RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        A General Design Method of Constructing Fully Homomorphic Encryption with Ciphertext Matrix

        ( Xinxia Song ),( Zhigang Chen ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.5

        It is important to construct fully homomorphic encryption with ciphertext matrix that makes fully homomorphic encryption become very nature and simple. We present a general design method of constructing fully homomorphic encryption whose ciphertext is matrix. By using this design method, we can deduce a fully homomorphic encryption scheme step by step based on a basic encryption scheme. The process of deduction is similar to solving equation and the final output result is a fully homomorphic encryption scheme with ciphertext matrix. The idea of constructing ciphertext matrix is ciphertexts stack, which don’t simply stack ciphertexts together but is to obtain the desired homomorphic property. We use decryption structure as tool to analyze homomorphic property and noise growth during homomorphic evaluation. By using this design method, we obtain three corresponding fully homomorphic encryption schemes. Our obtained fully homomorphic encryption schemes are more efficient. Finally, we introduce the adversary advantage and improve the previous method of estimating concert parameters of fully homomorphic encryption. We give the concert parameters of these schemes.

      • KCI등재

        Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption

        Xinxia Song,Zhigang Chen,Dechao Sun 한국정보처리학회 2020 Journal of information processing systems Vol.16 No.3

        With the application and promotion of biometric technology, biometrics has become more and more importantto identity authentication. In order to ensure the privacy of the user, the biometrics cannot be stored or manipulatedin plaintext. Aiming at this problem, this paper analyzes and summarizes the scheme and performanceof the existing biometric authentication system, and proposes an iris-based ciphertext authentication systembased on fully homomorphic encryption using the FV scheme. The implementation of the system is partlypowered by Microsoft’s SEAL (Simple Encrypted Arithmetic Library). The entire system can complete irisauthentication without decrypting the iris feature template, and the database stores the homomorphic ciphertextof the iris feature template. Thus, there is no need to worry about the leakage of the iris feature template. At thesame time, the system does not require a trusted center for authentication, and the authentication is completedon the server side directly using the one-time MAC authentication method. Tests have shown that when thesystem adopts an iris algorithm with a low depth of calculation circuit such as the Hamming distance comparisonalgorithm, it has good performance, which basically meets the requirements of real applicationscenarios.

      • KCI등재

        Contact Tracking Development Trend Using Bibliometric Analysis

        Chaoqun Li,Zhigang Chen,Tongrui Yu,Xinxia Song 한국정보처리학회 2022 Journal of information processing systems Vol.18 No.3

        The new crown pneumonia (COVID-19) has become a global epidemic. The disease has spread to mostcountries and poses a challenge to the healthcare system. Contact tracing technology is an effective way forpublic health to deal with diseases. Many experts have studied traditional contact tracing and developed digitalcontact tracking. In order to better understand the field of contact tracking, it is necessary to analyze thedevelopment of contact tracking in the field of computer science by bibliometrics. The purpose of this researchis to use literature statistics and topic analysis to characterize the research literature of contact tracking in thefield of computer science, to gain an in-depth understanding of the literature development status of contacttracking and the trend of hot topics over the past decade. In order to achieve the aforementioned goals, weconducted a bibliometric study in this paper. The study uses data collected from the Scopus database. Whichcontains more than 10,000 articles, including more than 2,000 in the field of computer science. For populartrends, we use VOSviewer for visual analysis. The number of contact tracking documents published annuallyin the computer field is increasing. At present, there are 200 to 300 papers published in the field of computerscience each year, and the number of uncited papers is relatively small. Through the visual analysis of the paper,we found that the hot topic of contact tracking has changed from the past “mathematical model,” “biologicalmodel,” and “algorithm” to the current “digital contact tracking,” “privacy,” and “mobile application” and othertopics. Contact tracking is currently a hot research topic. By selecting the most cited papers, we can displayhigh-quality literature in contact tracking and characterize the development trend of the entire field throughtopic analysis. This is useful for students and researchers new to field of contact tracking ai well as forpresenting our results to other subjects. Especially when comprehensive research cannot be conducted due totime constraints or lack of precise research questions, our research analysis can provide value for it.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