CIPHERTEXT

作品数:48被引量:86H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:董庆宽陈丹陈原更多>>
相关机构:西安电子科技大学南京航空航天大学电子科技大学更多>>
相关期刊:《Opto-Electronic Advances》《Journal of Information Security》《Computer Systems Science & Engineering》《China Communications》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Frontiers of Computer Sciencex
条 记 录,以下是1-3
视图:
排序:
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext
《Frontiers of Computer Science》2025年第2期133-135,共3页Lejun ZHANG Bo ZHANG Ran GUO Zhujun WANG Guopeng WANG Jing QIU Shen SU Yuan LIU Guangxia XU Zhihong TIAN Sergey GATAULLIN 
sponsored by the National Natural Science Foundation of China(Grant Nos.62302114,62172353 and U20B2046);the Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education(Nos.1331007,1311022);the Natural Science Foundation of Guangdong Province(No.2024A1515010177).
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information leakage.However,distribu...
关键词:communication TABLES networks 
Multi-key FHE without ciphertext-expansion in two-server model被引量:1
《Frontiers of Computer Science》2022年第1期165-172,共8页Bingbing JIANG 
López-Alt et al.(STOC12)put forward a primitive called multi-key fully homomorphic encryption(MKFHE),in which each involved party encrypts their own data using keys that are independently and randomly chosen whereby ...
关键词:multi-key FHE secret sharing secure computation 
Threshold public key encryption scheme resilient against continual leakage without random oracles被引量:2
《Frontiers of Computer Science》2013年第6期955-968,共14页Xiujie ZHANG Chunxiang XU Wenzheng ZHANG Wanpeng LI 
This work was supported by the Science and Technology on Communication Security Laboratory Foundation (9140C110301110C1103), the Weaponry Equipment Pre-Research Foundation, the PLA General Armament Department (9140A04020311DZ02), and the National Natural Science Foundation of China (61370203).
Threshold public key encryption allows a set of servers to decrypt a ciphertext if a given threshold of authorized servers cooperate. In the setting of threshold public key encryption, we consider the question of how ...
关键词:leakage-resilient continual leakage Threshold Public Key Encryption adaptive chosen ciphertext security standard model 
检索报告 对象比较 聚类工具 使用帮助 返回顶部