咨询与建议

限定检索结果

文献类型

  • 104 篇 期刊文献
  • 102 篇 会议

馆藏范围

  • 206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 178 篇 计算机科学与技术...
    • 46 篇 电气工程
    • 31 篇 信息与通信工程
    • 23 篇 软件工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
  • 57 篇 理学
    • 53 篇 数学
    • 4 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 管理学
    • 8 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 法学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 1 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 206 篇 learning with er...
  • 27 篇 lattice-based cr...
  • 22 篇 lattices
  • 17 篇 homomorphic encr...
  • 17 篇 fully homomorphi...
  • 17 篇 post-quantum cry...
  • 14 篇 lattice
  • 11 篇 cryptography
  • 10 篇 lwe
  • 10 篇 identity-based e...
  • 8 篇 attribute-based ...
  • 7 篇 standard model
  • 7 篇 learning with ro...
  • 7 篇 equality test
  • 7 篇 key exchange
  • 6 篇 cryptanalysis
  • 6 篇 proxy re-encrypt...
  • 6 篇 encryption
  • 5 篇 public-key encry...
  • 5 篇 cloud computing

机构

  • 11 篇 chinese acad sci...
  • 8 篇 univ wollongong ...
  • 8 篇 univ chinese aca...
  • 6 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 5 篇 beijing univ pos...
  • 5 篇 xidian univ stat...
  • 5 篇 stanford univ st...
  • 4 篇 chongqing univ c...
  • 4 篇 harbin engn univ...
  • 4 篇 westone cryptol ...
  • 3 篇 technol innovat ...
  • 3 篇 csiro data61 nsw
  • 3 篇 seoul natl univ
  • 3 篇 hangzhou normal ...
  • 3 篇 tsinghua univ de...
  • 3 篇 ntt res sunnyval...
  • 3 篇 peking univ sch ...
  • 3 篇 jinan univ coll ...
  • 3 篇 iran univ sci & ...

作者

  • 11 篇 susilo willy
  • 8 篇 dung hoang duong
  • 7 篇 wang kunpeng
  • 7 篇 wang fuqun
  • 7 篇 lu xianhui
  • 7 篇 li bao
  • 5 篇 vaikuntanathan v...
  • 5 篇 chen kefei
  • 5 篇 roy partha sarat...
  • 5 篇 song yongsoo
  • 5 篇 kiyomoto shinsak...
  • 5 篇 fukushima kazuhi...
  • 4 篇 li zengpeng
  • 4 篇 dutta priyanka
  • 4 篇 weng jian
  • 4 篇 hu yupu
  • 4 篇 regev oded
  • 4 篇 cheon jung hee
  • 4 篇 ma chunguang
  • 3 篇 waters brent

