Search scope:
排序: Display mode:
Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 2, Pages 168-182 doi: 10.1007/s11705-021-2056-8
Keywords: computer-aided molecular design bio-oil additives molecular signature descriptor
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2, Pages 135-142 doi: 10.1631/FITEE.1500197
Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.
Keywords: Identity Signature Lattice Number theory research unit (NTRU)
Certificateless broadcast multi-signature for network coding Research Article
Huifang YU, Zhewei QI
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1369-1377 doi: 10.1631/FITEE.2200271
Keywords: Network coding Certificateless multi-signature Linear combination Homomorphic hash function
Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature
Frontiers of Medicine 2023, Volume 17, Issue 4, Pages 768-780 doi: 10.1007/s11684-023-0982-1
Keywords: machine learning methods hypertrophic cardiomyopathy genetic risk
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2, Pages 141-286 doi: 10.1631/FITEE.1900318
Keywords: Identity-based signature Lattice Strong unforgeability Random oracle model
Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome
Guangbiao Zhou, Xinchun Zhao
Frontiers of Medicine 2018, Volume 12, Issue 2, Pages 236-238 doi: 10.1007/s11684-017-0611-y
Recently, Ng . reported that the A:T>T:A substitutions, proposed to be a signature of aristolochicchloride and its reactive metabolites chloroethylene oxide, melphalan and chlorambucil, also cause this signature
Keywords: genomic signature carcinogen aristolochic acid tobacco smoke vinyl chloride hepatocellular carcinoma
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Strategic Study of CAE 2022, Volume 24, Issue 4, Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015
Keywords: quantum cryptography protocols quantum key distribution quantum digital signature quantum private
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020
This paper analyzes and sorts out the latest developments and typical applications of network electronic identity management in major countries and regions around the world, and discusses development trends in network identity management technology. It outlines network electronic identity management in China according to the 13th Five-Year Plan, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system. Such a system can help to regulate the behavior of Internet users, fight against network crime, build network power, safeguard national security and cyberspace sovereignty, and protect the privacy of network users; thus, it provides a reference for China’s network identity management development during the 13th Five-Year Plan.
Keywords: network electronic identity identity management digital signature
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Strategic Study of CAE 2000, Volume 2, Issue 2, Pages 41-46
The conception of the generating lock P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XA≠XB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.
Keywords:
encrypting system
multi-tooth encrypting-decrypting algorithm
P
Verifier-local revocation group signatures with backward unlinkability from lattices Research Articles
Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6, Pages 876-892 doi: 10.1631/FITEE.2000507
Keywords: Group signature Lattice-based cryptography Verifier-local revocation Backward unlikability Short
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 176-186 doi: 10.1631/FITEE.1700005
Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSsignatures on two different messages with the same subject will result in an immediate collapse of the signature
Keywords: Double-authentication-preventing signatures Chameleon hash function Digital signature Provable security
Title Author Date Type Operation
Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular
Journal Article
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Journal Article
Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature
Journal Article
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Journal Article
Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome
Guangbiao Zhou, Xinchun Zhao
Journal Article
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Journal Article
Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Journal Article
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Journal Article
Verifier-local revocation group signatures with backward unlinkability from lattices
Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA
Journal Article