CIPHERTEXT

作品数:48被引量:86H指数:6
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:董庆宽陈丹陈原更多>>
相关机构:西安电子科技大学南京航空航天大学电子科技大学更多>>
相关期刊:《Opto-Electronic Advances》《Journal of Information Security》《Computer Systems Science & Engineering》《China Communications》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 主题=SECURITYx
条 记 录,以下是1-6
视图:
排序:
A survey on cryptographic techniques for protecting big data security:present and forthcoming被引量:6
《Science China(Information Sciences)》2022年第10期69-102,共34页Siqi LU Jianhua ZHENG Zhenfu CAO Yongjuan WANG Chunxiang GU 
supported by National Key Research and Development Project(Grant No.2020YFA0712300);National Natural Science Foundation of China(Grants Nos.61772548,61632012);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-17-001);Peng Cheng Laboratory Project of Guangdong Province(Grant No.PCL2018KP004)。
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world.As they significantly create economic and social value,big data meaningfully impact t...
关键词:big data security cryptographic techniques ciphertext-based data sharing and computing authenticated encryption functional encryption homomorphic encryption secure multi-party computing 
Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
《Computers, Materials & Continua》2022年第10期69-85,共17页Hyun Sook Rhee 
As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage...
关键词:Searchable encryption public-key encryption with keyword search chosen ciphertext security data privacy 
Improved lattice-based CCA2-secure PKE in the standard model被引量:5
《Science China(Information Sciences)》2020年第8期143-164,共22页Jiang ZHANG Yu YU Shuqin FAN Zhenfeng ZHANG 
National Key Research and Development Program of China(Grant Nos.2017YFB0802005,2018YFB0804105);National Natural Science Foundation of China(Grant No.61602046);National Natural Science Foundation of China(Grant Nos.61872236;61572192);National Natural Science Foundation of China(Grant No.U1536205);Young Elite Scientists Sponsorship Program by CAST(Grant No.2016QNRC001);Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection(Grant No.2017B030301004);National Cryptography Development Fund(Grant No.MMJJ20170209);Anhui Initiative in Quantum Information Technologies(Grant No.AHY150100);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Natural Science Foundation of China(Grant No.U1536205).
Based on the identity-based encryption(IBE)from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12)presented a CCA1-secure public-key encryption(PKE),which has the best known efficiency in ...
关键词:LATTICE public-key encryption chosen ciphertext security standard model 
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model被引量:1
《Journal of Shanghai Jiaotong university(Science)》2011年第6期672-676,共5页孙瑾 胡予濮 张乐友 
the National Natural Science Foundation of China (No.60970119);the National Basic Research Program (973) of China (No.2007CB311201)
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chos...
关键词:the standard model provably secure broadcast encryption the chosen ciphertext security the self-adaptive chosen identity security 
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
《Journal of Shanghai Jiaotong university(Science)》2009年第1期90-93,共4页路献辉 来学嘉 何大可 
the National Natural Science Foundation of China(Nos.60573032,60773092,90604036)
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a...
关键词:public key encryption adaptive chosen ciphertext security intractable vroblem 
A Practical Approach to Attaining Chosen Ciphertext Security
《Wuhan University Journal of Natural Sciences》2006年第6期1601-1604,共4页LI Jun CUI Guohua YANG Muxiang 
Supported by the National Natural Science Foun-dation of China (60403027)
Strong security in public key cryptography is not enongh; the encryption has to be achieved in an efficient way. OAEP or SAEP is only suitable for special applications (e. g. key transport), and securely transportin...
关键词:public-key encryption chosen ciphertext security random oracle model bandwidth of message recovery 
检索报告 对象比较 聚类工具 使用帮助 返回顶部