Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Xin Xia Song"'
Publikováno v:
网络与信息安全学报, Vol 3, Pp 39-45 (2017)
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was intro
Externí odkaz:
https://doaj.org/article/53a227e4186a4283a2f382462101459c
Autor:
Liu Qing Yang, Wen Jun Ma, Wei Wang, Zi Hua Chen, Li Deng, Yong Mei Shi, Rong Shao Tan, Gong Yan Chen, Jia Mi Yu, Jun Wen Ou, Jing Wu, Zhenming Fu, Xin Lin, Yong Dong Feng, Mei Yang, Ming Hua Cong, Conghua Xie, Chun Ling Zhou, Qing Chuan Zhao, Lan Zhou, Kun Hua Wang, Ying He, Hai Ping Jiang, Chun Hua Song, Han Ping Shi, Qi Luo, Xin Xia Song, Yu Mei Qi, Jian Xiong Wu, Zeng Qing Guo, Zeng Ning Li, Yu Fang, Yi Ba, Wen Xian Guan, Yuan Lin, Hong Xia Xu, Wen Hu, Tao Li, Su Xia Luo, Wei Li, Jia Xin Chen, Jun Qiang Chen, Su Yi Li, Ying Ying Shi, Chang Wang, Hu Ma, Jia Jun Yang
Publikováno v:
Supportive Care in Cancer
Background/objectives The assessment of nutritional status and the quality of life in patients with gastric cancer has become one of the important goals of current clinical treatment. The purpose of this study was to assess the nutritional status in
Autor:
Lei Jin, Xin Xia Song
Publikováno v:
Advanced Materials Research. :4780-4784
Fully homomorphic encryption has long been regarded as cryptography’s prized “holy grail”–extremely useful yet rather elusive. At 2010 van Dijk et al. described a fully homomorphic encryption scheme over theintegers. The main appeal of this s
Autor:
Xin Xia Song, Zhi Gang Chen
Publikováno v:
Key Engineering Materials. :1598-1602
The rapid development of Internet is pushing the e-Business to go to the front stage. Online authentication involves much more than the obvious identification and validation problem. We present here a comprehensive framework for online authentication
Autor:
Zhi-Gang Chen, Xin-Xia Song
Publikováno v:
2007 International Conference on Machine Learning and Cybernetics.
A distributed electronic authentication scheme based on ellipse curve is proposed. This scheme is composed of two parts, constructing license and validating license. Because the security of license is determined by private key, not the arithmetic its
Autor:
Zhi-Gang Chen, Xin-Xia Song
Publikováno v:
2007 International Conference on Machine Learning and Cybernetics.
A public key cryptosystem scheme is proposed that are based on conic curves over the ring Zn. Our scheme is motivated by KMOV scheme on elliptic curves, but our scheme remove some restrictive condition from KMOV scheme and constructed on conic curves