首页 > 最新文献

Groups Complexity Cryptology最新文献

英文 中文
Cryptanalysis of a hash function, and the modular subset sum problem 哈希函数的密码分析,以及模子集和问题
Q4 MATHEMATICS Pub Date : 2019-05-01 DOI: 10.1515/gcc-2019-2001
C. Monico
Abstract Recently, Shpilrain and Sosnovski proposed a hash function based on composition of affine maps. In this paper, we show that this hash function with its proposed parameters is not weak collision resistant, for plaintexts of size at least 1.9MB (about 2 24 {2^{24}} bits). Our approach is to reduce the preimage problem to a (very) high density instance of the Random Modular Subset Sum Problem, for which we give an algorithm capable of solving instances of the resulting size. Specifically, given plaintexts of about 1.9MB, we were able to produce other plaintexts of the same size with the same hash value in about 13 hours each, on average.
最近,Shpilrain和Sosnovski提出了一种基于仿射映射复合的哈希函数。在本文中,我们证明了该哈希函数及其提出的参数对于大小至少为1.9MB(约224{2^{24}}位)的明文不是弱抗碰撞的。我们的方法是将预像问题简化为随机模子集和问题的一个(非常)高密度实例,为此我们给出了一个能够求解结果大小实例的算法。具体来说,给定大约1.9MB的明文,我们能够平均在大约13小时内生成具有相同散列值的相同大小的其他明文。
{"title":"Cryptanalysis of a hash function, and the modular subset sum problem","authors":"C. Monico","doi":"10.1515/gcc-2019-2001","DOIUrl":"https://doi.org/10.1515/gcc-2019-2001","url":null,"abstract":"Abstract Recently, Shpilrain and Sosnovski proposed a hash function based on composition of affine maps. In this paper, we show that this hash function with its proposed parameters is not weak collision resistant, for plaintexts of size at least 1.9MB (about 2 24 {2^{24}} bits). Our approach is to reduce the preimage problem to a (very) high density instance of the Random Modular Subset Sum Problem, for which we give an algorithm capable of solving instances of the resulting size. Specifically, given plaintexts of about 1.9MB, we were able to produce other plaintexts of the same size with the same hash value in about 13 hours each, on average.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"17 1","pages":"17 - 23"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77009205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Frontmatter
Q4 MATHEMATICS Pub Date : 2019-05-01 DOI: 10.1515/gcc-2019-frontmatter1
{"title":"Frontmatter","authors":"","doi":"10.1515/gcc-2019-frontmatter1","DOIUrl":"https://doi.org/10.1515/gcc-2019-frontmatter1","url":null,"abstract":"","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88926880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of 2-dimensional projective linear groups by the group order and the set of numbers of its elements of each order 二维射影线性群的群阶识别及其每阶元素的个数集合
Q4 MATHEMATICS Pub Date : 2018-11-01 DOI: 10.1515/gcc-2018-0011
Alireza Khalili Asboei
Abstract In a finite group G, let π e ⁢ ( G ) {pi_{e}(G)} be the set of orders of elements of G, let s k {s_{k}} denote the number of elements of order k in G, for each k ∈ π e ⁢ ( G ) {kinpi_{e}(G)} , and then let nse ⁡ ( G ) {operatorname{nse}(G)} be the unordered set { s k : k ∈ π e ⁢ ( G ) } {{s_{k}:kinpi_{e}(G)}} . In this paper, it is shown that if | G | = | L 2 ⁢ ( q ) | {lvert Grvert=lvert L_{2}(q)rvert} and nse ⁡ ( G ) = nse ⁡ ( L 2 ⁢ ( q ) ) {operatorname{nse}(G)=operatorname{nse}(L_{2}(q))} for some prime-power q, then G is isomorphic to L 2 ⁢ ( q ) {L_{2}(q)} .
