期刊文献+
共找到402篇文章
< 1 2 21 >
每页显示 20 50 100
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
1
作者 Hao Li Kuan Shao +2 位作者 Xin Wang Mufeng Wang Zhenyong Zhang 《Computers, Materials & Continua》 2025年第3期5387-5405,共19页
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model training.However,dishonest clouds may infer user data,resulting in user data leakage.P... Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model training.However,dishonest clouds may infer user data,resulting in user data leakage.Previous schemes have achieved secure outsourced computing,but they suffer from low computational accuracy,difficult-to-handle heterogeneous distribution of data from multiple sources,and high computational cost,which result in extremely poor user experience and expensive cloud computing costs.To address the above problems,we propose amulti-precision,multi-sourced,andmulti-key outsourcing neural network training scheme.Firstly,we design a multi-precision functional encryption computation based on Euclidean division.Second,we design the outsourcing model training algorithm based on a multi-precision functional encryption with multi-sourced heterogeneity.Finally,we conduct experiments on three datasets.The results indicate that our framework achieves an accuracy improvement of 6%to 30%.Additionally,it offers a memory space optimization of 1.0×2^(24) times compared to the previous best approach. 展开更多
关键词 functional encryption multi-sourced heterogeneous data privacy preservation neural networks
在线阅读 下载PDF
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
2
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
Aggregation Tree Statistical Computing Based on Functional Encryption 被引量:1
3
作者 XIANG Guangli WANG Dengjia +1 位作者 YU Benzhi LI Ankang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期116-124,共9页
The medical monitoring system is widely used. In the medical monitoring system, each user only possesses one piece of data logging that participates in statistical computing. Specifically in such a situation, a feasib... The medical monitoring system is widely used. In the medical monitoring system, each user only possesses one piece of data logging that participates in statistical computing. Specifically in such a situation, a feasible solution is to scatter its statistical computing workload to corresponding statistical nodes. Moreover, there are still two problems that should be resolved. One is how the server takes advantage of intermediate results obtained through statistical node aggregation to perform statistical computing. Statistical variable decomposition technique points out the direction for statistical projects. The other problem is how to design an efficient topological structure for statistical computing. In this paper, tree topology was adopted to implement data aggregation to improve aggregation efficiency. And two experiments were done for time consumption of statistical computing which focuses on encrypted data aggregation and encrypted data computing. The first experiment indicates that encrypted data aggregation efficiency of the scheme proposed in this paper is better than that of Drosatos' scheme, and the second indicates that improving computing power of the server or computational efficiency of the functional encryption scheme can shorten the computation time. 展开更多
关键词 TREE TOPOLOGY MULTIPARTY STATISTICAL COMPUTATION function encryption
原文传递
MAVP-FE:Multi-Authority Vector Policy Functional Encryption with Efficient Encryption and Decryption 被引量:1
4
作者 WANG Jing HUANG Chuanhe +3 位作者 YANG Kan WANG Jinhai WANG Xiaomao CHEN Xi 《China Communications》 SCIE CSCD 2015年第6期126-140,共15页
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte... In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice. 展开更多
关键词 cloud storage data access control functional encryption hidden access policy efficiency
在线阅读 下载PDF
Fed-DFE: A Decentralized Function Encryption-Based Privacy-Preserving Scheme for Federated Learning 被引量:1
5
作者 Zhe Sun Jiyuan Feng +4 位作者 Lihua Yin Zixu Zhang Ran Li Yu Hu Chongning Na 《Computers, Materials & Continua》 SCIE EI 2022年第4期1867-1886,共20页
Federated learning is a distributed learning framework which trains global models by passing model parameters instead of raw data.However,the training mechanism for passing model parameters is still threatened by grad... Federated learning is a distributed learning framework which trains global models by passing model parameters instead of raw data.However,the training mechanism for passing model parameters is still threatened by gradient inversion,inference attacks,etc.With a lightweight encryption overhead,function encryption is a viable secure aggregation technique in federation learning,which is often used in combination with differential privacy.The function encryption in federal learning still has the following problems:a)Traditional