Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Chun-xiang GU"'
Publikováno v:
Tongxin xuebao, Vol 38, Pp 55-63 (2017)
The fully homomorphic encryption has important applications in the area of data security and privacy security of cloud computing,but the size of secret keys and ciphertext in most of current homomorphic encryption schemes were too large,which restric
Externí odkaz:
https://doaj.org/article/4cf59cbe714d42848ce294b541617e8d
Publikováno v:
Tongxin xuebao, Vol 38, Pp 66-75 (2017)
Fully homomorphic encryption is the best solution for solving privacy concerns for data over cloud so far,while large public key size is a general shortcoming for existing schemes.First,by introducing the concept of Kullback-Leibler divergence,an ide
Externí odkaz:
https://doaj.org/article/26af679a2511464dbc695c71fa55b58c
Publikováno v:
Tongxin xuebao, Vol 37, Pp 125-131 (2016)
Based on the attribute-based encryption(ABE) scheme which was proposed by Brakerski and constructed on the LWE problem,a RLWE-based key-policy ABE scheme was presented.Efficiency and key size of this scheme over-takes old ones which are based on the
Externí odkaz:
https://doaj.org/article/a71a682598074cad98a39917d5d1a441
Publikováno v:
Tongxin xuebao, Vol 35, Pp 117-125 (2014)
A SAT-based security protocol formalization analysis method named SAT-LMC is proposed.The method introduces optimized the initial state and transformational rules with “lazy” idea.The efficiency of detection is significantly improved.Moreover,b
Externí odkaz:
https://doaj.org/article/76d1f37ad8c3483bb2287a156c2a3fb8
Publikováno v:
Tongxin xuebao, Vol 35, Pp 111-117 (2014)
The fully homomorphic encryption schemes based on learning with errors problem own a great potential value in the cloud computing security. However, the existing schemes share a common flaw of large sized public keys, which may cause inefficiency of
Externí odkaz:
https://doaj.org/article/b3e1f6a5ae8340d3ae353f41411f21b8
Publikováno v:
Heliyon, Vol 9, Iss 12, Pp e22719- (2023)
Illegal food production in China has proliferated in recent years, triggering serious public concerns on food safety. In this work, we model a regulatory event in a food supply chain comprising a local government, a dealer, and a producer involved in
Externí odkaz:
https://doaj.org/article/435e1be0f8114c57bc851b9a35826621
Publikováno v:
Journal of Electronics & Information Technology. 35:2999-3004
Publikováno v:
Journal of Electronics & Information Technology. 35:988-993
Publikováno v:
Advanced Materials Research. 548:138-142
In this work, TiO2nanoparticles (NPs) were prepared through a well-developed hydrothermal method. The dry products were characterized by digital camera, transmission electron microscopy (TEM), X-ray diffraction (XRD) and thermogravimetric method (TGA
Publikováno v:
Cloud Computing and Big Data ISBN: 9783319284293
CloudCom-Asia
CloudCom-Asia
As cloud computing becomes popular, more and more sensitive information are being centralized into the cloud. Hence, we need some mechanism to support operations on encrypted data in many applications in cloud. Public key encryption with keyword sear
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9d769593083e6bd559a071420849c517
https://doi.org/10.1007/978-3-319-28430-9_25
https://doi.org/10.1007/978-3-319-28430-9_25