CORC

浏览/检索结果: 共37条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Two-party quantum private comparison protocol with maximally entangled seven-qubit state 期刊论文
MODERN PHYSICS LETTERS A, 2019, 卷号: 34, 期号: 28
作者:  Ji, ZhaoXu;  Zhang, HuanGuo;  Fan, PeiRu
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/05
Advances in practical secure two-party computation and its application in genomic sequence comparison [实用安全两方计算及其在基因组序列比对中的应用] 期刊论文
Journal of Cryptologic Research, 2019, 卷号: 6, 期号: 2, 页码: 192-204
作者:  Zhao C.;  Zhao S.-N.;  Jia Z.-T.;  Zhang B.;  Zhang B.
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/11
A novel quantum solution to secure two-party distance computation 期刊论文
Quantum Information Processing, 2018, 卷号: Vol.17 No.6
作者:  Pan-hong Wang;  Zhen-wan Peng;  Shun Zhang;  Run-hua Shi
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/22
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption 期刊论文
Journal of Ambient Intelligence and Humanized Computing, 2018, 页码: 1-11
作者:  Jiang H.;  Xu Q.;  Liu C.;  Zheng Z.;  Tang Y.
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
Quantum solution to a class of two-party private summation problems 期刊论文
Quantum Information Processing, 2017, 卷号: Vol.16 No.9
作者:  Zhang, Shun;  Shi, Run-Hua
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/22
A novel quantum scheme for secure two-party distance computation 期刊论文
Quantum Information Processing, 2017, 卷号: Vol.16 No.12
作者:  Peng, Zhen-wan;  Zhong, Hong;  Zhang, Shun;  Cui, Jie;  Shi, Run-hua
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/22
Fast cut-and-choose bilateral oblivious transfer for malicious adversaries 期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 418-425
作者:  Wei, Xiaochao;  Jiang, Han;  Zhao, Chuan;  Zhao, Minghao;  Xu, Qiuliang
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/16
Secure Nearest Neighbor Query on Crowd-Sensing Data 期刊论文
SENSORS, 2016, 卷号: 16, 期号: 10
作者:  Cheng, Ke[1];  Wang, Liangmin[2];  Zhong, Hong[3]
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/24
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries 会议论文
15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA), AUG 23-26, 2016
作者:  Wei, Xiaochao;  Jiang, Han;  Zhao, Chuan;  Zhao, Minghao;  Xu, Qiuliang
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31
Several oblivious transfer variants in cut-and-choose scenario 期刊论文
International Journal of Information Security and Privacy, 2015, 卷号: 9, 期号: 2, 页码: 1-12
作者:  Zhao, Chuan;  Jiang, Han;  Xu, Qiuliang;  Wei, Xiaochao;  Wang, Hao
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/17


©版权所有 ©2017 CSpace - Powered by CSpace