Post-Quantum Secure Remote Password Protocol from RLWE Problem View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018-02-04

AUTHORS

Xinwei Gao , Jintai Ding , Jiqiang Liu , Lin Li

ABSTRACT

Secure Remote Password (SRP) protocol is an augmented Password-based Authenticated Key Exchange (PAKE) protocol based on discrete logarithm problem (DLP) with various attractive security features. Compared with basic PAKE protocols, SRP does not require server to store user’s password and user does not send password to server to authenticate. These features are desirable for secure client-server applications. SRP has gained extensive real-world deployment, including Apple iCloud, 1Password etc. However, with the advent of quantum computer and Shor’s algorithm, classic DLP-based public key cryptography algorithms are no longer secure, including SRP. Motivated by importance of SRP and threat from quantum attacks, we propose a RLWE-based SRP protocol (RLWE-SRP) which inherit advantages from SRP and elegant design from RLWE key exchange. We also present parameter choice and efficient portable C++ implementation of RLWE-SRP. Implementation of our 209-bit secure RLWE-SRP is more than 3x faster than 112-bit secure original SRP protocol, 5.5x faster than 80-bit secure J-PAKE and 14x faster than two 184-bit secure RLWE-based PAKE protocols with more desired properties. More... »

PAGES

99-116

References to SciGraph publications

  • 2005. HMQV: A High-Performance Secure Diffie-Hellman Protocol in ADVANCES IN CRYPTOLOGY – CRYPTO 2005
  • 2011. Password Authenticated Key Exchange by Juggling in SECURITY PROTOCOLS XVI
  • 2017. Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World in TOPICS IN CRYPTOLOGY – CT-RSA 2017
  • 2016. NFLlib: NTT-Based Fast Lattice Library in TOPICS IN CRYPTOLOGY - CT-RSA 2016
  • 2010. On Ideal Lattices and Learning with Errors over Rings in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2010
  • 2014. Lattice Cryptography for the Internet in POST-QUANTUM CRYPTOGRAPHY
  • 2009. Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2000. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2000
  • 2005. Simple Password-Based Encrypted Key Exchange Protocols in TOPICS IN CRYPTOLOGY – CT-RSA 2005
  • 2015-04-14. Authenticated Key Exchange from Ideal Lattices in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015
  • Book

