Computer Science ›› 2021, Vol. 48 ›› Issue (3): 307-312.doi: 10.11896/jsjkx.200100024
Special Issue: Information Security
• Information Security • Previous Articles Next Articles
ZHENG Jia-tong1,2, WU Wen-yuan1
CLC Number:
[1]CANETTI R,DWORK C,NAOR M,et al.Deniable encryption[C]//Annual International Cryptology Conference.Springer,1997:90-104. [2]IBRAHIM M H.A Method for Obtaining Deniable Public-Key Encryption[J].International Journal of Network Security,2009,8(1):1-9. [3]JAYDEEP H D N.Sender-Side Public Key Deniable Encryption Scheme[C]//International Conference on Advances in Recent Technologies in Communication & Computing.IEEE,2009:27-28. [4]MAREK K,PRZEMYALAW K,MIROSLAW K.Practical de-niable encryption[C]//Proc. of the 34th Conference on Current Trends in Theory and Practice of Computer Science.Berlin:Springer-Verlag,2008:599-609. [5]IBRAHIM M H.Receiver-deniable Public-Key Encryption[J].International Journal of Network Security,2009,8(2):159-165. [6]KLONOWSKI M,KUBIAK P,KUTYŁOWSKI M.PracticalDeniable Encryption[J].Theory and Practice of Computer Science,2008,4910:599-609. [7]MENG B,WANG J Q.An Efficient Receiver Deniable Encryption Scheme and Its Applications[J].Journal of Networks,2010,5(6):683-690. [8]CRAMER R,GENNARO R,SCHOENMAKERS B.A Secure and Optimally Efficient Multi-Authority Election Scheme[C]//International Conference on the Theory & Applications of Cryptographic Techniques.Springer,1997:481-490. [9]HIRT M,SAKO K.Efficient Receipt-Free Voting Based on Homomorphic Encryption[J].Lecture Notes in Computer Science,2000,1807:539-556. [10]REGEV O.On Lattices,Learning with Errors,Random Linear Codes,and Cryptography[J].Journal of the Acm,2009,56(6):1-40. [11]LYUBASHEVSKY V,PEIKERT C,REGEV O.On ideal lattices and learning with errors over rings[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer,2010:1-23. [12]LANGLOIS A,STEHLE D.Worst-case to average-case reductions for module lattices [J].Designs,Codes and Cryptography,2015,75(3):565-599. [13]BOS J,DUCAS L,KILTZ E,et al.CRYSTALS-Kyber:a CCA-secure module-lattice-based KEM[J].IACR Cryptology ePrint Archive,2017:634-650. [14]KE C S,WU W Y,FENG Y.Low Expansion Rate EncrptionAlgorithm Based on MLWE[J].Computer Science,2019,46(4):145-150. [15]O’NEIL A,PEIKERT C,WATERS B.Bi-Deniable Public-Key Encryption[C]//Annual International Cryptology Conference.Springer,2011:525-542. [16]BAI S,LANGLOIS A,LEPOINT T,et al.Improved securityproofs in lattice-based cryptography:using the Renyi divergence rather than the stastical distance[C]//International Conference on the Theory and Application of Cryptology and Information Security.Springer,2015:3-24. [17]WU W Y,ZHENG J T,FENG Y.Sender-side Public Key Deniable Encryption Scheme Based on LWE[J].Advanced Enginee-ring Sciences,2020,52(2):1-8. [18]SUN L,WANG C F.Practical deniable encryption scheme and security proofs[J].Application Research of Computers,2010,27(10):3862-3865. [19]SUN L.Deniable Encryption and Deniable Protocol[D].Lanzhou:Northwest Normal University,2011. [20]ZHENG J T.Public Key Deniable Schemes Based on Lattice Problems [D].Beijing:University of Chinese Academy ofScien-ces,2020. |
[1] | LENG Feng, ZHANG Ming-kai, YAN Zhi-wei, ZHANG Cui-ling, ZENG Yu. Application of Chinese Cryptographic Algorithm in RPKI [J]. Computer Science, 2021, 48(11A): 678-681. |
[2] | CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281. |
|