Zobrazeno 1 - 10
of 502
pro vyhledávání: '"Zheng, Zhiyong"'
Analogies between codes and lattices have been extensively studied for the last decades, in this dictionary, the MacWilliams identity is the finite analog of the Jacobi-Poisson formula of the Theta function. Motivated by the random theory of lattices
Externí odkaz:
http://arxiv.org/abs/2407.20874
This paper introduces a privacy-preserving distributed learning framework via private-key homomorphic encryption. Thanks to the randomness of the quantization of gradients, our learning with error (LWE) based encryption can eliminate the error terms,
Externí odkaz:
http://arxiv.org/abs/2402.01154
The proliferation of Deep Neural Networks (DNN) in commercial applications is expanding rapidly. Simultaneously, the increasing complexity and cost of training DNN models have intensified the urgency surrounding the protection of intellectual propert
Externí odkaz:
http://arxiv.org/abs/2312.05738
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principl
Externí odkaz:
https://library.oapen.org/handle/20.500.12657/60195
Let $f=(f_0,f_1,\dots, f_{\nu-1})$ be a collection of one-to-one functions from some space~$X$ into itself such that the sets $f_j(X)$ are disjoint. If $w=w_1w_2\cdots w_k$ is a word on the alphabet $\{0,1,\dots,\nu-1\}$, let $\Phi_{f,w} = f_{w_1}\ci
Externí odkaz:
http://arxiv.org/abs/2309.05917
Autor:
Zheng, Zhiyong
This open access book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithm
Externí odkaz:
https://library.oapen.org/handle/20.500.12657/54458
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-16 (2024)
Abstract The extraction of underground coal resources induces the fracture and movement of overlying strata, leading to geological hazards such as surface deformation, cracks, and even subsidence. Utilizing the analogous hyperbola model of overlying
Externí odkaz:
https://doaj.org/article/d5d57110cca240158f20099505091b49
We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an ol
Externí odkaz:
http://arxiv.org/abs/2301.12060
Autor:
Liu, Jiashun1,2,3 (AUTHOR) liujiashun000@163.com, Zheng, Zhiyong1 (AUTHOR), Zhou, Hui2 (AUTHOR), Zhu, Kaixin1,4 (AUTHOR), Wang, Yang1 (AUTHOR), Zhou, Ni1 (AUTHOR), Wang, Siyu1 (AUTHOR), Sun, Mengyao1 (AUTHOR)
Publikováno v:
Scientific Reports. 9/10/2024, Vol. 14 Issue 1, p1-15. 15p.