    TITLE

    Information Security and Cryptology

    ISBN

    978-3-319-75159-7
    978-3-319-75160-3

    From Grant

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-75160-3_8

    DOI

    http://dx.doi.org/10.1007/978-3-319-75160-3_8

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1100790008


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Beijing Jiaotong University", 
              "id": "https://www.grid.ac/institutes/grid.181531.f", 
              "name": [
                "Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, 100044, Beijing, People\u2019s Republic of China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Gao", 
            "givenName": "Xinwei", 
            "id": "sg:person.015601325324.15", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015601325324.15"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Cincinnati", 
              "id": "https://www.grid.ac/institutes/grid.24827.3b", 
              "name": [
                "Department of Mathematical Sciences, University of Cincinnati, 45219, Cincinnati, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ding", 
            "givenName": "Jintai", 
            "id": "sg:person.010723403013.04", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Beijing Jiaotong University", 
              "id": "https://www.grid.ac/institutes/grid.181531.f", 
              "name": [
                "Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, 100044, Beijing, People\u2019s Republic of China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Liu", 
            "givenName": "Jiqiang", 
            "id": "sg:person.015366114727.14", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015366114727.14"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Beijing Jiaotong University", 
              "id": "https://www.grid.ac/institutes/grid.181531.f", 
              "name": [
                "Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, 100044, Beijing, People\u2019s Republic of China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Li", 
            "givenName": "Lin", 
            "id": "sg:person.07750070361.09", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07750070361.09"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-319-52153-4_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002529192", 
              "https://doi.org/10.1007/978-3-319-52153-4_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45539-6_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011394118", 
              "https://doi.org/10.1007/3-540-45539-6_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-29485-8_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011586268", 
              "https://doi.org/10.1007/978-3-319-29485-8_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30574-3_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013253548", 
              "https://doi.org/10.1007/978-3-540-30574-3_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-30574-3_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013253548", 
              "https://doi.org/10.1007/978-3-540-30574-3_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1568318.1568324", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013302643"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-11659-4_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021607145", 
              "https://doi.org/10.1007/978-3-319-11659-4_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025305533", 
              "https://doi.org/10.1007/978-3-642-13190-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025305533", 
              "https://doi.org/10.1007/978-3-642-13190-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535218_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027574053", 
              "https://doi.org/10.1007/11535218_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535218_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027574053", 
              "https://doi.org/10.1007/11535218_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/358722.358740", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029856031"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-22137-8_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1030625774", 
              "https://doi.org/10.1007/978-3-642-22137-8_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1515/jmc-2015-0016", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034673966"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2976749.2978425", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037398628"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-10366-7_37", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043490756", 
              "https://doi.org/10.1007/978-3-642-10366-7_37"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-10366-7_37", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043490756", 
              "https://doi.org/10.1007/978-3-642-10366-7_37"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-46803-6_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048054998", 
              "https://doi.org/10.1007/978-3-662-46803-6_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-46803-6_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048054998", 
              "https://doi.org/10.1007/978-3-662-46803-6_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tit.1976.1055638", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061647862"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0036144598347011", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062877995"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3934/amc.2013.7.187", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1071730771"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/risp.1992.213269", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1086349774"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sfcs.2001.959888", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095204750"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sfcs.2001.959888", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095204750"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sfcs.2001.959888", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095204750"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sp.2015.40", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095735144"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/1.9781611974331.ch121", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1098557287"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2018-02-04", 
        "datePublishedReg": "2018-02-04", 
        "description": "Secure Remote Password (SRP) protocol is an augmented Password-based Authenticated Key Exchange (PAKE) protocol based on discrete logarithm problem (DLP) with various attractive security features. Compared with basic PAKE protocols, SRP does not require server to store user\u2019s password and user does not send password to server to authenticate. These features are desirable for secure client-server applications. SRP has gained extensive real-world deployment, including Apple iCloud, 1Password etc. However, with the advent of quantum computer and Shor\u2019s algorithm, classic DLP-based public key cryptography algorithms are no longer secure, including SRP. Motivated by importance of SRP and threat from quantum attacks, we propose a RLWE-based SRP protocol (RLWE-SRP) which inherit advantages from SRP and elegant design from RLWE key exchange. We also present parameter choice and efficient portable C++ implementation of RLWE-SRP. Implementation of our 209-bit secure RLWE-SRP is more than 3x faster than 112-bit secure original SRP protocol, 5.5x faster than 80-bit secure J-PAKE and 14x faster than two 184-bit secure RLWE-based PAKE protocols with more desired properties.", 
        "editor": [
          {
            "familyName": "Chen", 
            "givenName": "Xiaofeng", 
            "type": "Person"
          }, 
          {
            "familyName": "Lin", 
            "givenName": "Dongdai", 
            "type": "Person"
          }, 
          {
            "familyName": "Yung", 
            "givenName": "Moti", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-75160-3_8", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.4727976", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": {
          "isbn": [
            "978-3-319-75159-7", 
            "978-3-319-75160-3"
          ], 
          "name": "Information Security and Cryptology", 
          "type": "Book"
        }, 
        "name": "Post-Quantum Secure Remote Password Protocol from RLWE Problem", 
        "pagination": "99-116", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-75160-3_8"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "779d83bc1c7a93482b50e1cdf21274fad6472cc26aaa543d61c319003bf64490"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1100790008"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-75160-3_8", 
          "https://app.dimensions.ai/details/publication/pub.1100790008"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T05:00", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000325_0000000325/records_100797_00000000.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-319-75160-3_8"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-75160-3_8'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-75160-3_8'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-75160-3_8'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-75160-3_8'


     

    This table displays all metadata directly associated to this object as RDF triples.

