Journal on Communications ›› 2022, Vol. 43 ›› Issue (12): 172-187.doi: 10.11959/j.issn.1000-436x.2022190
• Comprehensive Reviews • Previous Articles Next Articles
Yuanbo GUO, Anqi YIN
Revised:
2022-09-13
Online:
2022-12-25
Published:
2022-12-01
Supported by:
CLC Number:
Yuanbo GUO, Anqi YIN. Research on password-authenticated key exchange protocol over lattices[J]. Journal on Communications, 2022, 43(12): 172-187.
"
协议名称 | 通信轮(次)数 | 抗量子 | 安全模型 | 计算类型 | 随机预言机 | SS-NIZK | 认证方式 | |
用户端 | 服务器端 | |||||||
文献[ | 3轮(3次) | √ | IND-CCA2 | IND-CCA2 | 小整数模乘/加 | × | × | 显式认证 |
文献[ | 3轮(3次) | √ | IND-CPA | IND-CCA2 | 小整数模乘/加 | × | × | 显式互认证 |
文献[ | 2轮(2次) | √ | IND-CCA2 | IND-CCA2 | 小整数模乘/加 | √ | √ | 隐式认证 |
文献[ | 2轮(2次) | √ | IND-CCA2 | IND-CPA | 小整数模乘/加 | × | × | 隐式认证 |
文献[ | 2轮(2次) | √ | IND-CPA | IND-CCA2 | 小整数模乘/加 | × | × | 隐式认证 |
文献[ | 1轮(2次) | × | IND-CCA2 | IND-CCA2 | 大整数模幂 | √ | √ | 隐式认证 |
文献[ | 1轮(2次) | √ | IND-CCA2 | IND-CCA2 | 小整数模乘/加 | √ | √ | 隐式认证 |
文献[ | 1轮(2次) | √ | IND-CCA2 | IND-CCA2 | 小整数模乘/加 | √ | √ | 隐式认证 |
[9] | BOYKO V , MACKENZIE P , PATEL S . Provably secure password-authenticated key exchange using diffie-Hellman[C]// Advances in Cryptology — EUROCRYPT 2000. Berlin:Springer, 2000: 156-171. |
[10] | KATZ J , OSTROVSKY R , YUNG M . Efficient passwordauthenticated key exchange using human-memorable passwords[C]// Lecture Notes in Computer Science. Berlin:Springer, 2001: 475-494. |
[11] | GENNARO R , LINDELL Y . A framework for password-based authenticated key exchange1[J]. ACM Transactions on Information and System Security (TISSEC), 2006,9(2): 181-234. |
[12] | JIANG S , GONG G . Password based key exchange with mutual authentication[C]// International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2004: 267-279. |
[13] | GROCE A , KATZ J . A new framework for efficient password-based authenticated key exchange[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. New York:ACM Press, 2010: 516-525. |
[14] | SHOR P W , . Algorithms for quantum computation:discrete logarithms and factoring[C]// Proceedings 35th Annual Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 1994: 124-134. |
[1] | 汪定 . 口令安全关键问题研究[D]. 北京:北京大学, 2017. |
WANG D . Research on key issues in password security[D]. Beijing:Peking University, 2017. | |
[15] | ROSS O H M . A review of quantum-inspired metaheuristics:going from classical computers to real quantum computers[J]. IEEE Access, 2019,8: 814-838. |
[16] | 牟雁飞 . 基于格的数字签名和认证协议研究[D]. 上海:复旦大学, 2014. |
MOU Y F . Research in lattice-based digital signature and identification protocols[D]. Shanghai:Fudan University, 2014. | |
[17] | 张彦华 . 基于格的若干密码方案的设计与分析[D]. 西安:西安电子科技大学, 2017. |
[2] | 张效林, 谷大武, 张驰 . 移动平台典型应用的身份认证问题研究[J]. 网络与信息安全学报, 2020,6(6): 137-151. |
ZHANG X L , GU D W , ZHANG C . Issues of identity verification of typical applications over mobile terminal platform[J]. Chinese Journal of Network and Information Security, 2020,6(6): 137-151. | |
[17] | ZHANG Y H . Design and analysis of several lattice-based cryptographic schemes[D]. Xi’an:Xidian University, 2017. |
[18] | MERKLE R C , . Protocols for public key cryptosystems[C]// Proceedings of 1980 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 1980:122. |
[3] | 汪定, 邹云开, 陶义 ,等. 基于循环神经网络和生成式对抗网络的口令猜测模型研究[J]. 计算机学报, 2021,44(8): 1519-1534. |
