Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Momeng Liu"'
Publikováno v:
IET Information Security, Vol 2024 (2024)
Universal composability (UC) is a primary security flavor for designing oblivious transfer (OT) due to its advantage of arbitrary composition. However, the study of UC-secure OT over lattices is still far behind compared with constructions over prequ
Externí odkaz:
https://doaj.org/article/6cc968edaf79497595c278aa092bfe10
Publikováno v:
IET Information Security, Vol 15, Iss 6, Pp 428-441 (2021)
Abstract Attribute‐based encryption (ABE) is a promising management method that enables fine‐grained access control in large‐scale systems. Revocable ABE (RABE) can support a key revocation mechanism in an ABE system. With the advent of the Int
Externí odkaz:
https://doaj.org/article/1caf2d4e2aa345b3919eff9e0e36e737
Publikováno v:
Xi'an Gongcheng Daxue xuebao, Vol 35, Iss 5, Pp 107-115 (2021)
Human pose estimation was an important direction in the field of computer vision, which is widely used in human activity recognition, human-computer interaction, etc, but the accuracy of human pose estimation methods is usually poor. Based on this, a
Externí odkaz:
https://doaj.org/article/b241cf89b31945f096e1b17e4e5dcca3
Publikováno v:
Xi'an Gongcheng Daxue xuebao, Vol 35, Iss 3, Pp 100-106 (2021)
Aiming at the disadvantages of negative link feature fusion and effective information mining in signed social networks, resulting in low prediction performance, a new feature fusion negative link prediction method is proposed. Based on the classic st
Externí odkaz:
https://doaj.org/article/b2c6fe114f254e49963eb6b006366c31
Publikováno v:
IEEE Access, Vol 7, Pp 155143-155157 (2019)
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing
Externí odkaz:
https://doaj.org/article/14fe8e7a03a545d6810d182ad3898942
Publikováno v:
IET Information Security, Vol 15, Iss 6, Pp 428-441 (2021)
Attribute‐based encryption (ABE) is a promising management method that enables fine‐grained access control in large‐scale systems. Revocable ABE (RABE) can support a key revocation mechanism in an ABE system. With the advent of the Internet of
Publikováno v:
The Computer Journal. 66:197-207
Fully homomorphic encryption (FHE) allows direct computations over the encrypted data without access to the decryption. Hence multi-key FHE is well suitable for secure multiparty computation. Recently, Brakerski et al. (TCC 2019 and EUROCRYPT 2020) u
Autor:
Momeng Liu, Yupu Hu
Publikováno v:
Frontiers of Computer Science. 13:879-906
As a fundamental cryptographic primitive, oblivious transfer (OT) is developed for the sake of efficient usability and combinational feasibility. However, most OT protocols are built upon some quantum non-immune cryptosystems by assuming the hardness
Publikováno v:
IEEE Access, Vol 7, Pp 155143-155157 (2019)
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing
Publikováno v:
Wuhan University Journal of Natural Sciences. 22:355-360
Blind signature allows a user to get a signature of a signer on an arbitrary message, and the verifier can convince that the signature is indeed signed by the signer without leaking any information about the message. This property is necessary when t