Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Chun Xiang Gu"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 55-63 (2017)
The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restric
Externí odkaz:
https://doaj.org/article/4cf59cbe714d42848ce294b541617e8d
Publikováno v:
Tongxin xuebao, Vol 38, Pp 66-75 (2017)
Fully homomorphic encryption is the best solution for solving privacy concerns for data over cloud so far,while large public key size is a general shortcoming for existing schemes.First,by introducing the concept of Kullback-Leibler divergence,an ide
Externí odkaz:
https://doaj.org/article/26af679a2511464dbc695c71fa55b58c
Publikováno v:
Tongxin xuebao, Vol 37, Pp 125-131 (2016)
Based on the attribute-based encryption(ABE) scheme which was proposed by Brakerski and constructed on the LWE problem,a RLWE-based key-policy ABE scheme was presented.Efficiency and key size of this scheme over-takes old ones which are based on the
Externí odkaz:
https://doaj.org/article/a71a682598074cad98a39917d5d1a441
Publikováno v:
Tongxin xuebao, Vol 35, Pp 117-125 (2014)
A SAT-based security protocol formalization analysis method named SAT-LMC is proposed.The method introduces optimized the initial state and transformational rules with “lazy” idea.The efficiency of detection is significantly improved.Moreover,b
Externí odkaz:
https://doaj.org/article/76d1f37ad8c3483bb2287a156c2a3fb8
Publikováno v:
Tongxin xuebao, Vol 35, Pp 111-117 (2014)
The fully homomorphic encryption schemes based on learning with errors problem own a great potential value in the cloud computing security. However, the existing schemes share a common flaw of large sized public keys, which may cause inefficiency of
Externí odkaz:
https://doaj.org/article/b3e1f6a5ae8340d3ae353f41411f21b8
Publikováno v:
Journal of Electronics & Information Technology. 35:2999-3004
Publikováno v:
Journal of Electronics & Information Technology. 35:988-993
Publikováno v:
Advanced Materials Research. 548:138-142
In this work, TiO2nanoparticles (NPs) were prepared through a well-developed hydrothermal method. The dry products were characterized by digital camera, transmission electron microscopy (TEM), X-ray diffraction (XRD) and thermogravimetric method (TGA
Publikováno v:
Cloud Computing and Big Data ISBN: 9783319284293
CloudCom-Asia
CloudCom-Asia
As cloud computing becomes popular, more and more sensitive information are being centralized into the cloud. Hence, we need some mechanism to support operations on encrypted data in many applications in cloud. Public key encryption with keyword sear
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9d769593083e6bd559a071420849c517
https://doi.org/10.1007/978-3-319-28430-9_25
https://doi.org/10.1007/978-3-319-28430-9_25
Publikováno v:
2012 Fourth International Conference on Multimedia Information Networking and Security.
In this paper we present a new framework for automatically proving the security of public-key cryptographic schemes in computational model. The framework uses the sequence-of-games approach to construct security proof. A probabilistic polynomial-time