WANG D , ZOU Y K , TAO Y ,et al. Password guessing based on recurrent neural networks and generative adversarial networks[J]. Chinese Journal of Computers, 2021,44(8): 1519-1534. | |
[19] | 宋永成, 黄欣沂, 伍玮 ,等. 基于编码的数字签名综述[J]. 网络与信息安全学报, 2021,7(4): 1-17. |
SONG Y C , HUANG X Y , WU W ,et al. Survey of code-based digital signatures[J]. Chinese Journal of Network and Information Security, 2021,7(4): 1-17. | |
[4] | 郭宓文. 密码,让百姓生活更安全[N]. 人民日报, 2021. |
GUO B W . Password,let people live more secure[N]. The People’s Daily, 2021. | |
[20] | PATARIN J , . Hidden fields equations (HFE) and isomorphisms of polynomials (IP):two new families of asymmetric algorithms[C]// Advances in Cryptology — EUROCRYPT ’96. Berlin:Springer, 1996: 33-48. |
[21] | NEJATOLLAHI H , DUTT N , RAY S ,et al. Post-quantum lattice-based cryptography implementations[J]. ACM Computing Surveys, 2019,51(6): 1-41. |
[5] | MIT Technology Review 2022年“全球十大突破性技术”解读[J]. 中国科学基金, 2022(3): 432-446. |
Interpretation of 2022 MIT technology review’s top 10 breakthrough technologies[J]. Bulletin of National Natural Science Foundation of China, 2022(3): 432-446. | |
[6] | SHIN J S , JO M , HWANG J Y ,et al. A verifier-based password-authenticated key exchange using tamper-proof hardware[J]. The Computer Journal, 2021,64(8): 1293-1302. |
[7] | WU T D , . The secure remote password protocol[C]// Proceedings of Internet Society 1997 Symposium on Network and Distributed System Security. Piscataway:IEEE Press, 1997: 97-111. |
[22] | ASIF R . Post-quantum cryptosystems for Internet-of-things:a survey on lattice-based algorithms[J]. IoT, 2021,2(1): 71-91. |
[23] | SEYHAN K , NGUYEN T N , AKLEYLEK S ,et al. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world:a survey[J]. Cluster Computing, 2022,25(3): 1729-1748. |
[24] | ALAYA B , LAOUAMER L , MSILINI N . Homomorphic encryption systems statement:trends and challenges[J]. Computer Science Review, 2020,36:100235. |
[25] | ALAGIC G , ALPERIN-SHERIFF J ,, APON D , et al . Status report on the second round of the NIST post-quantum cryptography standardization process[R]. NIST, 2020. |
[26] | BELLARE M , POINTCHEVAL D , ROGAWAY P . Authenticated key exchange secure against dictionary attacks[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2000: 139-155. |
[27] | BRESSON E , CHEVASSUT O , POINTCHEVAL D . Security proofs for an efficient password-based key exchange[C]// Proceedings of the 10th ACM Conference on Computer and Communications Security. New York:ACM Press, 2003: 241-250. |
[28] | MACKENZIE P , PATEL S , SWAMINATHAN R . Passwordauthenticated key exchange based on RSA[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2000: 599-613. |
[29] | ABDALLA M , BENHAMOUDA F , POINTCHEVAL D . Disjunctions for hash proof systems:New constructions and applications[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2015: 69-100. |
[30] | ABDALLA M , CHEVALIER C , POINTCHEVAL D . Smooth projective hashing for conditionally extractable commitments[C]// Advances in Cryptology - CRYPTO 2009. Berlin:Springer, 2009: 671-689. |
[31] | BENHAMOUDA F , BLAZY O , CHEVALIER C ,et al. New techniques for SPHFs and efficient one-round PAKE protocols[C]// Advances in Cryptology – CRYPTO 2013,Berlin:Springer, 2013: 449-475. |