    174 TRIPLES      23 PREDICATES      47 URIs      19 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-75160-3_8 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N98472c7cfbf4406181fc30c4c33ec933
    4 schema:citation sg:pub.10.1007/11535218_33
    5 sg:pub.10.1007/3-540-45539-6_12
    6 sg:pub.10.1007/978-3-319-11659-4_12
    7 sg:pub.10.1007/978-3-319-29485-8_20
    8 sg:pub.10.1007/978-3-319-52153-4_11
    9 sg:pub.10.1007/978-3-540-30574-3_14
    10 sg:pub.10.1007/978-3-642-10366-7_37
    11 sg:pub.10.1007/978-3-642-13190-5_1
    12 sg:pub.10.1007/978-3-642-22137-8_23
    13 sg:pub.10.1007/978-3-662-46803-6_24
    14 https://doi.org/10.1109/risp.1992.213269
    15 https://doi.org/10.1109/sfcs.2001.959888
    16 https://doi.org/10.1109/sp.2015.40
    17 https://doi.org/10.1109/tit.1976.1055638
    18 https://doi.org/10.1137/1.9781611974331.ch121
    19 https://doi.org/10.1137/s0036144598347011
    20 https://doi.org/10.1145/1568318.1568324
    21 https://doi.org/10.1145/2976749.2978425
    22 https://doi.org/10.1145/358722.358740
    23 https://doi.org/10.1515/jmc-2015-0016
    24 https://doi.org/10.3934/amc.2013.7.187
    25 schema:datePublished 2018-02-04
    26 schema:datePublishedReg 2018-02-04
    27 schema:description Secure Remote Password (SRP) protocol is an augmented Password-based Authenticated Key Exchange (PAKE) protocol based on discrete logarithm problem (DLP) with various attractive security features. Compared with basic PAKE protocols, SRP does not require server to store user’s password and user does not send password to server to authenticate. These features are desirable for secure client-server applications. SRP has gained extensive real-world deployment, including Apple iCloud, 1Password etc. However, with the advent of quantum computer and Shor’s algorithm, classic DLP-based public key cryptography algorithms are no longer secure, including SRP. Motivated by importance of SRP and threat from quantum attacks, we propose a RLWE-based SRP protocol (RLWE-SRP) which inherit advantages from SRP and elegant design from RLWE key exchange. We also present parameter choice and efficient portable C++ implementation of RLWE-SRP. Implementation of our 209-bit secure RLWE-SRP is more than 3x faster than 112-bit secure original SRP protocol, 5.5x faster than 80-bit secure J-PAKE and 14x faster than two 184-bit secure RLWE-based PAKE protocols with more desired properties.
    28 schema:editor N530369dfb91c4615bf4c53cecfaf66c6
    29 schema:genre chapter
    30 schema:inLanguage en
    31 schema:isAccessibleForFree false
    32 schema:isPartOf N2df08c8fad9e49e6a509c1238da5521d
    33 schema:name Post-Quantum Secure Remote Password Protocol from RLWE Problem
    34 schema:pagination 99-116
    35 schema:productId N5027557fd0574582b1e3ba96a80e4d00
    36 N7b9142c26f2a41cca89fcbe366bc61e5
    37 Ne2232a056b7b4ccb9650b2d6002d18d3
    38 schema:publisher Na05fc89d1fdb4cee97cae34f1578f0ad
    39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1100790008
    40 https://doi.org/10.1007/978-3-319-75160-3_8
    41 schema:sdDatePublished 2019-04-16T05:00
    42 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    43 schema:sdPublisher N02a10b8314ff43629d70a7c24e76f9e2
    44 schema:url https://link.springer.com/10.1007%2F978-3-319-75160-3_8
    45 sgo:license sg:explorer/license/
    46 sgo:sdDataset chapters
    47 rdf:type schema:Chapter
    48 N02a10b8314ff43629d70a7c24e76f9e2 schema:name Springer Nature - SN SciGraph project
    49 rdf:type schema:Organization
    50 N041169d9f79f47c19d63688184351ac6 rdf:first sg:person.015366114727.14
    51 rdf:rest N654a32e7a4834c7cb41b5836a9a14676
