Zobrazeno 1 - 10
of 328
pro vyhledávání: '"Trapdoor function"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 6, Pp 43936-43945 (2018)
Lossy trapdoor functions (LTFs) are very useful tools in constructing complex cryptographic primitives in a black-box manner, such as injective trapdoor functions, collision-resistant hashes, CCA secure public-key encryption, and so on. However, the
Externí odkaz:
https://doaj.org/article/a7a9bca5441c489787eb96433b1a3b2c
Publikováno v:
IEEE Transactions on Industrial Informatics. 18:1991-1999
IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward pri
Publikováno v:
IEEE Transactions on Cloud Computing. 10:366-382
Signal processing in the encrypted domain is a potential tool to protect sensitive signals against untrusted cloud servers and malicious users in the delegated computing setting, without affecting the accuracy of signal analyzing and processing. Most
Publikováno v:
IEEE Transactions on Information Theory. 66:2588-2598
In this paper, we propose new classes of trapdoor functions to solve the bounded distance decoding problem in lattices. Specifically, we construct lattices based on properties of polynomials for which the bounded distance decoding problem is hard to
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1640-1646
Publikováno v:
Tatra Mountains Mathematical Publications. 77:139-162
In this paper we propose an efficient multivariate encryption scheme based on permutation polynomials over finite fields. We single out a commutative group ℒ(q, m) of permutation polynomials over the finite field F q m. We construct a trapdoor func
Publikováno v:
Theoretical Computer Science. 835:82-96
The encryption schemes based on coding theory are one of the most accredited choices in post-quantum scenario, where QC-LDPC codes are usually employed to construct concrete schemes due to the well security and good efficiency. In this work, we intro
Publikováno v:
Information Sciences. 516:505-514
Identity-based sequential aggregate signature (IBSAS for short) schemes, introduced by Boldyreva et al. [CCS 2007], allow a large quantity of signers to generate one signature sequentially, in which these messages as well as their order can be attest