Search scope:
排序: Display mode:
Quantum Cryptography via Satellite
Mitch Leslie
Engineering 2019, Volume 5, Issue 3, Pages 353-354 doi: 10.1016/j.eng.2019.04.006
Quantum Cryptography Competition Yields Next-Generation Standard Algorithms
Chris Palmer
Engineering 2023, Volume 21, Issue 2, Pages 6-8 doi: 10.1016/j.eng.2022.12.002
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1, Pages 28-42 doi: 10.1631/FITEE.1400133
Keywords: Storage image security Cryptographic file system Filesystem in userspace (FUSE) Transparent encryption
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Strategic Study of CAE 2022, Volume 24, Issue 4, Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015
Keywords: quantum cryptography protocols quantum key distribution quantum digital signature quantum private
Side-channel attacks and learning-vector quantization Article
Ehsan SAEEDI, Yinan KONG, Md. Selim HOSSAIN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 4, Pages 511-518 doi: 10.1631/FITEE.1500460
Keywords: Side-channel attacks Elliptic curve cryptography Multi-class classification Learning vector quantization
Two-dimensional Controllable Cellular Automata BasedPseudo Random Bit Sequence Generator
Zhu Baoping,Ma Qian,Liu Fengyu
Strategic Study of CAE 2007, Volume 9, Issue 6, Pages 43-47
Keywords: cellular automata pseudorandom number generators controllable cryptography
BORON: an ultra-lightweight and low power encryption design for pervasive computing Article
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3, Pages 317-331 doi: 10.1631/FITEE.1500415
Keywords: Lightweight cryptography SP network Block cipher Internet of Things (IoT) Encryption Embedded security
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
Research Progress and Key Technologies of Quantum Network Systems
Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 80-95 doi: 10.15302/J-SSCAE-2023.06.010
Keywords: quantum information quantum network quantum cryptography network quantum cloud computing network
Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA Personal View
Vijay DAHIPHALE, Gaurav BANSOD, Ankur ZAMBARE, Narayan PISHAROTY
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 4, Pages 615-628 doi: 10.1631/FITEE.1800681
Keywords: Lightweight cryptography Internet of Things (IoT) Embedded security Encryption FPGA Datapath design
Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2, Pages 258-277 doi: 10.1631/FITEE.2000366
Keywords: Post-quantum cryptography Threshold proxy re-encryption Lattices Robustness Decentralization
Verifier-local revocation group signatures with backward unlinkability from lattices Research Articles
Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6, Pages 876-892 doi: 10.1631/FITEE.2000507
For (GS) supporting membership revocation, (VLR) mechanism seems to be a more flexible choice, because it requires only that verifiers download up-to-date revocation information for signature verification, and the signers are not involved. As a post-quantum secure cryptographic counterpart of classical number-theoretic cryptographic constructions, the first lattice-based VLR (VLR-GS) was introduced by Langlois et al. (2014). However, none of the contemporary lattice-based VLR-GS schemes provide backward unlinkability (BU), which is an important property to ensure that previously issued signatures remain anonymous and unlinkable even after the corresponding signer (i.e., member) is revoked. In this study, we introduce the first lattice-based VLR-GS scheme with BU security (VLR-GS-BU), and thus resolve a prominent open problem posed by previous works. Our new scheme enjoys an (log) factor saving for bit-sizes of the group public-key (GPK) and the member's signing secret-key, and it is free of any public-key encryption. In the random oracle model, our scheme is proven secure under two well-known hardness assumptions of the (SIS) problem and learning with errors (LWE) problem.
Keywords: Group signature Lattice-based cryptography Verifier-local revocation Backward unlikability Short
Title Author Date Type Operation
Quantum Cryptography Competition Yields Next-Generation Standard Algorithms
Chris Palmer
Journal Article
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN
Journal Article
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Journal Article
Side-channel attacks and learning-vector quantization
Ehsan SAEEDI, Yinan KONG, Md. Selim HOSSAIN
Journal Article
Two-dimensional Controllable Cellular Automata BasedPseudo Random Bit Sequence Generator
Zhu Baoping,Ma Qian,Liu Fengyu
Journal Article
BORON: an ultra-lightweight and low power encryption design for pervasive computing
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
Research Progress and Key Technologies of Quantum Network Systems
Li Jing, Gao Fei, Qin Sujuan, Wen Qiaoyan, Zhang Ping
Journal Article
Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA
Vijay DAHIPHALE, Gaurav BANSOD, Ankur ZAMBARE, Narayan PISHAROTY
Journal Article
Identity-based threshold proxy re-encryption scheme from lattices and its applications
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Journal Article