文摘在有限群G,让πe⁢(G) { pi_ {e} (G)}是G的组的元素,让年代k {s_ {k}}表示元素的个数k在G,每个k∈πe⁢(G) {k pi_ {e} (G)},然后让了无⁡(G) { operatorname{了无}(G)}是无序集{年代k: k∈πe⁢(G)} { {s_ {k}: k pi_ {e} (G) }}。本文证明了对于某些素数幂q,如果| G | = | l2¹(q) | {lvert Grvert=lvert L_{2}(q)rvert}且nse (G)= nse (l2¹¹(q)) {operatorname{nse}(G)=operatorname{nse}(L_{2}(q))},则G同态于l2¹(q) {L_{2}(q)}。
{"title":"Recognition of 2-dimensional projective linear groups by the group order and the set of numbers of its elements of each order","authors":"Alireza Khalili Asboei","doi":"10.1515/gcc-2018-0011","DOIUrl":"https://doi.org/10.1515/gcc-2018-0011","url":null,"abstract":"Abstract In a finite group G, let π e ⁢ ( G ) {pi_{e}(G)} be the set of orders of elements of G, let s k {s_{k}} denote the number of elements of order k in G, for each k ∈ π e ⁢ ( G ) {kinpi_{e}(G)} , and then let nse ⁡ ( G ) {operatorname{nse}(G)} be the unordered set { s k : k ∈ π e ⁢ ( G ) } {{s_{k}:kinpi_{e}(G)}} . In this paper, it is shown that if | G | = | L 2 ⁢ ( q ) | {lvert Grvert=lvert L_{2}(q)rvert} and nse ⁡ ( G ) = nse ⁡ ( L 2 ⁢ ( q ) ) {operatorname{nse}(G)=operatorname{nse}(L_{2}(q))} for some prime-power q, then G is isomorphic to L 2 ⁢ ( q ) {L_{2}(q)} .","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"12 1","pages":"111 - 118"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79527366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frontmatter
Q4 MATHEMATICS Pub Date : 2018-11-01 DOI: 10.1515/gcc-2018-frontmatter2
{"title":"Frontmatter","authors":"","doi":"10.1515/gcc-2018-frontmatter2","DOIUrl":"https://doi.org/10.1515/gcc-2018-frontmatter2","url":null,"abstract":"","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78562958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two general schemes of algebraic cryptography 代数密码学的两个一般方案
Q4 MATHEMATICS Pub Date : 2018-10-11 DOI: 10.1515/gcc-2018-0009
V. Roman’kov
Abstract In this paper, we introduce two general schemes of algebraic cryptography. We show that many of the systems and protocols considered in literature that use two-sided multiplications are specific cases of the first general scheme. In a similar way, we introduce the second general scheme that joins systems and protocols based on automorphisms or endomorphisms of algebraic systems. Also, we discuss possible applications of the membership search problem in algebraic cryptanalysis. We show how an efficient decidability of the underlined membership search problem for an algebraic system chosen as the platform can be applied to show a vulnerability of both schemes. Our attacks are based on the linear or on the nonlinear decomposition method, which complete each other. We give a couple of examples of systems and protocols known in the literature that use one of the two introduced schemes with their cryptanalysis. Mostly, these protocols simulate classical cryptographic schemes, such as Diffie–Hellman, Massey–Omura and ElGamal in algebraic setting. Furthermore, we show that, in many cases, one can break the schemes without solving the algorithmic problems on which the assumptions are based.
