Citation: | ZHAI Jiaqi, LIU Jian, CHEN Lusheng, et al., “MSK-PK: A Public-Key Encryption Cryptosystem with Multiple Secret-Keys,” Chinese Journal of Electronics, vol. 31, no. 4, pp. 764-772, 2022, doi: 10.1049/cje.2020.00.049 |
[1] |
R. Ahlswede, N. Cai, S. Y. R. Li, et al., “Network information flow,” IEEE Transactions on Information Theory, vol.46, no.4, pp.1204–1216, 2000. doi: 10.1109/18.850663
|
[2] |
S. Y. R. Li, R. W. Yeung, and N. Cai, “Linear network coding,” IEEE Transactions on Information Theory, vol.49, no.2, pp.371–381, 2003. doi: 10.1109/TIT.2002.807285
|
[3] |
S. Jaggi, P. Sanders, P. A. Chou, et al., “Polynomial time algorithms for multicast network code construction,” IEEE Transactions on Information Theory, vol.51, no.6, pp.1973–1982, 2005. doi: 10.1109/TIT.2005.847712
|
[4] |
N. Cai and R. W. Yeung, “Secure network coding,” IEEE International Symposium on Information Theory, Lausanne, Switzerland, DOI: 10.1109/ISIT.2002.1023595, 2002.
|
[5] |
S. Agrawal and D. Boneh, “Homomorphic MACs: MAC-based integrity for network coding,” 7th International Conference on Applied Cryptography and Network Security (ACNS 2009), Paris, France, pp.292–305, 2009.
|
[6] |
D. Boneh, D. Freeman, J. Katz, et al., “Signing a linear subspace: Signature schemes for network coding,” International Workshop on Public Key Cryptography (PKC 2009), Irvine, CA, USA, pp.68–87, 2009.
|
[7] |
K. Bhattad and K. R. Narayanan, “Weakly secure network coding,” availabel at: https://www.researchgate.net/publication/248407006_Weakly_Secure_Network_Coding, 2005.
|
[8] |
D. Boneh, C. Gentry, and B. Waters, “Collusion resistant broadcast sencryption with short ciphertexts and private keys,” 25th Annual Int. Cryptology Conference (CRYPTO 2005), Santa Barbara, CA, USA, pp.258–275, 2005.
|
[9] |
A. Fiat and M. Naor, “Broadcast encryption,” 13th Annual International Cryptology Conference (CRYPTO’ 93), Santa Barbara, CA, USA, pp.480–491, 2007.
|
[10] |
Q. Wu, B. Qin, L. Zhang, et al., “Contributory broadcast encryption with efficient encryption and short ciphertexts,” IEEE Transactions on Computers, vol.65, no.2, pp.466–479, 2016. doi: 10.1109/TC.2015.2419662
|
[11] |
M. Ajtai, “Generating hard instances of lattice problems (extended abstract),” The 28th Annual ACM Symposium on Theory of Computing (STOC96), Philadelphia, PA, USA, pp.99–108, 1996.
|
[12] |
O. Goldreich, Studies in Complexity and Cryptography - Miscellanea on the Interplay between Randomness and Computation, Berlin, Heidelberg: Springer, 2011.
|
[13] |
Z. Liu, Y. Han, X. Yang, et al., “A generalized signcryption scheme based on LWE over rings,” Acta Electonica Sinica, vol.49, no.7, pp.1314–1322, 2021. (in Chinese)
|
[14] |
L. Wu, Y. Han, X. Yang, et al., “Robust threshold proxy re-encryption scheme from ideal lattices,” Acta Electonica Sinica, vol.48, no.9, pp.1786–1794, 2020. (in Chinese)
|
[15] |
M. Ajtai and C. Dwork, “A public-key cryptosystem with worst-case/average-case equivalence,” The 29th Annual ACM Symposium on Theory of Computing (STOC’97), El Paso, TX, USA, pp.284–293, 1997.
|
[16] |
O. Goldreich, S. Goldwasser, and S. Halevi, “Public-key cryptosystems from lattice reduction problems,” 17th Annual International Cryptology Conference (CRYPTO’97), Santa Barbara, California, USA, pp.112–131, 1997.
|
[17] |
J. Hoffstein, J. Pipher, and J. H. Silverman, “NTRU: A ring-based public key cryptosystem,” International Algorithmic Number Theory Symposium (ANTS 1998), Portland, OR, USA, pp.267–288, 1998.
|
[18] |
C. Gentry, “A fully homomorphic encryption scheme,” PhD Thesis, Stanford University, USA, 2009.
|
[19] |
C. Gentry, “Fully homomorphic encryption using ideal lattices,” The 41st Annual ACM Symposium on Theory of Computing (STOC’09), Bethesda, MD, USA, pp.169–178, 2009.
|
[20] |
M. Coglianese and B. M. Goi, “MaTRU: A new NTRU-based cryptosystem,” 6th International Conference on Cryptology in India (INDOCRYPT 2005), Bangalore, India, pp.232–243, 2005.
|
[21] |
D. Micciancio and O. Regev, “Worst-case to average-case reductions based on Gaussian measures,” SIAM Journal on Computing, vol.37, no.1, pp.267–302, 2007. doi: 10.1137/S0097539705447360
|
[22] |
J. Katz and Y. Lindell, Introduction to Modern Cryptography: Principles and Protocols, 1st ed., Chapman and Hall/CRC, 2007.
|
[23] |
M. Bellare and P. Rogaway, “Optimal asymmetric encryption,” Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT’94), Perugia, Italy, pp.92–111, 1995.
|
[24] |
V. Shoup, “OAEP reconsidered,” Journal of Cryptology, vol.15, pp.223–249, 2002.
|
[25] |
A. K. Lenstra, H. W. Lenstra, and L. Lovász, “Factoring polynomials with rational coefficients,” Mathematische Annalen, vol.261, no.4, pp.515–534, 1982. doi: 10.1007/BF01457454
|
[26] |
L. Babai, “On Lovász’ lattice reduction and the nearest lattice point problem,” Combinatorica, vol.6, no.1, pp.1–13, 1986. doi: 10.1007/BF02579403
|