咨询与建议

限定检索结果

文献类型

  • 19 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 21 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 11 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 7 篇 网络空间安全
    • 6 篇 电子科学与技术(可...
    • 6 篇 信息与通信工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
  • 13 篇 理学
    • 13 篇 数学
    • 1 篇 系统科学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 21 篇 chinese remainde...
  • 2 篇 united digital w...
  • 2 篇 robustness proof
  • 1 篇 thn model
  • 1 篇 lagrange interpo...
  • 1 篇 lll
  • 1 篇 homomorphic encr...
  • 1 篇 general compact ...
  • 1 篇 randomized compo...
  • 1 篇 revocation
  • 1 篇 forward conversi...
  • 1 篇 block design
  • 1 篇 fully homomorphi...
  • 1 篇 privacy-preservi...
  • 1 篇 polynomial ring
  • 1 篇 rsa
  • 1 篇 paillier homomor...
  • 1 篇 constacyclic cod...
  • 1 篇 threshold secret...
  • 1 篇 arbitrary moduli...

机构

  • 3 篇 school of comput...
  • 2 篇 school of comput...
  • 1 篇 departmentofcomp...
  • 1 篇 math learning ce...
  • 1 篇 department of in...
  • 1 篇 ministry of educ...
  • 1 篇 college of compu...
  • 1 篇 guangdong women'...
  • 1 篇 dept. of compute...
  • 1 篇 department of ap...
  • 1 篇 information syst...
  • 1 篇 college of infor...
  • 1 篇 digital communic...
  • 1 篇 school of mathem...
  • 1 篇 school of inform...
  • 1 篇 department of ma...
  • 1 篇 school of comput...
  • 1 篇 department of ma...
  • 1 篇 key laboratory o...
  • 1 篇 school of inform...

作者

  • 3 篇 miao fuyou
  • 3 篇 xiong yan
  • 2 篇 fuyou miao
  • 2 篇 keju meng
  • 2 篇 wang xingfu
  • 1 篇 mohammad mosleh
  • 1 篇 靳蕃
  • 1 篇 yan xiong
  • 1 篇 chin-chen chang
  • 1 篇 wang yijing
  • 1 篇 haoting han
  • 1 篇 tianxiao he
  • 1 篇 ji yangyang
  • 1 篇 yao junping
  • 1 篇 李明
  • 1 篇 wenchao huang
  • 1 篇 孔凡玉
  • 1 篇 tang yong-sheng
  • 1 篇 scott macdonald
  • 1 篇 秦宝东