摘要本文介绍了代数密码的两种一般方案。我们表明,文献中考虑的许多使用双边乘法的系统和协议是第一种一般方案的具体情况。以类似的方式,我们引入了第二种基于代数系统的自同构或自同态连接系统和协议的一般方案。同时,讨论了隶属度搜索问题在代数密码分析中的可能应用。我们展示了如何有效地确定一个代数系统作为平台的下划线成员搜索问题,可以应用于显示两种方案的脆弱性。我们的攻击是基于线性或非线性分解方法,这是相互完成的。我们给出了一些文献中已知的系统和协议的例子,这些系统和协议使用了所介绍的两种方案中的一种进行密码分析。这些协议大多是在代数环境下模拟经典密码方案,如Diffie-Hellman、Massey-Omura和ElGamal。此外,我们表明,在许多情况下,人们可以在不解决假设所基于的算法问题的情况下打破方案。
{"title":"Two general schemes of algebraic cryptography","authors":"V. Roman’kov","doi":"10.1515/gcc-2018-0009","DOIUrl":"https://doi.org/10.1515/gcc-2018-0009","url":null,"abstract":"Abstract In this paper, we introduce two general schemes of algebraic cryptography. We show that many of the systems and protocols considered in literature that use two-sided multiplications are specific cases of the first general scheme. In a similar way, we introduce the second general scheme that joins systems and protocols based on automorphisms or endomorphisms of algebraic systems. Also, we discuss possible applications of the membership search problem in algebraic cryptanalysis. We show how an efficient decidability of the underlined membership search problem for an algebraic system chosen as the platform can be applied to show a vulnerability of both schemes. Our attacks are based on the linear or on the nonlinear decomposition method, which complete each other. We give a couple of examples of systems and protocols known in the literature that use one of the two introduced schemes with their cryptanalysis. Mostly, these protocols simulate classical cryptographic schemes, such as Diffie–Hellman, Massey–Omura and ElGamal in algebraic setting. Furthermore, we show that, in many cases, one can break the schemes without solving the algorithmic problems on which the assumptions are based.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"20 1","pages":"83 - 98"},"PeriodicalIF":0.0,"publicationDate":"2018-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80824720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Garside theory and subsurfaces: Some examples in braid groups Garside理论与次曲面:编织群中的一些例子
Q4 MATHEMATICS Pub Date : 2018-07-04 DOI: 10.1515/gcc-2019-2007
S. Schleimer, B. Wiest
Abstract Garside-theoretical solutions to the conjugacy problem in braid groups depend on the determination of a characteristic subset of the conjugacy class of any given braid, e.g. the sliding circuit set. It is conjectured that, among rigid braids with a fixed number of strands, the size of this set is bounded by a polynomial in the length of the braids. In this paper we suggest a more precise bound: for rigid braids with N strands and of Garside length L, the sliding circuit set should have at most C⋅LN-2{Ccdot L^{N-2}} elements, for some constant C. We construct a family of braids which realise this potential worst case. Our example braids suggest that having a large sliding circuit set is a geometric property of braids, as our examples have multiple subsurfaces with large subsurface projection; thus they are “almost reducible” in multiple ways, and act on the curve graph with small translation distance.
摘要编织群共轭问题的Garside-theoretical解依赖于任意给定编织的共轭类的特征子集的确定,例如滑动电路集。我们推测,在固定束数的刚性辫子中,该集合的大小以辫子长度的多项式为界。在本文中,我们提出了一个更精确的界:对于有N条链且Garside长度为L的刚性编织带,对于某个常数C,滑动电路集应该最多有C⋅LN-2{Ccdot L^{N-2}}个元素。我们的示例辫子表明,具有大滑动电路集是辫子的几何性质,因为我们的示例具有具有大次表面投影的多个子表面;因此,它们在多个方面是“几乎可约的”,并且作用于平移距离小的曲线图。
{"title":"Garside theory and subsurfaces: Some examples in braid groups","authors":"S. Schleimer, B. Wiest","doi":"10.1515/gcc-2019-2007","DOIUrl":"https://doi.org/10.1515/gcc-2019-2007","url":null,"abstract":"Abstract Garside-theoretical solutions to the conjugacy problem in braid groups depend on the determination of a characteristic subset of the conjugacy class of any given braid, e.g. the sliding circuit set. It is conjectured that, among rigid braids with a fixed number of strands, the size of this set is bounded by a polynomial in the length of the braids. In this paper we suggest a more precise bound: for rigid braids with N strands and of Garside length L, the sliding circuit set should have at most C⋅LN-2{Ccdot L^{N-2}} elements, for some constant C. We construct a family of braids which realise this potential worst case. Our example braids suggest that having a large sliding circuit set is a geometric property of braids, as our examples have multiple subsurfaces with large subsurface projection; thus they are “almost reducible” in multiple ways, and act on the curve graph with small translation distance.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"119 1","pages":"61 - 75"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79267070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On finitely generated submonoids of virtually free groups 虚自由群的有限生成子半群
Q4 MATHEMATICS Pub Date : 2018-05-21 DOI: 10.1515/gcc-2018-0008
Pedro V. Silva, A. Zakharov
Abstract We prove that it is decidable whether or not a finitely generated submonoid of a virtually free group is graded, introduce a new geometric characterization of graded submonoids in virtually free groups as quasi-geodesic submonoids, and show that their word problem is rational (as a relation). We also solve the isomorphism problem for this class of monoids, generalizing earlier results for submonoids of free monoids. We also prove that the classes of graded monoids, regular monoids and Kleene monoids coincide for submonoids of free groups.