[32] | CANETTI R , HALEVI S , KATZ J ,et al. Universally composable password-based key exchange[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2005: 404-421. |
[33] | KATZ J , VAIKUNTANATHAN V . Round-optimal password-based authenticated key exchange[C]// Theory of Cryptography. Berlin:Springer, 2011: 293-310. |
[34] | MITTELBACH A , FISCHLIN M . The theory of hash functions and random oracles[M]. Cham: Springer International Publishing, 2021. |
[35] | BONEH D , DAGDELEN ? , FISCHLIN M ,et al. Random oracles in a quantum world[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2011: 41-69. |
[36] | CHIESA A , MANOHAR P , SPOONER N . Succinct arguments in the quantum random oracle model[C]// Theory of Cryptography Conference. Berlin:Springer, 2019: 1-29. |
[37] | KATZ J , VAIKUNTANATHAN V . Smooth projective hashing and password-based authenticated key exchange from lattices[C]// Advances in Cryptology - ASIACRYPT 2009. Berlin:Springer, 2009: 636-652. |
[38] | WANG D , WANG P . On the implications of Zipf’s law in passwords[C]// European Symposium on Research in Computer Security. Berlin:Springer, 2016: 111-131. |
[39] | YANG K Y , HU X X , ZHANG Q H ,et al. VAEPass:a lightweight passwords guessing model based on variational auto-encoder[J]. Computers & Security, 2022,114:102587. |
[40] | FUN T S , AHMEDY F , FOO Z M ,et al. Enhanced password-based authentication mechanism in cloud computing with extended honey encryption (XHE):a case study on diabetes dataset[C]// Advances in Computer,Communication and Computational Sciences. Berlin:Springer, 2021: 65-74. |
[41] | PEIKERT C . A decade of lattice cryptography[J]. Foundations and Trends? in Theoretical Computer Science, 2016,10(4): 283-424. |
[42] | BANERJEE A , PEIKERT C , ROSEN A . Pseudorandom functions and lattices[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2012: 719-737. |
[43] | GENTRY C , PEIKERT C , VAIKUNTANATHAN V . Trapdoors for hard lattices and new cryptographic constructions[C]// Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2008: 197-206. |
[44] | LI Z , WANG D . Two-round PAKE protocol over lattices without NIZK[C]// International Conference on Information Security and Cryptology. Berlin:Springer, 2018: 138-159. |
[45] | REGEV O . On lattices,learning with errors,random linear codes,and cryptography[J]. Journal of the ACM, 2009,56(6): 1-40. |
[46] | 叶茂 . 基于格的口令认证密钥交换协议和相关加密算法研究[D]. 郑州:信息工程大学, 2013. |
YE M . Research on password-based authenticated key exchange protocols and associated encryption algorithms from lattices[D]. Zhengzhou:Information Engineering University, 2013. | |
[47] | CRAMER R , SHOUP V . Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2002: 45-64. |
[48] | BENHAMOUDA F , BLAZY O , DUCAS L ,et al. Hash proof systems over lattices revisited[C]// IACR International Workshop on Public Key Cryptography. Berlin:Springer, 2018: 644-674. |
[49] | BELLARE M , ROGAWAY P . Entity authentication and key distribution[C]// Annual International Cryptology Conference. Berlin:Springer, 1993: 232-249. |
[50] | BELLARE M , ROGAWAY P . Provably secure session key distribution:the three party case[C]// Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing. New York:ACM Press, 1995: 57-66. |
[51] | BLAKE-WILSON S , JOHNSON D , MENEZES A . Key agreement protocols and their security analysis[C]// Crytography and Coding. Berlin:Springer, 1997: 30-45. |