function encryption usually requires a trust third party(TTP)to assign the keys.If a TTP colludes with a server,the security aggregation mechanism can be compromised.b)When using differential privacy in combination with function encryption,the evaluation metrics of incentive mechanisms in the traditional federal learning become invisible.In this paper,we propose a hybrid privacy-preserving scheme for federated learning,called Fed-DFE.Specifically,we present a decentralized multi-client function encryption algorithm.It replaces the TTP in traditional function encryption with an interactive key generation algorithm,avoiding the problem of collusion.Then,an embedded incentive mechanism is designed for function encryption.It models the real parameters in federated learning and finds a balance between privacy preservation and model accuracy.Subsequently,we implemented a prototype of Fed-DFE and evaluated the performance of decentralized function encryption algorithm.The experimental results demonstrate the effectiveness and efficiency of our scheme. 展开更多
关键词 Decentralized function encryption incentive mechanism differential privacy federated learning
在线阅读 下载PDF
An algorithm of file encryption based on sum function sequences
6
作者 ZHOU Lei LU Hai-lian +1 位作者 SUN Yu-qiang GU Yu-wan 《通讯和计算机(中英文版)》 2008年第1期48-52,共5页
关键词 和函数序列 编码算法 信息安全 加密
在线阅读 下载PDF
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem 被引量:2
7
作者 Zeyu Liu Tiecheng Xia Jinbo Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期161-176,共16页
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif... We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. 展开更多
关键词 CHAOS fractional two-dimensional triangle function combination discrete chaotic map image encryption Menezes-Vanstone elliptic curve cryptosystem
原文传递
Image Encryption Algorithm Based on a Chaotic Iterative Process 被引量:1
8
作者 Michael Francois Thomas Grosges +1 位作者 Dominique Barchiesi Robert Erra 《Applied Mathematics》 2012年第12期1910-1920,共11页
The paper describes a symmetric encryption algorithm based on bit permutations and using an iterative process combined with a chaotic function. The main advantages of such a cryptosystem is its ability to encrypt secu... The paper describes a symmetric encryption algorithm based on bit permutations and using an iterative process combined with a chaotic function. The main advantages of such a cryptosystem is its ability to encrypt securely bit sequences and assuring confusion, diffusion and indistinguishability properties in the cipher. The algorithm is applied on the image encryption where the plain-image is viewed as binary sequence. The results of statistical analysis about randomness, sensitivity and correlation on the cipher-images show the relevance of the proposed cryptosystem. 展开更多
关键词 encryption Image encryption Chaotic function CONFUSION DIFFUSION INDISTINGUISHABILITY
在线阅读 下载PDF
Image Encryption Algorithm Based on New Fractional Beta Chaotic Maps
9
作者 Rabha W.Ibrahim Hayder Natiq +3 位作者 Ahmed Alkhayyat Alaa Kadhim Farhan Nadia M.G.Al-Saidi Dumitru Baleanu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第7期119-131,共13页
In this study,a new algorithm of fractional beta chaotic maps is proposed to generate chaotic sequences for image encryption.The proposed technique generates multi random sequences by shuffling the image pixel positio... In this study,a new algorithm of fractional beta chaotic maps is proposed to generate chaotic sequences for image encryption.The proposed technique generates multi random sequences by shuffling the image pixel position.This technique is used to blur the pixels connecting the input and encrypted images and to increase the attack resistance.The proposed algorithm makes the encryption process sophisticated by using fractional chaotic maps,which hold the properties of pseudo-randomness.The fractional beta sequences are utilized to alter the image pixels to decryption attacks.The experimental results proved that the proposed image encryption algorithm successfully encrypted and decrypted the images with the same keys.The output findings indicate that our proposed algorithm has good entropy and low correlation coefficients.This translates to enhanced security against different attacks.A MATLAB programming tool was used to implement and assess the image quality measures.A comparison with other image encryption techniques regarding the visual inspection and signal-to-noise ratio is provided. 展开更多
关键词 Fractional calculus fractional beta function chaotic function image encryption
在线阅读 下载PDF
A Note on a Provable Secure Encryption Scheme
10
作者 王明强 秦静 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期655-658,共4页
