×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [12]
软件研究所 [6]
安徽大学 [4]
中国科学院大学 [3]
北京大学 [2]
兰州理工大学 [2]
更多...
内容类型
期刊论文 [24]
会议论文 [9]
学位论文 [3]
其他 [1]
发表日期
2019 [2]
2018 [2]
2017 [2]
2016 [3]
2015 [6]
2014 [4]
更多...
学科主题
Electrical... [1]
Engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共37条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Two-party quantum private comparison protocol with maximally entangled seven-qubit state
期刊论文
MODERN PHYSICS LETTERS A, 2019, 卷号: 34, 期号: 28
作者:
Ji, ZhaoXu
;
Zhang, HuanGuo
;
Fan, PeiRu
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
Information security
quantum cryptography
secure multi-party quantum computation
quantum private comparison
maximally entangled seven-qubit state
Advances in practical secure two-party computation and its application in genomic sequence comparison [实用安全两方计算及其在基因组序列比对中的应用]
期刊论文
Journal of Cryptologic Research, 2019, 卷号: 6, 期号: 2, 页码: 192-204
作者:
Zhao C.
;
Zhao S.-N.
;
Jia Z.-T.
;
Zhang B.
;
Zhang B.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/11
Garbled circuit
Genomic sequence comparison
Homomorphic encryption
Practical secure two-party computation
Secure multi-party computation
A novel quantum solution to secure two-party distance computation
期刊论文
Quantum Information Processing, 2018, 卷号: Vol.17 No.6
作者:
Pan-hong Wang
;
Zhen-wan Peng
;
Shun Zhang
;
Run-hua Shi
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/22
Computational
geometry
Secure
multiparty
computation
Quantum
private
query
Secure
two-party
distance
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption
期刊论文
Journal of Ambient Intelligence and Humanized Computing, 2018, 页码: 1-11
作者:
Jiang H.
;
Xu Q.
;
Liu C.
;
Zheng Z.
;
Tang Y.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Cut-and-choose bilateral OT
Cut-and-choose inverse OT
Round complexity
Secure two-party computation
Quantum solution to a class of two-party private summation problems
期刊论文
Quantum Information Processing, 2017, 卷号: Vol.16 No.9
作者:
Zhang, Shun
;
Shi, Run-Hua
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/22
SET INTERSECTION
SECURE
COMPUTATION
SCHEME
A novel quantum scheme for secure two-party distance computation
期刊论文
Quantum Information Processing, 2017, 卷号: Vol.16 No.12
作者:
Peng, Zhen-wan
;
Zhong, Hong
;
Zhang, Shun
;
Cui, Jie
;
Shi, Run-hua
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/22
PROTOCOL
Fast cut-and-choose bilateral oblivious transfer for malicious adversaries
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 418-425
作者:
Wei, Xiaochao
;
Jiang, Han
;
Zhao, Chuan
;
Zhao, Minghao
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/16
Cut-and-choose bilateral oblivious transfer
DDH assumption
Malicious adversaries
Secure two-party computation
Secure Nearest Neighbor Query on Crowd-Sensing Data
期刊论文
SENSORS, 2016, 卷号: 16, 期号: 10
作者:
Cheng, Ke[1]
;
Wang, Liangmin[2]
;
Zhong, Hong[3]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/24
secure nearest neighbor
crowd-sensing
privacy-preservation
secure two-party computation
collusion attack
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries
会议论文
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), AUG 23-26, 2016
作者:
Wei, Xiaochao
;
Jiang, Han
;
Zhao, Chuan
;
Zhao, Minghao
;
Xu, Qiuliang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
cut-and-choose bilateral oblivious transfer
malicious adversaries
DDH
assumption
secure two-party computation
Several oblivious transfer variants in cut-and-choose scenario
期刊论文
International Journal of Information Security and Privacy, 2015, 卷号: 9, 期号: 2, 页码: 1-12
作者:
Zhao, Chuan
;
Jiang, Han
;
Xu, Qiuliang
;
Wei, Xiaochao
;
Wang, Hao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/17
Cut-and-choose
Homomorphic encryption
Ideal/real simulation paradigm
Malicious model
Oblivious transfer
Oblivious transfer variant
Secure two-party computation
Security protocol
©版权所有 ©2017 CSpace - Powered by
CSpace