[52] | MACKENZIE P . Secure network authentication with password identification[R]. IEEE P1363 Working Group, 1999. |
[53] | GUO Y M , ZHANG Z F , GUO Y J . Anonymous authenticated key agreement and group proof protocol for wearable computing[J]. IEEE Transactions on Mobile Computing, 2022,21(8): 2718-2731. |
[54] | LI Z P , WANG D , MORAIS E . Quantum-safe round-optimal password authentication for mobile devices[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(3): 1885-1899. |
[55] | DING Y , FAN L . Efficient password-based authenticated key exchange from lattices[C]// Proceedings of 2011 Seventh International Conference on Computational Intelligence and Security. Piscataway:IEEE Press, 2011: 934-938. |
[56] | BLAZY O , CHEVALIER C , DUCAS L ,et al. Exact smooth projective hash function based on LWE[J]. Cryptology ePrint Archive, 2013:173107. |
[57] | ZHANG J , YU Y . Two-round PAKE from approximate SPH and instantiations from lattices[C]// International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2017: 37-67. |
[58] | ABDALLA M , BENHAMOUDA F , POINTCHEVAL D . Public-key encryption indistinguishable under plaintext-checkable attacks[J]. IET Information Security, 2016,10(6): 288-303. |
[59] | MICCIANCIO D , PEIKERT C . Trapdoors for lattices:simpler,tighter,faster,smaller[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2012: 700-718. |
[60] | 尹安琪, 曲彤洲, 郭渊博 ,等. 格上基于密文标准语言的可证明安全两轮口令认证密钥交换协议[J]. 电子学报, 2022,50(5): 1140-1149. |
YIN A Q , QU T Z , GUO Y B ,et al. Provably secure two-round PAKE based on ciphertext standard language over lattices[J]. Acta Electronica Sinica, 2022,50(5): 1140-1149. | |
[61] | LI Z P , WANG D . Achieving one-round password-based authenticated key exchange over lattices[J]. IEEE Transactions on Services Computing, 2022,15(1): 308-321. |
[62] | LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2010: 1-23. |
[63] | 叶茂, 胡学先, 刘文芬 . 基于理想格的近似平滑投射 Hash 函数[J]. 信息工程大学学报, 2013,14(1): 13-21. |
YE M , HU X X , LIU W F . Approximate smooth projective hash functions from ideal lattices[J]. Journal of Information Engineering University, 2013,14(1): 13-21. | |
[64] | ATANI R E , ATANI S E , KARBASI A H . A new ring-based SPHF and PAKE protocol on ideal lattices[J]. The ISC International Journal of Information Security, 2019,11(1): 75-86. |
[65] | KATZ J , OSTROVSKY R , YUNG M . Efficient and secure authenticated key exchange using weak passwords[J]. Journal of the ACM, 2009,57(1): 1-39. |
[66] | DING J , ALSAYIGH S , LANCRENON J ,et al. Provably secure password authenticated key exchange based on RLWE for the post-quantum world[C]// Topics in Cryptology – CT-RSA 2017. Berlin:Springer, 2017: 183-204. |
[67] | GAO X , DING J , LIU J ,et al. Post-quantum secure remote password protocol from RLWE problem[C]// International Conference on Information Security and Cryptology. Berlin:Springer, 2017: 99-116. |
[68] | 舒琴, 王圣宝, 路凡义 ,等. 基于理想格的通用可组合两方口令认证密钥交换协议[J]. 电子与信息学报, 2021,43(6): 1756-1763. |
SHU Q , WANG S B , LU F Y ,et al. Universally composable two-party password-based authenticated key exchange from ideal lattices[J]. Journal of Electronics & Information Technology, 2021,43(6): 1756-1763. | |
[69] | FENG Q , HE D B , ZEADALLY S ,et al. Ideal lattice-based anonymous authentication protocol for mobile devices[J]. IEEE Systems Journal, 2019,13(3): 2775-2785. |