摘要本文证明了虚自由群的有限生成子模群是否是可判别的,引入了虚自由群中的拟测地线子模群的一个新的几何刻划,并证明了它们的字问题是有理的(作为关系)。我们还解决了这类半群的同构问题,推广了之前关于自由半群的次半群的结果。我们还证明了自由群的次模群的梯度模群、正则模群和Kleene模群的类重合。
{"title":"On finitely generated submonoids of virtually free groups","authors":"Pedro V. Silva, A. Zakharov","doi":"10.1515/gcc-2018-0008","DOIUrl":"https://doi.org/10.1515/gcc-2018-0008","url":null,"abstract":"Abstract We prove that it is decidable whether or not a finitely generated submonoid of a virtually free group is graded, introduce a new geometric characterization of graded submonoids in virtually free groups as quasi-geodesic submonoids, and show that their word problem is rational (as a relation). We also solve the isomorphism problem for this class of monoids, generalizing earlier results for submonoids of free monoids. We also prove that the classes of graded monoids, regular monoids and Kleene monoids coincide for submonoids of free groups.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"43 1","pages":"63 - 82"},"PeriodicalIF":0.0,"publicationDate":"2018-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74186401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Groups whose word problems are not semilinear 文字问题不是半线性的组
Q4 MATHEMATICS Pub Date : 2018-04-25 DOI: 10.1515/gcc-2018-0010
R. Gilman, Robert P. Kropholler, S. Schleimer
Abstract Suppose that G is a finitely generated group and WP ⁡ ( G ) {operatorname{WP}(G)} is the formal language of words defining the identity in G. We prove that if G is a virtually nilpotent group that is not virtually abelian, the fundamental group of a finite volume hyperbolic three-manifold, or a right-angled Artin group whose graph lies in a certain infinite class, then WP ⁡ ( G ) {operatorname{WP}(G)} is not a multiple context-free language.