    52 N097499030eab415f9d293f00739c27ad rdf:first Na1e32f0b48ef477eb3712c59aee90068
    53 rdf:rest N0d6112c777244aed83a0a5082bd2d465
    54 N0d6112c777244aed83a0a5082bd2d465 rdf:first Ndd3aa99af69e4dd99814153428858362
    55 rdf:rest rdf:nil
    56 N2df08c8fad9e49e6a509c1238da5521d schema:isbn 978-3-319-75159-7
    57 978-3-319-75160-3
    58 schema:name Information Security and Cryptology
    59 rdf:type schema:Book
    60 N497d1b2da75d488287114247fdfc5317 rdf:first sg:person.010723403013.04
    61 rdf:rest N041169d9f79f47c19d63688184351ac6
    62 N5027557fd0574582b1e3ba96a80e4d00 schema:name readcube_id
    63 schema:value 779d83bc1c7a93482b50e1cdf21274fad6472cc26aaa543d61c319003bf64490
    64 rdf:type schema:PropertyValue
    65 N530369dfb91c4615bf4c53cecfaf66c6 rdf:first Nd4b5b2add6ce4bd595be83fe17ed2ae3
    66 rdf:rest N097499030eab415f9d293f00739c27ad
    67 N654a32e7a4834c7cb41b5836a9a14676 rdf:first sg:person.07750070361.09
    68 rdf:rest rdf:nil
    69 N7b9142c26f2a41cca89fcbe366bc61e5 schema:name dimensions_id
    70 schema:value pub.1100790008
    71 rdf:type schema:PropertyValue
    72 N98472c7cfbf4406181fc30c4c33ec933 rdf:first sg:person.015601325324.15
    73 rdf:rest N497d1b2da75d488287114247fdfc5317
    74 Na05fc89d1fdb4cee97cae34f1578f0ad schema:location Cham
    75 schema:name Springer International Publishing
    76 rdf:type schema:Organisation
    77 Na1e32f0b48ef477eb3712c59aee90068 schema:familyName Lin
    78 schema:givenName Dongdai
    79 rdf:type schema:Person
    80 Nd4b5b2add6ce4bd595be83fe17ed2ae3 schema:familyName Chen
    81 schema:givenName Xiaofeng
    82 rdf:type schema:Person
    83 Ndd3aa99af69e4dd99814153428858362 schema:familyName Yung
    84 schema:givenName Moti
    85 rdf:type schema:Person
    86 Ne2232a056b7b4ccb9650b2d6002d18d3 schema:name doi
    87 schema:value 10.1007/978-3-319-75160-3_8
    88 rdf:type schema:PropertyValue
    89 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    90 schema:name Information and Computing Sciences
    91 rdf:type schema:DefinedTerm
    92 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    93 schema:name Data Format
    94 rdf:type schema:DefinedTerm
    95 sg:grant.4727976 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-75160-3_8
    96 rdf:type schema:MonetaryGrant
    97 sg:person.010723403013.04 schema:affiliation https://www.grid.ac/institutes/grid.24827.3b
    98 schema:familyName Ding
    99 schema:givenName Jintai
    100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04
    101 rdf:type schema:Person
    102 sg:person.015366114727.14 schema:affiliation https://www.grid.ac/institutes/grid.181531.f
    103 schema:familyName Liu
    104 schema:givenName Jiqiang
    105 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015366114727.14
    106 rdf:type schema:Person
    107 sg:person.015601325324.15 schema:affiliation https://www.grid.ac/institutes/grid.181531.f
    108 schema:familyName Gao
    109 schema:givenName Xinwei
    110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015601325324.15
    111 rdf:type schema:Person
    112 sg:person.07750070361.09 schema:affiliation https://www.grid.ac/institutes/grid.181531.f
    113 schema:familyName Li
    114 schema:givenName Lin
    115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07750070361.09
    116 rdf:type schema:Person
    117 sg:pub.10.1007/11535218_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027574053
    118 https://doi.org/10.1007/11535218_33
    119 rdf:type schema:CreativeWork
    120 sg:pub.10.1007/3-540-45539-6_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011394118
    121 https://doi.org/10.1007/3-540-45539-6_12
    122 rdf:type schema:CreativeWork