A Cramer-Shoup scheme was modified in a variant way. The major advantage with respect to Kurosawa-Desmedt scheme is that it saves a key parameter and produces shorter ciphertext. The proof of security shows that our s... A Cramer-Shoup scheme was modified in a variant way. The major advantage with respect to Kurosawa-Desmedt scheme is that it saves a key parameter and produces shorter ciphertext. The proof of security shows that our scheme can be instantiated with any computational secure key derivation and message authentication functions. Thus it extends the applicability of the Kurosawa-Desmedt scheme and improves its efficiency. 展开更多
关键词 hybrid encryption scheme chosen-ciphertext attack authentication function
原文传递
MMKFB:multi-client and multi-keyword searchable symmetric encryption with forward and backward privacy
11
作者 Panyu WU Jiachen SHEN +1 位作者 Zhenfu CAO Xiaolei DONG 《Frontiers of Computer Science》 2025年第3期87-102,共16页
Data outsourcing has become an industry trend with the popularity of cloud computing.How to search data securely and efficiently has received unprecedented attention.Dynamic Searchable Symmetric Encryption(DSSE)is an ... Data outsourcing has become an industry trend with the popularity of cloud computing.How to search data securely and efficiently has received unprecedented attention.Dynamic Searchable Symmetric Encryption(DSSE)is an effective method to solve this problem,which supports file updates and keyword-based searches over encrypted data.Unfortunately,most existing DSSE schemes have privacy leakages during the addition and deletion phases,thus proposing the concepts of forward and backward privacy.At present,some secure DSSE schemes with forward and backward privacy have been proposed,but most of these DSSE schemes only achieve single-keyword query in the single-client setting,which seriously limits the application in practice.To solve this problem,we propose a multi-client and multikeyword searchable symmetric encryption scheme with forward and backward privacy(MMKFB).Our scheme focuses on the multi-keyword threshold queries in the multi-client setting,which is a new pattern of multi-keyword search realized with the help of additive homomorphism.And performance analysis and experiments demonstrate that our scheme is more practical for use in small and medium size databases.Especially when a large number of files are updated at once,our scheme has advantages over some existing DSSE schemes in terms of computational efficiency and client storage overhead. 展开更多
关键词 searchable symmetric encryption multi-client multi-keyword search forward security backward security
原文传递
Efficient Function-Hiding Inner Product Functional Encryption and Its Application to Fine-Grained Data Sharing
12
作者 Ming Wan Geng Wang +2 位作者 Shi-Feng Sun Da-Wu Gu Gong-Yu Shi 《Journal of Computer Science & Technology》 2025年第3期921-938,共18页
In a function-hiding inner product functional encryption(FH-IPFE)scheme,both secret keys and ciphertexts are associated with vectors.Given a secret key for an n-dimensional vector x,and a ciphertext for an n-dimension... In a function-hiding inner product functional encryption(FH-IPFE)scheme,both secret keys and ciphertexts are associated with vectors.Given a secret key for an n-dimensional vector x,and a ciphertext for an n-dimensional vector y,a decryptor learns the inner product value<x,y>and nothing else about both x and y.FH-IPFE has been shown to be very useful in privacy-preserving computation.In this paper,we first propose a new(secret-key)FH-IPFE scheme and prove it the secure in the generic group model.Compared with the state-of-the-art scheme of Kim et al.,the proposed scheme has comparable performance in decryption and reduces 1)the size of master key from n^(2)to 3n−1,2)the setup complexity from O(n^(3))to O(n),and 3)the encryption and key generation complexities from O(n^(2))to O(nlogn).To the best of our knowledge,this is the most efficient construction based on pairings to date.Moreover,we apply our FH-IPFE scheme to build a fine-grained data sharing system,where data owners store their encrypted data on an untrusted server.Our design supports not only basic database operations but also statistical analyses on encrypted data.To achieve this goal,we also introduce a new security notion,partial-key exposure-resilient simulation-based security(PK-ER-SIM),for FH-IPFE,which enables lightweight clients to securely delegate heavy computations to a powerful server and may be independent of interest. 展开更多
关键词 function-hiding functional encryption fine-grained data sharing generic group model inner product
原文传递
Dynamic fluorescence materials based on naphthalimide functionalized silica aerogels covalently grafted with spiropyran:applications in advanced information encryption
13
作者 Conghao Wu Wei Wu +6 位作者 Haitao Cai Menghan Mei Yangyang Gao Youhao Wei Yuanyuan Zi Jingzhi Wang Yuhui Yang 《Science China Materials》 2025年第6期1811-1821,共11页
