咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 网络空间安全
    • 4 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
  • 2 篇 理学
    • 2 篇 数学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 医学

主题

  • 7 篇 public key encry...
  • 2 篇 fully homomorphi...
  • 1 篇 learning with er...
  • 1 篇 deep learning
  • 1 篇 security model
  • 1 篇 generative model
  • 1 篇 latticeassumptio...
  • 1 篇 secure location ...
  • 1 篇 concert paramete...
  • 1 篇 multi-key homomo...
  • 1 篇 keywordsearch
  • 1 篇 cryptanalysis
  • 1 篇 linear equations
  • 1 篇 disease-causing ...
  • 1 篇 revoking user
  • 1 篇 bilin-ear map
  • 1 篇 adaptive chosen ...
  • 1 篇 dynamic broadcas...
  • 1 篇 intractable vrob...
  • 1 篇 ciphertext indis...

机构

  • 1 篇 school of inform...
  • 1 篇 the college of c...
  • 1 篇 college of compu...
  • 1 篇 school of comput...
  • 1 篇 information secu...
  • 1 篇 faculty of elect...
  • 1 篇 department of co...
  • 1 篇 computer school ...
  • 1 篇 tanping zhou is ...
  • 1 篇 college of compu...
  • 1 篇 tca laboratory s...
  • 1 篇 college of compu...
  • 1 篇 the people’s arm...
  • 1 篇 key laboratory o...
  • 1 篇 college of crypt...
  • 1 篇 college of junio...
  • 1 篇 school of comput...
  • 1 篇 computer school ...
  • 1 篇 college of scien...

作者

  • 2 篇 yiliang han
  • 1 篇 xiaojun zhang
  • 1 篇 路献辉
  • 1 篇 shuaishuai zhu
  • 1 篇 wang jian
  • 1 篇 song xinxia
  • 1 篇 jie zhao
  • 1 篇 何大可
  • 1 篇 shaowu mao
  • 1 篇 chunxiang xu
  • 1 篇 ningbo li
  • 1 篇 来学嘉
  • 1 篇 liming mu
  • 1 篇 huanguo zhang
  • 1 篇 jinhui liu
  • 1 篇 houzhen wang
  • 1 篇 zhang zengnian
  • 1 篇 tanping zhou
  • 1 篇 xiaoyuan yang
  • 1 篇 aiwan fan

语言

  • 6 篇 英文
  • 1 篇 中文
检索条件"主题词=public key encryption"
7 条 记 录,以下是1-10 订阅
排序:
Secure Scheme for Locating Disease-Causing Genes Based on Multi-key Homomorphic encryption
收藏 引用
Tsinghua Science and Technology 2022年 第2期27卷 333-343页
作者: Tanping Zhou Wenchao Liu Ningbo Li Xiaoyuan Yang Yiliang Han Shangwen Zheng Tanping Zhou is with the College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an 710086China TCA Laboratory State Key Laboratory of Computer ScienceInstitute of SoftwareChinese Academy of SciencesBeijing 100080China the College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an 710086China the People’s Armed Police Command College China Tianjin 300100China
Genes have great significance for the prevention and treatment of some diseases.A vital consideration is the need to find a way to locate pathogenic genes by analyzing the genetic data obtained from different medical ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Fully Homomorphic encryption Scheme with Better key Size
收藏 引用
China Communications 2014年 第9期11卷 82-92页
作者: CHEN Zhigang WANG Jian ZHANG ZengNian SONG Xinxia College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 P.R. China College of Computer and Information Zhejiang Wanli University Zhejiang NingBo 315100 P.R. China Faculty of Electronic and Information Engineering Zhejiang Wanli University Zhejiang NingBo 315100 RR. China. College of Junior. Zhejiang Wanli University Zhejiang Ningbo 31510 P.R.China Information Security Group Royal Holloway University of LondonUK.
Fully homomorphic encryption is faced with two problems now. One is candidate fully homomorphic encryption schemes are few. Another is that the efficiency of fully homomorphic encryption is a big question. In this pap... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of public key Cryptosystems Based on Non-Abelian Factorization Problems
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 344-351页
作者: Jinhui Liu Aiwan Fan Jianwei Jia Huanguo Zhang Houzhen Wang Shaowu Mao Computer School of Wuhan University Wuhan 430072China Computer School of Pingdingshan University Pingdingshan 467001China
Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Generative Trapdoors for public key Cryptography Based on Automatic Entropy Optimization
收藏 引用
China Communications 2021年 第8期18卷 35-46页
作者: Shuaishuai Zhu Yiliang Han College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an 710086China key Laboratory of Network and Information Security under the People’s Armed Police Xi’an 710086China
Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern ***,the traditional way in designing a trapdoor is to identify a computationally hard problem,such as ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Identity-Based encryption with keyword Search from Lattice Assumption
收藏 引用
China Communications 2018年 第4期15卷 164-178页
作者: Xiaojun Zhang Chunxiang Xu Liming Mu Jie Zhao School of Computer Science Southwest Petroleum UniversityChengdu 610500China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2009年 第1期14卷 90-93页
作者: 路献辉 来学嘉 何大可 School of Information Science and Technology Southwest Jiaotong UniversityChengdu 610031China Department of Computer Science and Engineering Shanghai Jiaotong UniversityShanghai 200240China
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Dynamic Broadcast encryption Scheme with Revoking User
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第6期18卷 499-503页
作者: ZOU Xiubin XIANG Jinhai College of Computer and Mathematics Jianghan University College of Science Huazhong Agricultural University
Currently, there still lacks an efficient methodology to revoke user's ability to decrypt ciphertext in broadcast encryption with the uncertain number of ciphertext recipients. To solve this problem, here, we present... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论