2021
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment.
Mob. Networks Appl., 2021
2020
Security analysis of indistinguishable obfuscation for internet of medical things applications.
Comput. Commun., 2020
2019
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement.
Clust. Comput., 2019
QoS Aware Routing Protocol Through Cross-layer Approach in Asynchronous Duty-Cycled WSNs.
IEEE Access, 2019
2018
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem: revisited.
Multim. Tools Appl., 2018
A novel identity-based anonymous authentication scheme from multilinear maps.
Int. J. Inf. Commun. Technol., 2018
Multilinear maps via secret ring.
IACR Cryptol. ePrint Arch., 2018
2017
ID-based multi-receiver signcryption scheme in the standard model.
Int. J. Internet Protoc. Technol., 2017
Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals.
IACR Cryptol. ePrint Arch., 2017
Integer Version of Ring-LWE and its Applications.
IACR Cryptol. ePrint Arch., 2017
Multilinear Maps Using a Variant of Ring-LWE.
IACR Cryptol. ePrint Arch., 2017
A Constraint-Based Forwarding for Multi-hop Broadcasts in Asynchronous Duty-Cycled WSNs.
Ad Hoc Sens. Wirel. Networks, 2017
2016
The fuzzy comprehensive evaluation of water and sand inrush risk during underground mining.
J. Intell. Fuzzy Syst., 2016
Anonymous authentication for circuits from correlation-relaxed two-to-one recoding.
J. Ambient Intell. Humaniz. Comput., 2016
Cryptanalysis of Simple Matrix Scheme for Encryption.
IACR Cryptol. ePrint Arch., 2016
2015
基于多线性映射的环签密广播公钥方案 (Ring Signcryption Broadcasting Scheme Based on Multilinear Maps).
计算机科学, 2015
Application of Distributed Optical Fiber Sensing Technology in the Anomaly Detection of Shaft Lining in Grouting.
J. Sensors, 2015
An Improved Multilinear Map and its Applications.
Int. J. Inf. Technol. Web Eng., 2015
Variation of GGH15 Multilinear Maps.
IACR Cryptol. ePrint Arch., 2015
New multilinear maps from ideal lattices.
IACR Cryptol. ePrint Arch., 2015
Ideal Multilinear Maps Based on Ideal Lattices.
IACR Cryptol. ePrint Arch., 2015
Multilinear Maps Using Ideal Lattices without Encodings of Zero.
IACR Cryptol. ePrint Arch., 2015
Improvement of GGH Multilinear Map.
Proceedings of the 10th International Conference on P2P, 2015
2014
Known-plaintext attack on secure kNN computation on encrypted databases.
Secur. Commun. Networks, 2014
A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2012
Attack on Fully Homomorphic Encryption over the Integers.
IACR Cryptol. ePrint Arch., 2012
2011
New Fully Homomorphic Encryption without Bootstrapping.
IACR Cryptol. ePrint Arch., 2011
More Practical Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2011
New Fully Homomorphic Encryption over the Integers.
IACR Cryptol. ePrint Arch., 2011
Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2011
Fully Homomorphic Encryption, Approximate Lattice Problem and LWE.
IACR Cryptol. ePrint Arch., 2011