中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
数学与系统科学研究院 [1]
中国科学院大学 [1]
自动化研究所 [1]
软件研究所 [1]
采集方式
OAI收割 [3]
iSwitch采集 [1]
内容类型
期刊论文 [4]
发表日期
2021 [1]
2020 [1]
2016 [1]
2014 [1]
学科主题
筛选
浏览/检索结果:
共4条,第1-4条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System
期刊论文
OAI收割
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1877-1890
作者:
null Mamta
;
Brij B. Gupta
;
Kuan-Ching Li
;
Victor C. M. Leung
;
Kostas E. Psannis
  |  
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2021/09/03
Cloud-based cyber-physical systems (CCPS)
data encryption
healthcare information search and retrieval
keyword search
public-key cryptosystems
searchable encryption
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
OAI收割
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
  |  
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
Bit-oriented quantum public-key encryption based on quantum perfect encryption
期刊论文
iSwitch采集
Quantum information processing, 2016, 卷号: 15, 期号: 8, 页码: 3285-3300
作者:
Wu, Chenmiao
;
Yang, Li
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2019/05/09
Quantum cryptography
Quantum public-key encryption
Bit-oriented encryption
Information-theoretic security
PRE: Stronger security notions and efficient construction with non-interactive opening
期刊论文
OAI收割
Theoretical Computer Science, 2014, 卷号: 542, 页码: 1-16
Zhang, Jiang (1)
;
Zhang, Zhenfeng (1)
;
Chen, Yu (3)
  |  
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2014/12/16
Public key encryption
Proxy re-encryption
Chosen key model
Knowledge of secret key model
Chosen-ciphertext security
DBDH