    123 sg:pub.10.1007/978-3-319-11659-4_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021607145
    124 https://doi.org/10.1007/978-3-319-11659-4_12
    125 rdf:type schema:CreativeWork
    126 sg:pub.10.1007/978-3-319-29485-8_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011586268
    127 https://doi.org/10.1007/978-3-319-29485-8_20
    128 rdf:type schema:CreativeWork
    129 sg:pub.10.1007/978-3-319-52153-4_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002529192
    130 https://doi.org/10.1007/978-3-319-52153-4_11
    131 rdf:type schema:CreativeWork
    132 sg:pub.10.1007/978-3-540-30574-3_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013253548
    133 https://doi.org/10.1007/978-3-540-30574-3_14
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/978-3-642-10366-7_37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043490756
    136 https://doi.org/10.1007/978-3-642-10366-7_37
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/978-3-642-13190-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025305533
    139 https://doi.org/10.1007/978-3-642-13190-5_1
    140 rdf:type schema:CreativeWork
    141 sg:pub.10.1007/978-3-642-22137-8_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030625774
    142 https://doi.org/10.1007/978-3-642-22137-8_23
    143 rdf:type schema:CreativeWork
    144 sg:pub.10.1007/978-3-662-46803-6_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048054998
    145 https://doi.org/10.1007/978-3-662-46803-6_24
    146 rdf:type schema:CreativeWork
    147 https://doi.org/10.1109/risp.1992.213269 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086349774
    148 rdf:type schema:CreativeWork
    149 https://doi.org/10.1109/sfcs.2001.959888 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095204750
    150 rdf:type schema:CreativeWork
    151 https://doi.org/10.1109/sp.2015.40 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095735144
    152 rdf:type schema:CreativeWork
    153 https://doi.org/10.1109/tit.1976.1055638 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061647862
    154 rdf:type schema:CreativeWork
    155 https://doi.org/10.1137/1.9781611974331.ch121 schema:sameAs https://app.dimensions.ai/details/publication/pub.1098557287
    156 rdf:type schema:CreativeWork
    157 https://doi.org/10.1137/s0036144598347011 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062877995
    158 rdf:type schema:CreativeWork
    159 https://doi.org/10.1145/1568318.1568324 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013302643
    160 rdf:type schema:CreativeWork
    161 https://doi.org/10.1145/2976749.2978425 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037398628
    162 rdf:type schema:CreativeWork
    163 https://doi.org/10.1145/358722.358740 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029856031
    164 rdf:type schema:CreativeWork
    165 https://doi.org/10.1515/jmc-2015-0016 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034673966
    166 rdf:type schema:CreativeWork
    167 https://doi.org/10.3934/amc.2013.7.187 schema:sameAs https://app.dimensions.ai/details/publication/pub.1071730771
    168 rdf:type schema:CreativeWork
    169 https://www.grid.ac/institutes/grid.181531.f schema:alternateName Beijing Jiaotong University
    170 schema:name Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, 100044, Beijing, People’s Republic of China
    171 rdf:type schema:Organization
    172 https://www.grid.ac/institutes/grid.24827.3b schema:alternateName University of Cincinnati
    173 schema:name Department of Mathematical Sciences, University of Cincinnati, 45219, Cincinnati, USA
    174 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...