[70] | DABRA V , BALA A J , KUMARI S . LBA-PAKE:lattice-based anonymous password authenticated key exchange for mobile devices[J]. IEEE Systems Journal, 2021,15(4): 5067-5077. |
[71] | DING J , SARASWATHY R , ALSAYIGH S ,et al. How to validate the secret of a ring learning with errors (RLWE) key[J]. Cryptology ePrint Archive, 2018:2018/081. |
[72] | DING R Y , CHENG C , QIN Y . Further analysis and improvements of a lattice-based anonymous PAKE scheme[J]. IEEE Systems Journal, 2022,16(3): 5035-5043. |
[73] | GAO X W , DING J T , LI L ,et al. Practical randomized RLWE-based key exchange against signal leakage attack[J]. IEEE Transactions on Computers, 2018,67(11): 1584-1593. |
[74] | WANG Q X , WANG D , CHENG C ,et al. Quantum2FA:efficient quantum-resistant two-factor authentication scheme for mobile devices[J]. IEEE Transactions on Dependable and Secure Computing, 2021,doi:10.1109/TDSC.2021.3129512. |
[75] | ABDALLA M , FOUQUE P A , POINTCHEVAL D . Password-based authenticated key exchange in the three-party setting[C]// Public Key Cryptography - PKC 2005. Berlin:Springer, 2005: 65-84. |
[76] | ALKIM E , DUCAS L , P?PPELMANN T , ,et al. NewHope without reconciliation[J]. Cryptology ePrint Archive, 2016:2016/1157. |
[77] | KEITH M , SHAO B , STEINBART P J . The usability of passphrases for authentication:an empirical field study[J]. International Journal of Human-Computer Studies, 2007,65(1): 17-28. |
[78] | 叶茂, 胡学先, 刘文芬 . 基于格的三方口令认证密钥交换协议[J]. 电子与信息学报, 2013,35(6): 1376-1381. |
YE M , HU X X , LIU W F . Password authenticated key exchange protocol in the three party setting based on lattices[J]. Journal of Electronics & Information Technology, 2013,35(6): 1376-1381. | |
[79] | XU D , HE D , CHOO K-K R ,et al. Provably secure three-party password authenticated key exchange protocol based on ring learning with error[J]. Cryptology ePrint Archive, 2017:173311. |
[80] | 于金霞, 廉欢欢, 汤永利 ,等. 格上基于口令的三方认证密钥交换协议[J]. 通信学报, 2018,39(11): 87-97. |
YU J X , LIAN H H , TANG Y L ,et al. Password-based three-party authenticated key exchange protocol from lattices[J]. Journal on Communications, 2018,39(11): 87-97. | |
[81] | YIN A Q , GUO Y B , SONG Y M ,et al. Two-round password-based authenticated key exchange from lattices[J]. Wireless Communications and Mobile Computing,2020, 2020:8893628. |
[82] | ROY P S , DUTTA S , SUSILO W ,et al. Password protected secret sharing from lattices[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2021: 442-459. |
[83] | 尹安琪, 郭渊博, 汪定 ,等. 可证明安全的抗量子两服务器口令认证密钥交换协议[J]. 通信学报, 2022,43(3): 14-29. |
YIN A Q , GUO Y B , WANG D ,et al. Provably secure quantum resistance two-server password-authenticated key exchange protocol[J]. Journal on Communications, 2022,43(3): 14-29. | |
[84] | GONG L , LOMAS M A , NEEDHAM R M ,et al. Protecting poorly chosen secrets from guessing attacks[J]. IEEE Journal on Selected Areas in Communications, 1993,11(5): 648-656. |
[85] | HALEVI S , KRAWCZYK H . Public-key cryptography and password protocols[J]. ACM Transactions on Information and System Security, 1999,2(3): 230-268. |
[86] | YI X , HAO F , BERTINO E . ID-based two-server password-authenticated key exchange[C]// European Symposium on Research in Computer Security. Berlin:Springer, 2014: 257-276. |
