参考文献
[1]Diffie W,Hellman M E.New Directions in Cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
[2]贺卫红,曹毅.RSA公钥密码体制在数字签名中的应用[J].微机发展,2003,13(9):49-50.
[3]陈泽文,张龙军,王育民,等.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065.
[4]杨君辉,张玉峰,戴宗铎.一个基于两个数学难题的签名方案的分析[J].信息安全与通信保密,1999(4):42-43.
[5]Shor P W.Polynomial-time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer[J].SIAM Review,1999,41(2):303-332.
[6]Ajtai M.Generating Hard Instances of Lattice Pro-blems[C]//Proceedings of the 28th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,1996:99-108.
[7]Goldreich O,Goldwasser S,Halevi S.Public-key Cryptosystems from Lattice Reduction Problems[C]//Proceedings of Annual International Cryptology Conference.Berlin,Germany:Springer-Verlag,1997:112-131.
[8]Gentry C,Peikert C,Vaikuntanathan V.Trapdoors for Hard Lattices and New Cryptographic Construc-tions[C]//Proceedings of the 14th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,2008:197-206.
[9]Agrawal S,Boneh D,Boyen X.Efficient Lattice(H) IBE in the Standard Model[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer-Verlag,2010:553-572.
[10]杨晓元,吴立强,张敏情,等.基于 R-LWE 的公钥加密方案[J].通信学报,2013,34(2):23-30.
[11]杨丹婷,许春根,徐磊,等.理想格上基于身份的签名方案[J].密码学报,2015,2(4):306-316.
[12]Micciancio D,Peikert C.Trapdoors for Lattices:Simpler,Tighter,Faster,Smaller[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer-Verlag,2012:700-718.
[13]Lai R W F,Cheung H K F,Chow S S M.Trapdoors for Ideal Lattices with Applications[C]//Proceedings of Information Security and Cryptology.Berlin,Germany:Springer-Verlag,2014:239-256.
[14]Lyubashevsky V,Peikert C,Regev O.On Ideal Lattices and Learning with Errors over Rings[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer-Verlag,2010:1-23.
[15]Regev O.On Lattices,Learning with Errors,Random Linear Codes,and Cryptography[J].Journal of the ACM,2009,56(6):34.
[16]Lyubashevsky V,Peikert C,Regev O.A Toolkit for Ring-LWE Cryptography[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer-Verlag,2013:35-54.
[17]Brakerski Z,Vaikuntanathan V.Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages[C]//Proceedings of Annual Cryptology Conference.Berlin,Germany:Springer-Verlag,2011:505-524.
[18]Goldwasser S,Micali S,Rivest R L.A Digital Signature Scheme Secure Against Adaptive Chosen-message Attacks[J].SIAM Journal on Computing,1988,17(2):281-308.
编辑刘冰 |