[1] ZHENG Yuliang.Digital signcryption or how to achieve cost(signature & encryption)<< cost(signature)+cost(encryption)[C]//Proceedings of the 17th Annual International Cryptology Conference.Berlin,Germany:Springer,1997:165-179. [2] CHEN Zhenyu,YANG Yang,JI Sai,et al.Semi-quantum key agreement based on delegating quantum computation mode[J].Computer Engineering,2018,44(3):178-181,188.(in Chinese)陈振宇,杨阳,季赛,等.基于量子委托计算模式的半量子密钥协商[J].计算机工程,2018,44(3):178-181,188. [3] XU Quanzuo,CAI Qingjun.Research on parameter selection of a code-based public-key cryptosystem[J].Netinfo Security,2014(10):54-58.(in Chinese)徐权佐,蔡庆军.一种基于编码的公钥密码体制的参数选择研究[J].信息网络安全,2014(10):54-58. [4] TANG Haiting,WANG Xueming.An attribute multiple encryption scheme based on lattices[J].Computer Engineering,2018,44(2):193-196.(in Chinese)汤海婷,汪学明.一种基于格的属性多重加密方案[J].计算机工程,2018,44(2):193-196. [5] ZHANG Huanguo,GUAN Haiming,WANG Houzhen.The challenge of quantum computing to information security and our countermeasures[J].Journal of Yunnan University Nationalities(Natural Sciences Edition),2011,20(5):388-395.(in Chinese)张焕国,管海明,王后珍.量子计算的挑战与思考[J].云南民族大学学报(自然科学版),2011,20(5):388-395. [6] GUO Qiuling,XIANG Hong,CAI Bin,et al.Threshold ring signature scheme based on multivariate public key cryptosystems[J].Journal of Cryptologic Research,2018,5(2):140-150.(in Chinese)郭秋玲,向宏,蔡斌,等.基于多变量公钥密码体制的门限环签名方案[J].密码学报,2018,5(2):140-150. [7] MCELIECE R J.A public-key cryptosystem based on algebraic coding theory[J].DSN Progress Report,1978,42(44):114-116. [8] NIEDERREITER H.Knapsack-type cryptosystems and algebraic coding theory[J].Problems of Control and Information Theory,1986,15(2):159-166. [9] ZHANG Jun.Coding construction and decoding and its application in cryptography[D].Tianjin:Nankai University,2014.(in Chinese)张俊.编码的构造与译码问题及其在密码学中的应用[D].天津:南开大学,2014. [10] LI Zehui,YANG Yatao,LI Zichen.New public key cryptography based on QC-MDPC code[J].Application Research of Computers,2015,32(3):881-884.(in Chinese)李泽慧,杨亚涛,李子臣.基于QC-MDPC码的公钥密码方案设计[J].计算机应用研究,2015,32(3):881-884. [11] CAO Dong,ZHAO Shengmei,SONG Yaoliang.Quantum McEliece public-key cryptosystem based on quantum QC-LDPC codes[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science),2011,31(2):64-68.(in Chinese)曹东,赵生妹,宋耀良.一种基于量子准循环LDPC码的McEliece公钥密码算法[J].南京邮电大学学报(自然科学版),2011,31(2):64-68. [12] WANG Yanli.Research on McEliece public key cryptosystem based on QC-LDPC code[D].Xi'an:Xidian University,2013.(in Chinese)王延丽.基于QC-LDPC码的McEliece公钥密码体制研究[D].西安:西安电子科技大学,2013. [13] ZHANG Ying,YUE Dianwu.Public key cryptosystem based on algebraic geometric codes[J].Journal on Communications,2008,29(6):75-81.(in Chinese)张颖,岳殿武.基于代数几何码的公钥密码体制[J].通信学报,2008,29(6):75-81. [14] LI Chong,HAN Yiliang.A double public key Niedereiter cipher scheme based on QC-LDPC code[J].Application Research of Computers,2016,33(11):3446-3449,3454.(in Chinese)李冲,韩益亮.基于QC-LDPC码的双公钥Niederreiter密码方案[J].计算机应用研究,2016,33(11):3446-3449,3454. [15] WANG Zhong,HAN Yiliang.Dual public-key cryptographic scheme based on improved Niederreiter cryptosystem[J].Journal of Computer Applications,2019,39(7):1997-2000.(in Chinese)王众,韩益亮.基于改进版Niederreiter的双公钥密码方案[J].计算机应用,2019,39(7):1997-2000. [16] XINMEI W.Digital signature scheme based on error-correcting codes[J].Electronics Letters,1990,26(13):898-899. [17] FAN Wuying,REN Fang.Survey of pseudo-random sequence generation techniques based on syndrome decoding problem[J].Journal of Xi'an University of Posts and Telecommunications,2017,22(2):1-6.(in Chinese)范武英,任方.基于校验子译码问题的伪随机序列研究综述[J].西安邮电大学学报,2017,22(2):1-6. [18] WANG Xinmei.Modification of the digital signature scheme based on error-correcting codes[J].Acta Electronica Sinica,2000(2):110-112.(in Chinese)王新梅.纠错码数字签名方案的修正[J].电子学报,2000(2):110-112. [19] LI Huixian,CHEN Xubao,PANG Liaojun,et al.Certificateless multi-receiver signcryption scheme based on multivariate public key cryptography[J].Chinese Journal of Computers,2012,35(9):1881-1889.(in Chinese)李慧贤,陈绪宝,庞辽军,等.基于多变量公钥密码体制的无证书多接收者签密体制[J].计算机学报,2012,35(9):1881-1889. [20] YUNG M.Practical signcryption[M].Berlin,Germany:Springer,2010. [21] YANG Leixin,DU Weizhang.The improvement of Niederreiter public key cryptosystem by using dual public-key[J].Journal of Changsha University of Science and Technology(Natural Science),2010,7(4):74-77.(in Chinese)杨磊鑫,杜伟章.利用双公钥的Niederreiter公钥密码体制的改进[J].长沙理工大学学报(自然科学版),2010,7(4):74-77. [22] LI Yuanxing,WANG Xinmei.On the security and parameter optimization of Niedereiter public key cryptosystem[J].Acta Electronica Sinica,1993,21(7):33-36.(in Chinese)李元兴,王新梅.关于代数码Niederreiter公钥密码体制的安全性及参数优化[J].电子学报,1993,21(7):33-36. |