[87] | YI X , RAO F Y , TARI Z ,et al. ID2S password-authenticated key exchange protocols[J]. IEEE Transactions on Computers, 2016,65(12): 3687-3701. |
[88] | RAIMONDO D M , GENNARO R . Provably secure threshold password-authenticated key exchange[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 2003: 507-523. |
[8] | MACKENZIE P . The PAK suite:protocols for password-authenticated key exchange[R]. DIMACS Technical Report 2002-46, 2002. |
[89] | KATZ J , MACKENZIE P , TABAN G ,et al. Two-server password-only authenticated key exchange[C]// International Conference on Applied Cryptography and Network Security. Berlin:Springer, 2005: 1-16. |
[1] | Huanhuan LIAN, Huiying HOU, Yunlei ZHAO. Post-quantum verifier-based three-party password authenticated key exchange protocol [J]. Journal on Communications, 2022, 43(4): 95-106. |
[2] | Anqi YIN, Yuanbo GUO, Ding WANG, Tongzhou QU, Lin CHEN. Provably secure quantum resistance two-server password-authenticated key exchange protocol [J]. Journal on Communications, 2022, 43(3): 14-29. |
[3] | Youheng DONG, Geng ZHAO, Yingjie MA. Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties [J]. Journal on Communications, 2022, 43(1): 71-82. |
[4] | Miaomiao TIAN, Jing CHEN, Hong ZHONG. Identity-based incremental signature scheme from lattices [J]. Journal on Communications, 2021, 42(1): 108-117. |
[5] | Miaomiao TIAN,Chuang GAO,Jie CHEN. Identity-based cloud storage integrity checking from lattices [J]. Journal on Communications, 2019, 40(4): 128-139. |
[6] | Yatao YANG,Xinguang HAN,Jierun HUANG,Yang ZHAO. Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE [J]. Journal on Communications, 2019, 40(11): 180-186. |
[7] | Xixi YAN,Yuan LIU,Zichen LI,Yongli TANG,Qing YE. Privacy-preserving attribute-based encryption scheme on ideal lattices [J]. Journal on Communications, 2018, 39(3): 128-135. |
[8] | Caifen WANG,Li CHEN. Three-party password authenticated key agreement protocol with user anonymity based on lattice [J]. Journal on Communications, 2018, 39(2): 21-30. |
[9] | Shao-bo YU,Ling-da WU,Xi-tao ZHANG. Research on space information representation model based on formal concept analysis [J]. Journal on Communications, 2017, 38(Z2): 78-85. |
[10] | Zhi-yan XU,Li-bing WU,Li LI,De-biao HE. Provably secure certificateless aggregate signature scheme in wireless roaming authentication [J]. Journal on Communications, 2017, 38(7): 123-130. |
[11] | Yong-li TANG,Ming-xing HU,Kun LIU,Qing YE,Xi-xi YAN. Novel identity-based fully homomorphic encryption scheme from lattice [J]. Journal on Communications, 2017, 38(5): 39-47. |
[12] | Qing YE,Ming-xing HU,Yong-li TANG,Kun LIU,Xi-xi YAN. Novel hierarchical identity-based encryption scheme from lattice [J]. Journal on Communications, 2017, 38(11): 54-64. |
[13] | Ran DUAN,Chun-xiang GU,Yue-fei ZHU,Yong-hui ZHENG,Li CHEN. Efficient identity-based fully homomorphic encryption over NTRU [J]. Journal on Communications, 2017, 38(1): 66-75. |
[14] | Hong-can YAN,Feng ZHANG,Bao-xiang LIU. Rough decision rules extraction and reduction based on granular computing [J]. Journal on Communications, 2016, 37(Z1): 30-35. |
[15] | Ze-dong SUN,Yue-fei ZHU,Chun-xiang GU,Yong-hui1 ZHENG. RLWE-based key-policy ABE scheme [J]. Journal on Communications, 2016, 37(Z1): 125-131. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|