Dynamic fluorescent materials capable of stimulus-responsive emission modulation have emerged as pivotal components in next-generation information security systems.This study presents a novel photoresponsive fluoresce... Dynamic fluorescent materials capable of stimulus-responsive emission modulation have emerged as pivotal components in next-generation information security systems.This study presents a novel photoresponsive fluorescent composite system in which spiropyran(SP)was covalently grafted onto naphthalimide-functionalized silica aerogel matrices.These architectures exhibit reversible fluorescence resonance energy transfer between the naphthalimide donors and merocyanine-form of SP acceptors under ultraviolet irradiation,enabling dynamic emission shifting from green(blue)to red.The aggregation-induced emission characteristics of SP were used to engineer a smart material system that can reversibly regulate its distinct red fluorescence by precisely controlling the dispersion of amino groups on naphthalimide-functionalized silica aerogels.This spatial manipulation directly governs the molecular packing state of SP,enabling dynamic fluorescence modulation.A programmable control over the fluorescence chromatic transitions in the composite material was achieved by systematically adjusting the SP grafting densities(1%,2%,and 3%w/w).A unique mode of dynamic information encryption technology was developed by utilizing dynamic fluorescence variations.These materials can substantially enhance information encryption levels due to their precisely adjustable fluorescence properties in response to external stimuli over time.This makes the encryption process even more unpredictable and complex,thereby exponentially increasing the difficulty for unauthorized parties to replicate or decode the encrypted information. 展开更多
关键词 dynamic fluorescent material naphthalimide functionalized silica aerogels SPIROPYRAN covalent grafting advanced information encryption
原文传递
基于多客户端功能加密的移动群智感知系统去中心化隐私保护真相发现(英文)
14
作者 胡为昕 汪小芬 《西北师范大学学报(自然科学版)》 2026年第1期23-34,58,共13页
近年来,移动群智感知系统引起了人们的广泛关注.然而,由于从个体用户收集的数据存在不准确性,获取真实可靠的数据值面临挑战.真值发现作为一种从海量用户数据中识别真实值的方法,正日益受到青睐.但现有真值发现算法既缺乏对用户隐私数... 近年来,移动群智感知系统引起了人们的广泛关注.然而,由于从个体用户收集的数据存在不准确性,获取真实可靠的数据值面临挑战.真值发现作为一种从海量用户数据中识别真实值的方法,正日益受到青睐.但现有真值发现算法既缺乏对用户隐私数据的有效保护,又需要两个及以上平台协同完成流程,并且其效率问题也值得关注.为解决这些问题,我们提出了一种“分布式功能加密下群智感知系统真值发现”的新框架.该方案不仅采用单一平台实现,还通过椭圆曲线密码学和内积运算实现了良好的效率与隐私保护.将本框架与云端隐私保护真值发现(PPTD)框架进行对比,实验结果表明,本框架在效率上显著优于云端PPTD方案,服务器时间成本提升约1000%,工作者时间成本提升100%. 展开更多
关键词 真值发现 隐私保护 移动群智感知系统 多客户端功能加密 单一平台
在线阅读 下载PDF
智慧运维一体化平台代码防篡改技术研究
15
作者 高志琨 袁亮 +1 位作者 马彦 张洁 《电子设计工程》 2026年第1期13-16,共4页
面对复杂的篡改攻击时,运维一体化平台的脆弱性逐渐显现,使得平台代码容易被篡改。故提出基于水印加密的代码数据提取与防篡改技术。构建平台代码篡改成功表达式与篡改成功率函数,提取被篡改后的数据。将提取数据输入水印加密函数生成密... 面对复杂的篡改攻击时,运维一体化平台的脆弱性逐渐显现,使得平台代码容易被篡改。故提出基于水印加密的代码数据提取与防篡改技术。构建平台代码篡改成功表达式与篡改成功率函数,提取被篡改后的数据。将提取数据输入水印加密函数生成密文,通过聚合节点ID构建水印加密聚合函数,避免数据冗余对代码防篡改效果的负面影响。确定被篡改后数据恢复区域,构建水印索引,定位包含所需恢复数据的水印信息,获取恢复后代码数据,实现平台代码防篡改。通过实验验证结果可知,该技术平台代码安全性最高能达到70%,具有良好的防篡改效果。 展开更多
关键词 智慧运维 一体化平台 代码防篡改 水印索引 水印加密聚合函数
在线阅读 下载PDF
Formulations of Some Bit Switching Functions in DES 被引量:1
16
作者 YOU Lin YANG Yilin WEN Wanli 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期402-406,共5页
In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, expansion, and permuted choices. They are generally presented in the form of matrixes and realize... In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, expansion, and permuted choices. They are generally presented in the form of matrixes and realized by using table look-up technique in the implementation of the cryptosystem. This paper presents explicit formulas for the initial permutation IP, its inverse IP-1 , the expansion function E, and the permuted choice PC_1. It also gives the program realizations of these functions in C++ applying these formulas. With the advantage of the omission of the storage space for these matrixes and the tedious inputs of tables in the implementations of DES, our experimental results shows that the explicit formulas are useful in some situations, such as wireless sensor networks where the memory capacity is limited, especially when the size of file for encrypting is not too large, preferably smaller than 256KB. 展开更多
关键词 data encryption standard bit-switching functions explicit formulas
原文传递
Designing a Secure Round Function Based on Chaos 被引量:1
17
作者 Bin Lu Xin Ge Fenlin Liu 《China Communications》 SCIE CSCD 2020年第5期29-37,共9页