语言

  • 21 篇 英文
检索条件"主题词=Chinese Remainder theorem"
21 条 记 录,以下是1-10 订阅
排序:
A proactive secret sharing scheme based on chinese remainder theorem
收藏 引用
Frontiers of Computer Science 2021年 第2期15卷 133-142页
作者: Keju MENG Fuyou MIAO Yu NING Wenchao HUANG Yan XIONG Chin-Chen CHANG School of Computer Science and Technology University of Science and Technology of ChinaHefei230026China Department of Information Engineering and Computer Science Feng Chia UniversityTaichung40724China School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China
If an adversary tries to obtain a secret s in a(t,n)threshold secret sharing(SS)scheme,it has to capture no less than t shares instead of the secret s ***,if a shareholder keeps a fixed share for a long time,an advers... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Generalization of the chinese remainder theorem
收藏 引用
Acta Mathematica Sinica,English Series 2002年 第3期18卷 531-538页
作者: Li Rong YU Digital Communication. Technical Research Institute. Beijing 100083. P. R. China Li Bo LUO Department of Mathematics. Beijing Normal University. Beijing 100875. P. R. China Guangdong Women’s Professional College. Guangdong 510300. P. R. China Digital Communication Technical Research Institute Beijing P. R. China Department of Mathematics Beijing Normal University Beijing P. R. China Guangdong Women's Professional College Guangdong P. R. China
We generalize the chinese remainder theorem. use it to study number theory models, compare and analyse several number theory theorems in non-standard number theory models.
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and chinese remainder theorem
收藏 引用
Journal of Information Security 2023年 第4期14卷 366-395页
作者: Zhiyong Zheng Fengxia Liu Kun Tian Engineering Research Center of Ministry of Education for Financial Computing and Digital Engineering Henan Academy of Sciences Renmin University of China Beijing China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Institute of Artificial Intelligence Beijing China
We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. Thi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An efficient ranging method based on chinese remainder theorem for RIPS measurement
收藏 引用
Science China(Information Sciences) 2010年 第6期53卷 1233-1241页
作者: WANG Chen , YIN QinYe & WANG WenJie Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi’an Jiaotong University, Xi’an 710049, China Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China
The radio interferometric positioning system(RIPS) measures the phase difference of the interference signal to provide high accuracy and at the same time maintain simple hardware configuration for wireless sensor ***,... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A simple construction of CRT-based ideal secret sharing scheme and its security extension based on common factor
收藏 引用
Frontiers of Computer Science 2022年 第1期16卷 155-163页
作者: Lei WU Fuyou MIAO Keju MENG Xu WANG School of Computer Science and Technology University of Science and Technology of ChinaHefei230026China
Secret sharing(SS)is part of the essential techniques in cryptography but still faces many challenges in efficiency and ***,SS schemes based on the chinese remainder theorem(CRT)are either low in the information rate ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
PUMTD:Privacy-Preserving User-Profile Matching Protocol in Social Networks
收藏 引用
China Communications 2022年 第6期19卷 77-90页
作者: Jianhong Zhang Haoting Han Hongwei Su Zhengtao Jiang Changgen Peng School of Information Sciences and Technology North China University of TechnologyBeijing 100043China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal UniversityHangzhou 311121China Guizhou Provincial Key Laboratory of Public Big Data Guizhou UniversityGuiyang 550025China School of Computer and Cyber Sciences Communication University of ChinaBeijing 100025China
User profile matching can establish social relationships between different users in the social *** the user profile is matched in plaintext,the user's privacy might face a security *** there exist some schemes realizi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research and design of CRT-based homomorphic ciphertext database system
收藏 引用
High-Confidence Computing 2022年 第4期2卷 1-7页
作者: De Zhao Zhenzhen Li Haiyang Ding Zhenzhen Zhang Zichen Li College of Information Engineering Beijing Institute of Graphic CommunicationBeijingChina Digital Copyright Protection Technology Research Center Beijing Institute of Graphic CommunicationBeijingChina
The cloud’s storage and query of private information have the cryptographic scholar due to the proliferation of cloud *** the traditional query mode,the private information stored in the cloud is at risk of being ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Application of Polynomial Interpolation in the chinese remainder Problem
收藏 引用
Journal of Mathematical Research with Applications 2017年 第1期37卷 90-96页
作者: Tianxiao HE Scott MACDONALD Peter J.-S.SHIUE Department of Mathematics Illinois Wesleyan University Math Learning Center University of Nevada Las Vegas Department of Mathematical Sciences University of Nevada
This paper presents an application of polynomial interpolation in the solution of the chinese remainder Problem for bother integers and polynomials.
来源: 同方期刊数据库 同方期刊数据库 评论
chinese remainder Codes
收藏 引用
Journal of Southwest Jiaotong University(English Edition) 2004年 第1期12卷 73-78页
作者: 张爱丽 刘秀峰 靳蕃 Department of Applied Mathematics School of Computer and Communication Engineering
chinese remainder Codes are constructed by applying weak block designs and chinese remainder theorem of ring theory. The new type of linear codes take the congruence class in the congruence class ring R/I 1∩I 2∩..... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of a Type of CRT-Based RSA Algorithms
收藏 引用
Journal of Computer Science & Technology 2008年 第2期23卷 214-221页
作者: 秦宝东 李明 孔凡玉 College of Computer Science and Technology Southwest University of Science and TechnologyMianyang 621010China Institute of Network Security Shandong UniversityJinan 250100China Key Laboratory of Cryptographic Technology and Information SecurityJinan 250100China
It is well known that the chinese remainder theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is ca... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论