Advanced Search

    column
    Principle and Research Progress of Quantum Computation and Quantum Cryptography
    Wang Yongli, Xu Qiuliang
    2020, 57(10): 2015-2026. DOI: 10.7544/issn1000-1239.2020.20200615
    Abstract FullText HTML PDF
    Research Advances on Privacy Preserving in Edge Computing
    Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei
    2020, 57(10): 2027-2051. DOI: 10.7544/issn1000-1239.2020.20200614
    Abstract FullText HTML PDF
    Overview of Threat Intelligence Sharing and Exchange in Cybersecurity
    Lin Yue, Liu Peng, Wang He, Wang Wenjie, Zhang Yuqing
    2020, 57(10): 2052-2065. DOI: 10.7544/issn1000-1239.2020.20200616
    Abstract FullText HTML PDF
    Security Issues and Privacy Preserving in Machine Learning
    Wei Lifei, Chen Congcong, Zhang Lei, Li Mengsi, Chen Yujiao, Wang Qin
    2020, 57(10): 2066-2085. DOI: 10.7544/issn1000-1239.2020.20200426
    Abstract FullText HTML PDF
    Comparisons and Optimizations of Key Encapsulation Mechanisms Based on Module Lattices
    Wang Yang, Shen Shiyu, Zhao Yunlei, Wang Mingqiang
    2020, 57(10): 2086-2103. DOI: 10.7544/issn1000-1239.2020.20200452
    Abstract FullText HTML PDF
    A Multi-User Forward Secure Dynamic Symmetric Searchable Encryption with Enhanced Security
    Lu Bingjie, Zhou Jun, Cao Zhenfu
    2020, 57(10): 2104-2116. DOI: 10.7544/issn1000-1239.2020.20200439
    Abstract FullText HTML PDF
    Circular Secure Homomorphic Encryption Scheme
    Zhao Xiufeng, Fu Yu, Song Weitao
    2020, 57(10): 2117-2124. DOI: 10.7544/issn1000-1239.2020.20200422
    Abstract FullText HTML PDF
    Public-Key Authenticated Encryption with Keyword Search Without Pairings
    Yang Ningbin, Zhou Quan, Xu Shumei
    2020, 57(10): 2125-2135. DOI: 10.7544/issn1000-1239.2020.20200318
    Abstract FullText HTML PDF
    Efficient Two-Party SM2 Signing Protocol for Mobile Internet
    Feng Qi, He Debiao, Luo Min, Li Li
    2020, 57(10): 2136-2146. DOI: 10.7544/issn1000-1239.2020.20200401
    Abstract FullText HTML PDF
    A Dynamic S-Box Construction and Application Scheme of ZUC Based on Chaotic System
    Han Yanyan, He Yanru, Liu Peihe, Zhang Duo, Wang Zhiqiang, He Wencai
    2020, 57(10): 2147-2157. DOI: 10.7544/issn1000-1239.2020.20200466
    Abstract FullText HTML PDF
    A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy
    Chen Ming
    2020, 57(10): 2158-2176. DOI: 10.7544/issn1000-1239.2020.20200472
    Abstract FullText HTML PDF
    Server-Aided and Verifiable Attribute-Based Signature for Industrial Internet of Things
    Zhang Yinghui, He Jiangyong, Guo Rui, Zheng Dong
    2020, 57(10): 2177-2187. DOI: 10.7544/issn1000-1239.2020.20200421
    Abstract FullText HTML PDF
    Secure Constant-Round Multi-User k-Means Clustering Protocol
    Qin Hong, Wang Hao, Wei Xiaochao, Zheng Zhihua
    2020, 57(10): 2188-2200. DOI: 10.7544/issn1000-1239.2020.20200407
    Abstract FullText HTML PDF
    Template Protection of Speaker Recognition Based on Random Mapping Technology
    Ding Yong, Li Jiahui, Tang Shijie, Wang Huiyong
    2020, 57(10): 2201-2208. DOI: 10.7544/issn1000-1239.2020.20200474
    Abstract FullText HTML PDF
    A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks
    Feng Jingyu, Yang Jinwen, Zhang Ruitong, Zhang Wenbo
    2020, 57(10): 2209-2220. DOI: 10.7544/issn1000-1239.2020.20200453
    Abstract FullText HTML PDF
    Privacy-Preserving Statistics Protocol for Set-Based Computation
    Song Xiangfu, Gai Min, Zhao Shengnan, Jiang Han
    2020, 57(10): 2221-2231. DOI: 10.7544/issn1000-1239.2020.20200444
    Abstract FullText HTML PDF
    ACT: Auditable Confidential Transaction Scheme
    Jiang Yihan, Li Yong, Zhu Yan
    2020, 57(10): 2232-2240. DOI: 10.7544/issn1000-1239.2020.20200400
    Abstract FullText HTML PDF
    Efficient and Secure Federated Learning Based on Secret Sharing and Gradients Selection
    Dong Ye, Hou Wei, Chen Xiaojun, Zeng Shuai
    2020, 57(10): 2241-2250. DOI: 10.7544/issn1000-1239.2020.20200463
    Abstract FullText HTML PDF