抽象的假设G是一个有限生成组和WP⁡(G) { operatorname {WP} (G)}的正式语言是词汇定义的身份在G .我们证明如果G是一个几乎幂零群实际上不是交换,有限体积的基本组双曲three-manifold,或直角阿廷集团的图在于某种无限的类,然后WP⁡(G) { operatorname {WP} (G)}不是多个上下文无关语言。
{"title":"Groups whose word problems are not semilinear","authors":"R. Gilman, Robert P. Kropholler, S. Schleimer","doi":"10.1515/gcc-2018-0010","DOIUrl":"https://doi.org/10.1515/gcc-2018-0010","url":null,"abstract":"Abstract Suppose that G is a finitely generated group and WP ⁡ ( G ) {operatorname{WP}(G)} is the formal language of words defining the identity in G. We prove that if G is a virtually nilpotent group that is not virtually abelian, the fundamental group of a finite volume hyperbolic three-manifold, or a right-angled Artin group whose graph lies in a certain infinite class, then WP ⁡ ( G ) {operatorname{WP}(G)} is not a multiple context-free language.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"21 1","pages":"53 - 62"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77943612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Orderable groups, elementary theory, and the Kaplansky conjecture 可序群,基本理论,和卡普兰斯基猜想
Q4 MATHEMATICS Pub Date : 2018-04-25 DOI: 10.1515/gcc-2018-0005
B. Fine, A. Gaglione, G. Rosenberger, D. Spellman
Abstract We show that each of the classes of left-orderable groups and orderable groups is a quasivariety with undecidable theory. In the case of orderable groups, we find an explicit set of universal axioms. We then consider the relationship with the Kaplansky group rings conjecture and show that 𝒦 {{mathcal{K}}} , the class of groups which satisfy the conjecture, is the model class of a set of universal sentences in the language of group theory. We also give a characterization of when two groups in 𝒦 {{mathcal{K}}} or more generally two torsion-free groups are universally equivalent.
摘要证明了左可序群和可序群的每一类都是具有不可定理论的拟变。在可序群的情况下,我们找到了一组显式的全称公理。然后,我们考虑了与卡普兰斯基群环猜想的关系,并证明了满足卡普兰斯基群环猜想的群类𝒦{{mathcal{K}}}是群论语言中一组全称句的模型类。我们也给出了𝒦{{mathcal{K}}}中两个群或更一般地两个无扭转群是普遍等价的一个刻画。
{"title":"Orderable groups, elementary theory, and the Kaplansky conjecture","authors":"B. Fine, A. Gaglione, G. Rosenberger, D. Spellman","doi":"10.1515/gcc-2018-0005","DOIUrl":"https://doi.org/10.1515/gcc-2018-0005","url":null,"abstract":"Abstract We show that each of the classes of left-orderable groups and orderable groups is a quasivariety with undecidable theory. In the case of orderable groups, we find an explicit set of universal axioms. We then consider the relationship with the Kaplansky group rings conjecture and show that 𝒦 {{mathcal{K}}} , the class of groups which satisfy the conjecture, is the model class of a set of universal sentences in the language of group theory. We also give a characterization of when two groups in 𝒦 {{mathcal{K}}} or more generally two torsion-free groups are universally equivalent.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"31 1","pages":"43 - 52"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81694530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practical private-key fully homomorphic encryption in rings 环中实用的私钥全同态加密
Q4 MATHEMATICS Pub Date : 2018-04-19 DOI: 10.1515/gcc-2018-0006
A. Gribov, Delaram Kahrobaei, V. Shpilrain
Abstract We describe a practical fully homomorphic encryption (FHE) scheme based on homomorphisms between rings and show that it enables very efficient computation on encrypted data. Our encryption though is private-key; public information is only used to operate on encrypted data without decrypting it. Still, we show that our method allows for a third party search on encrypted data.
摘要提出了一种实用的基于环间同态的全同态加密方案,并证明了该方案能够对加密数据进行高效的计算。我们的加密是私钥;公共信息仅用于对加密数据进行操作而不进行解密。尽管如此,我们证明了我们的方法允许第三方对加密数据进行搜索。
{"title":"Practical private-key fully homomorphic encryption in rings","authors":"A. Gribov, Delaram Kahrobaei, V. Shpilrain","doi":"10.1515/gcc-2018-0006","DOIUrl":"https://doi.org/10.1515/gcc-2018-0006","url":null,"abstract":"Abstract We describe a practical fully homomorphic encryption (FHE) scheme based on homomorphisms between rings and show that it enables very efficient computation on encrypted data. Our encryption though is private-key; public information is only used to operate on encrypted data without decrypting it. Still, we show that our method allows for a third party search on encrypted data.","PeriodicalId":41862,"journal":{"name":"Groups Complexity Cryptology","volume":"36 1","pages":"17 - 27"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74379043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Groups Complexity Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1