语言

  • 204 篇 英文
  • 2 篇 中文
检索条件"主题词=Learning with errors"
206 条 记 录,以下是51-60 订阅
排序:
On the Complexity of the LWR-Solving BKW Algorithm
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2020年 第1期E103A卷 173-182页
作者: Okada, Hiroki Takayasu, Atsushi Fukushima, Kazuhide Kiyomoto, Shinsaku Takagi, Tsuyoshi KDDI Res Inc Informat Secur Lab Fujimino Shi 3568502 Japan Univ Tokyo Grad Sch Informat Sci & Technol Tokyo 1138654 Japan
The Blum-Kalai-Wasserman algorithm (BKW) is an algorithm for solving the learning parity with noise problem, which was then adapted for solving the learning with errors problem (LWE) by Albrecht et al. Duc et al. appl... 详细信息
来源: 评论
Accelerating subset sum and lattice based public-key cryptosystems with multi-core CPUs and GPUs
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 2018年 119卷 179-190页
作者: Al Badawi, Ahmad Veeravalli, Bharadwaj Aung, Khin Mi Mi Hamadicharef, Brahim Natl Univ Singapore Dept Elect & Comp Engn 4 Engn Dr 3 Singapore 117576 Singapore ASTAR DSI Connexis North Lobby 1 Fusionopolis Way Singapore 138632 Singapore
Post-quantum cryptosystems based on subset sum and lattice problems have gained much attention from researchers due to their simple construction, their resistance to quantum attacks, the new potential applications the... 详细信息
来源: 评论
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
收藏 引用
THEORETICAL COMPUTER SCIENCE 2022年 929卷 124-139页
作者: Roy, Partha Sarathi Dung Hoang Duong Susilo, Willy Sipasseuth, Arnaud Fukushima, Kazuhide Kiyomoto, Shinsaku Univ Wollongong Sch Comp & Informat Technol Inst Cybersecur & Cryptol Northfields Ave Wollongong NSW 2522 Australia KDDI Res Inc Informat Secur Lab 2-1-15 Ohara Fujimino Saitama 3568502 Japan
As cloud computing has developed rapidly, outsourcing data to cloud servers for remote storage has become an attractive trend. However, when cloud clients store their data in the cloud, the security and privacy of clo... 详细信息
来源: 评论
Identity-based signcryption from lattices
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2015年 第18期8卷 3751-3770页
作者: Yan, Jianhua Wang, Licheng Dong, Mianxiong Yang, Yixian Yao, Wenbin Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Ludong Univ Sch Informat & Elect Engn Yantai 264025 Peoples R China Natl Inst Informat & Commun Technol Kyoto 6190289 Japan
Signcryption as a cryptographic primitive can carry out signature and encryption simultaneously at a remarkably reduced cost. Identity-based cryptography is more convenient than public key infrastructure-based cryptog... 详细信息
来源: 评论
Maliciously circuit-private multi-key FHE and MPC based on LWE
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2023年 第5期91卷 1645-1684页
作者: Attrapadung, Nuttapong Hanaoka, Goichiro Hiromasa, Ryo Matsuda, Takahiro Schuldt, Jacob C. N. Natl Inst Adv Ind Sci & Technol 2-3-26 Aomi Koto ku Tokyo 1350064 Japan Mitsubishi Elect 5-1-1 Ofuna Kamakura Kanagawa 2470056 Japan
In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our schemes are based on learning with errors (LWE) besides appropriate... 详细信息
来源: 评论
Lattice-based public key searchable encryption with fine-grained access control for edge computing
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2022年 127卷 373-383页
作者: Wang, Peng Chen, Biwen Xiang, Tao Wang, Zhongming Chongqing Univ Sci & Technol Sch Intelligent Technol & Engn Chongqing 401331 Peoples R China Chongqing Univ Coll Comp Sci Chongqing 400044 Peoples R China
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices, edge computing provides various on-demand data services to reduce latency and network congestion. To ensure data security in edge... 详细信息
来源: 评论
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage
收藏 引用
PEER-TO-PEER NETWORKING AND APPLICATIONS 2021年 第3期14卷 1290-1302页
作者: Varri, Uma Sankararao Pasupuleti, Syam Kumar Kadambari, K. V. Natl Inst Technol Warangal Andhra Pradesh India Inst Dev & Res Banking Technol Hyderabad Telangana India
Ciphertext-policy attribute-based searchable encryption (CP-ABSE) is widely used in the cloud environment to provide data privacy and fine-grained access control over encrypted data. The existing CP-ABSE schemes are d... 详细信息
来源: 评论
A post quantum secure construction of an authentication protocol for satellite communication
收藏 引用
INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING 2022年 第1期41卷 14-28页
作者: Dharminder, Dharminder Dadsena, Pradeep Kumar Gupta, Pratik Sankaran, Sathya Amrita Vishwa Vidyapeetham Dept Comp Sci & Engn Amrita Sch Engn Chennai Tamil Nadu India Govt Engn Coll Dept Math Jagdalpur India Mandsaur Univ Dept Math Mandsaur India
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channe... 详细信息
来源: 评论
Trapdoor function based on the Ring-LWE and applications in communications
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2019年 第5期10卷 1821-1827页
作者: Zhang, Chengli Ma, Wenping Zhao, Feifei Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Shaanxi Peoples R China
The strong trapdoor function for lattice has been constructed by Daniele Micciancio and Chris Peikert in EUROCRYPT 2012, which is simple, efficient, and easy to implement. In this paper, we present a new trapdoor func... 详细信息
来源: 评论
A construction of post quantum secure authenticated key agreement design for mobile digital rights management system
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第17期82卷 26643-26660页
作者: Dadsena, Pradeep Kumar Jain, Jainendra Rana, Saurabh Dharminder, Dharminder Govt Engn Coll Dept Math Jagdalpur India Chandigarh Univ Dept Math Chandigarh India Amrita Vishwa Vidyapeetham Amrita Sch Comp Dept Comp Sci Engn Chennai India
The quantum computing being a threat motivates us to design a post quantum secure authentication protocol for mobile digital rights management system. In current, a post quantum secure protocol "learning with err... 详细信息
来源: 评论