Homomorphic相关论文
针对污染和重放攻击提出一个新的多源网络编码签名算法,利用同态加密算法构造签名方案来抵御污染攻击,通过引入消息代的序号,防止......
用非λ/4膜系的观点设计和制造了冷光膜,给出了非λ/4膜厚冷光膜的光谱反射率曲线,并成功地应用于冷光膜的生产。......
在AFS代数和AFS结构的基础上,用EI代数和布尔矩阵环之间的一个同态关系,证明了与每个布尔矩阵对应的所有概念在EI代数上形成一个子代......
In CRYPTO' 13,Gentry et al.proposed a fully homomorphic encryption scheme,called GSW.We find that the scheme has three sp......
In this work, the homomorphism ofthe classic linear block code in linear networkcoding for the case of binary field and ......
首先用同态增晰方法,对包含车牌字符区域图像增强,压缩其他区域图像,然后用遗传算法搜索众多可能区域,并最终确定字符区域.实验证......
为检查云存储服务中提供商是否按服务等级协议的约定完整地存储了多个文件副本,提出了一种基于同态Hash的动态多副本持有性证明方......
沙尘天气下采集得到的图像会呈现对比度下降、图像动态范围被压缩造成模糊不清等问题。针对在沙尘图像增强处理时传统单一图像增强......
首先利用代数中幺半群的概念给出了模糊逻辑系统专业领域的概念,建立专业领域概念的目的是为了规范模糊逻辑系统中语言变量的取值范......
In recent years, opportunities for using cloud services as computing resources have increased and there is a concern tha......
群同态是群论研究的主要问题,F2上的半群同态也一直是群论研究者关注的热点问题。为探讨二阶线性半群间的同态问题,本文在引进标准型......
The most significant practical challenge for face recognition is perhaps variability in lighting intensity. In this pape......
Homomorphic encryption schemes make it possible to perform arithmetic operations, like additions and multiplications, ov......
Security insurance is a paramount cloud services issue in the most recent decade. Therefore, Mapreduce which is a progra......
At present study, homomorphic encryption scheme is most focusing on algorithm efficiency and security and the rare for h......
A method of cooperative relay selection based on network coding security is proposed for relay selection problem of coop......
Homomorphic Hashing Verification for Wireless Sensor Networks Rateless Codes Over-the-Air Programmin
The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air ......
There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreem......
本文讨论了加法可逆半环的强理想、同态核与同余的关系,进而证明了同态基本定理与第一、第二同构定理,讨论了商半环的子半环与理想......
The public key of the integer homomorphic encryption scheme which was proposed by Van Dijk et al. is long, so the scheme......
Broadcast encryption (BE) allows a sender to broadcast its message to a set of receivers in a single ciphertext. However......