JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (6): 64-68.doi: 10.6040/j.issn.1671-9352.2.2016.215
Previous Articles Next Articles
LUO Peng1, YANG Xiao-yuan1,2
CLC Number:
[1] SHAMIR A. Identity-Based cryptosystems and signature schemes[C] // The Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1984: 47-53. [2] DAN B, FRANKLIN M. Identity-Based encryption from the weil pairing[J]. Siam Journal on Computing, 2001, 32(3):213-229. [3] BOYD C. Advances in Cryptology — ASIACRYPT 2001[J]. Advances in Cryptology — Asiacrypt, 2001: 125-143. [4] CHAUM D, HEYST E V. Group signatures[M] // Advances in Cryptology — EUROCRYPT’91. Springer Berlin Heidelberg, 1991: 257-265. [5] GENTRY C, SILVERBERG A. Hierarchical ID-Based cryptography[C] // Advances in Cryptology-ASIACRYPT 2002, International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. DBLP, 2002: 548-566. [6] HORWITZ J, LYNN B. Toward hierarchical Identity-Based encryption[M] // Advances in Cryptology — EUROCRYPT 2002. Springer Berlin Heidelberg, 2002: 466-481. [7] SHOR P W. Polynomial time algorithms for discrete logarithms and factoring on a quantum computer[C] // International Symposium on Algorithmic Number Theory. Springer-Verlag, 1994: 289. [8] MAY A, SILVERMAN J H. Dimension reduction methods for convolution modular lattices[C] // Revised Papers from the International Conference on Cryptography and Lattices. Springer-Verlag, 2001: 110-125. [9] MICCIANCIO D, PEIKERT C. Trapdoors for lattices: simpler, tighter, faster, smaller[C] // International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2012: 700-718. [10] GEONTAE Noh, CHUN J Y, JEONG I R. Strongly unforgeable ring signature scheme from lattices in the standard model[J]. Journal of Applied Mathematics,2014,(2014-5-5), 2014, 2014(2014):1-12. [11] GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C] // DBLP, 2008: 197-206. [12] DAMIEN S, RON S, TANAKA K, et al. Efficient public key encryption based on ideal lattices[C] // Advances in Cryptology-ASIACRYPT 2009, International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. DBLP, 2009: 617-635. [13] YANG X Y, WU L Q, ZHANG M Q, et al. Public-key encryption scheme based on R-LWE[J]. Journal on Communications, 2013, 34(2):23-30. |
[1] | ZHANG En-sheng. Composition and structure on attribute reduction of interval-set concept lattices [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(8): 17-24. |
[2] | PENG Jia-yin. Falling fuzzy filters on residuated lattices [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(2): 52-64. |
[3] | LIU Chun-hui. On(∈,∈∨q(λ, μ))-fuzzy LI-ideals in lattice implication algebras [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(2): 65-72. |
[4] | SHAO Yong. Semilattice-ordered completely regular periodic semigroups [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(10): 1-5. |
[5] | LIU Li-jun. Characterizations of n-fold positive implicative filter in residuated lattice [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(8): 48-52. |
[6] | LI Jin-hai, WU Wei-zhi. Granular computing approach for formal concept analysis and its research outlooks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 1-12. |
[7] | HUANG Tao-lin, NIU Jiao-jiao, LI Jin-hai. Reduct updating method in a dynamic formal context based on granular discernibility attribute matrix [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 13-21. |
[8] | WANG Wei-li, HU Bin, ZHAO Xiu-feng. An efficient multi-identity-based fully homomorphic encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 85-94. |
[9] | LIU Lin, WEI Ling, QIAN Ting. Three-way rules extraction in formal decision contexts with confidence [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(2): 101-110. |
[10] | CHEN Xue, WEI Ling, QIAN Ting. Attribute reduction in formal decision contexts based on AE-concept lattices [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 95-103. |
[11] | LIANG Ying, CUI Yan-li, WU Hong-bo. Properties of residuated lattice of deduction systems set algebra in BL system [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 65-70. |
[12] | LIU Li-jun. Characterizations and properties of triple-δ-derivation in Boolean algebra [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 95-99. |
[13] | LIU Chun-hui. Lattice of(,∨(-overq))-fuzzy filters in a BL-algebra [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(10): 104-110. |
[14] | LIN Ping-feng. Non-solvabla elements of semigroup PΓ(Λ×Λ)of binary relations determined by the semilattice Γ on the set Λ [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(2): 12-15. |
[15] | PENG Jia-yin. [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(2): 119-126. |
|