An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case
暂无分享,去创建一个
[1] Jong Hyuk Park,et al. SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook , 2017, Appl. Soft Comput..
[2] Adrien Hauteville,et al. Identity-Based Encryption from Codes with Rank Metric , 2017, CRYPTO.
[3] Jong Hyuk Park,et al. Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..
[4] Xinwen Zhang,et al. CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud , 2012, ASIACCS '12.
[5] Bharati Mishra,et al. CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage , 2018, 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT).
[6] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[7] Pierre Loidreau,et al. A New Rank Metric Codes Based Encryption Scheme , 2017, PQCrypto.
[8] Daniel J. Bernstein,et al. Grover vs. McEliece , 2010, PQCrypto.
[9] Joachim Rosenthal,et al. Extension of Overbeck’s attack for Gabidulin-based cryptosystems , 2018, Des. Codes Cryptogr..
[10] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[11] Chik How Tan,et al. A New Encryption Scheme Based on Rank Metric Codes , 2018, ACISP.
[12] Jong Hyuk Park,et al. XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs , 2017, J. Inf. Process. Syst..
[13] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[14] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[15] Jong Hyuk Park,et al. A novel framework for internet of knowledge protection in social networking services , 2018, J. Comput. Sci..
[16] Ayoub Otmani,et al. Improved cryptanalysis of rank metric schemes based on Gabidulin codes , 2018, Des. Codes Cryptogr..
[17] Peter W. Shor. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .
[18] Yongge Wang,et al. Quantum resistant random linear code based public key encryption scheme RLCE , 2015, 2016 IEEE International Symposium on Information Theory (ISIT).
[19] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[20] G. Manoj Someswar,et al. Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a Cloud Environment , 2015 .
[21] Kazukuni Kobara,et al. Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC , 2001, Public Key Cryptography.
[22] Gaikwad Prajakta,et al. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2015 .
[23] Jin Li,et al. Verifiable searchable encryption with aggregate keys for data sharing system , 2018, Future Gener. Comput. Syst..
[24] Mihir Bellare,et al. Optimal Asymmetric Encryption , 1994, EUROCRYPT.
[25] Alberto Ravagnani,et al. Weight distribution of rank-metric codes , 2015, Designs, Codes and Cryptography.
[26] Daniel J. Bernstein,et al. Introduction to post-quantum cryptography , 2009 .