A round function based on chaos is designed combining Feistel structure’s pseudo-randomness, chaotic system’s parameter sensitivity and image data characteristics. The round function composes of two parts--data tran... A round function based on chaos is designed combining Feistel structure’s pseudo-randomness, chaotic system’s parameter sensitivity and image data characteristics. The round function composes of two parts--data transformation based on Feistel(abbreviated as FST) and sampling output based on chaos(abbreviated as SMP). FST bases on Feistel structure and several efficient operations including bitwise xor, permutation and circulating shift. SMP is a chaos based pseudo-random sampling algorithm. It is from theoretical analysis that the round function is a pseudo-random function. The upper bounds of the average maximum differential probability and average maximum linear probability are p^2 and q^2 respectively. Finally, the good pseudo-randomness of the round function is examined with the NIST random test. The design of this round function provides an important cryptographic component for the design of chaotic image encryption algorithm. 展开更多
关键词 image encryption round function CHAOS pseudo-random function
在线阅读 下载PDF
Efficient functional encryption for inner product with simulation-based security 被引量:1
18
作者 Wenbo Liu Qiong Huang +1 位作者 Xinjian Chen Hongbo Li 《Cybersecurity》 EI CSCD 2021年第1期13-25,共13页
Functional encryption(FE)is a novel paradigm for encryption scheme which allows tremendous flexibility in accessing encrypted information.In FE,a user can learn specific function of encrypted messages by restricted fu... Functional encryption(FE)is a novel paradigm for encryption scheme which allows tremendous flexibility in accessing encrypted information.In FE,a user can learn specific function of encrypted messages by restricted functional key and reveal nothing else about the messages.Inner product encryption(IPE)is a special type of functional encryption where the decryption algorithm,given a ciphertext related to a vector x and a secret key related to a vector y,computes the inner product x·y.In this paper,we construct an efficient private-key functional encryption(FE)for inner product with simulation-based security,which is much stronger than indistinguishability-based security,under the External Decisional Linear assumption in the standard model.Compared with the existing schemes,our construction is faster in encryption and decryption,and the master secret key,secret keys and ciphertexts are shorter. 展开更多
关键词 functional encryption Inner product Simulation-based security
原文传递
Message Authentication with a New Quantum Hash Function
19
作者 Yalan Wang Yuling Chen +1 位作者 Haseeb Ahmad Zhanhong Wei 《Computers, Materials & Continua》 SCIE EI 2019年第5期635-648,共14页
To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication sch... To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication schemes are being faced with big challenges.We take the message authentication as an example into a careful consideration.Then,we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function.Firstly,the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the corresponding Hash values,which ensures that the initial message can resist eavesdropping attack.Secondly,utilizing the new quantum Hash function with quantum walks can be much more secure than traditional classical Hash functions with keeping the common properties,such as one-wayness,resisting different collisions and easy implementation.Based on these two points,the message authentication scheme can be much more secure than previous ones.Finally,it is a new way to design the message authentication scheme,which provides a new thought for other researchers in the future.Our works will contribute to the study on the new encryption and authentication functions and the combination of quantum computing with traditional cryptology in the future. 展开更多
关键词 Message authentication symmetric encryption quantum Hash function quantum walk
在线阅读 下载PDF
Efficient functional encryption for inner product with simulation-based security
20
作者 Wenbo Liu Qiong Huang +1 位作者 Xinjian Chen Hongbo Li 《Cybersecurity》 2018年第1期980-992,共13页
Functional encryption(FE)is a novel paradigm for encryption scheme which allows tremendous flexibility in accessing encrypted information.In FE,a user can learn specific function of encrypted messages by restricted fu... Functional encryption(FE)is a novel paradigm for encryption scheme which allows tremendous flexibility in accessing encrypted information.In FE,a user can learn specific function of encrypted messages by restricted functional key and reveal nothing else about the messages.Inner product encryption(IPE)is a special type of functional encryption where the decryption algorithm,given a ciphertext related to a vector x and a secret key related to a vector y,computes the inner product x·y.In this paper,we construct an efficient private-key functional encryption(FE)for inner product with simulation-based security,which is much stronger than indistinguishability-based security,under the External Decisional Linear assumption in the standard model.Compared with the existing schemes,our construction is faster in encryption and decryption,and the master secret key,secret keys and ciphertexts are shorter. 展开更多
关键词 functional encryption Inner product Simulation-based security
原文传递
上一页 1 2 21 下一页 到第
使用帮助 返回顶部