WANG Zhen-hua LIU Department of Mathematics and Physics Shandong Jianzhu University Jinan 250014 China School of Mathematics and Statistics Xidian University Xi'an 710071 China
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q b... 详细信息
来源: 评论