Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

Guifang Huang , Lei Hu

ABSTRACT

Non-malleable witness indistinguishability (NMWI) is a security notion against man-in-the-middle attacks which requires that the witness encoded in the right interaction is computationally independent of that used by honest prover in the left. In STOC 2009, Lin et al. defined strongly non-malleable witness indistinguishability (SNMWI) which is similar in spirit to NMWI, and proposed a SNMWI scheme based on one-way function. In this paper, we firstly show that the two notions NMWI and SNMWI are incomparable: there exists a SNMWI argument which is not NMWI, and vice versa. Furthermore, it is pointed out that the SNMWI construction given in STOC 2009 is not NMWI. Then, we present a variant of LPV08 scheme [17] and show that this variant is a concurrent NMWI argument. Compared with the concurrent NMWI argument of [22] which was shown to be non-malleable by using non-black-box techniques and whose difficulty assumption was claw-free permutation, our new scheme is based on the existence of one-way functions and its proof of security relies on black-box techniques. More... »

PAGES

363-378

References to SciGraph publications

  • 2010. Concurrent Non-Malleable Zero Knowledge Proofs in ADVANCES IN CRYPTOLOGY – CRYPTO 2010
  • 2008. Concurrent Non-malleable Commitments from Any One-Way Function in THEORY OF CRYPTOGRAPHY
  • 2001-07-13. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols in ADVANCES IN CRYPTOLOGY — CRYPTO ’94
  • 2009. Simulation-Based Concurrent Non-malleable Commitments and Decommitments in THEORY OF CRYPTOGRAPHY
  • 2006-04. Strengthening Zero-Knowledge Protocols Using Signatures in JOURNAL OF CRYPTOLOGY
  • 1991-01. Bit commitment using pseudorandomness in JOURNAL OF CRYPTOLOGY
  • 1999-04-15. On the Concurrent Composition of Zero-Knowledge Proofs in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’99
  • 2008. Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2000. Efficient Non-malleable Commitment Schemes in ADVANCES IN CRYPTOLOGY — CRYPTO 2000
  • 2001-04-15. Efficient and Non-interactive Non-malleable Commitment in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2001
  • 2001-08-02. Robust Non-interactive Zero Knowledge in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • Book

    TITLE

    Information Security and Cryptology

    ISBN

    978-3-642-34703-0
    978-3-642-34704-7

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-34704-7_25

    DOI

    http://dx.doi.org/10.1007/978-3-642-34704-7_25

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1043561673


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1606", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Political Science", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/16", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Studies in Human Society", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "University of Chinese Academy of Sciences", 
              "id": "https://www.grid.ac/institutes/grid.410726.6", 
              "name": [
                "State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Huang", 
            "givenName": "Guifang", 
            "id": "sg:person.015537351057.08", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015537351057.08"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Chinese Academy of Sciences", 
              "id": "https://www.grid.ac/institutes/grid.410726.6", 
              "name": [
                "State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hu", 
            "givenName": "Lei", 
            "id": "sg:person.011566074635.42", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011566074635.42"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/bf00196774", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003773885", 
              "https://doi.org/10.1007/bf00196774"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf00196774", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003773885", 
              "https://doi.org/10.1007/bf00196774"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-70583-3_45", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009055574", 
              "https://doi.org/10.1007/978-3-540-70583-3_45"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/780542.780605", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011991136"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44598-6_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016268856", 
              "https://doi.org/10.1007/3-540-44598-6_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/100216.100269", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018730073"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1060590.1060670", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019204631"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019333414", 
              "https://doi.org/10.1007/978-3-642-14623-7_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019333414", 
              "https://doi.org/10.1007/978-3-642-14623-7_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48910-x_29", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022783348", 
              "https://doi.org/10.1007/3-540-48910-x_29"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48910-x_29", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022783348", 
              "https://doi.org/10.1007/3-540-48910-x_29"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1536414.1536441", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023611973"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-005-0307-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024425059", 
              "https://doi.org/10.1007/s00145-005-0307-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/3812.3818", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1026929083"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-00457-5_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037673283", 
              "https://doi.org/10.1007/978-3-642-00457-5_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-00457-5_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037673283", 
              "https://doi.org/10.1007/978-3-642-00457-5_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041886095", 
              "https://doi.org/10.1007/3-540-44647-8_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041886095", 
              "https://doi.org/10.1007/3-540-44647-8_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-78524-8_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045918187", 
              "https://doi.org/10.1007/978-3-540-78524-8_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-78524-8_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045918187", 
              "https://doi.org/10.1007/978-3-540-78524-8_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/100216.100272", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046008657"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1051386971", 
              "https://doi.org/10.1007/3-540-44987-6_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1051386971", 
              "https://doi.org/10.1007/3-540-44987-6_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48658-5_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053299783", 
              "https://doi.org/10.1007/3-540-48658-5_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48658-5_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053299783", 
              "https://doi.org/10.1007/3-540-48658-5_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/0218012", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062842111"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0097539792230010", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062879724"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0097539795291562", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062880061"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sfcs.2005.27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093826880"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sffcs.1999.814628", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094312189"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2012", 
        "datePublishedReg": "2012-01-01", 
        "description": "Non-malleable witness indistinguishability (NMWI) is a security notion against man-in-the-middle attacks which requires that the witness encoded in the right interaction is computationally independent of that used by honest prover in the left. In STOC 2009, Lin et al. defined strongly non-malleable witness indistinguishability (SNMWI) which is similar in spirit to NMWI, and proposed a SNMWI scheme based on one-way function. In this paper, we firstly show that the two notions NMWI and SNMWI are incomparable: there exists a SNMWI argument which is not NMWI, and vice versa. Furthermore, it is pointed out that the SNMWI construction given in STOC 2009 is not NMWI. Then, we present a variant of LPV08 scheme [17] and show that this variant is a concurrent NMWI argument. Compared with the concurrent NMWI argument of [22] which was shown to be non-malleable by using non-black-box techniques and whose difficulty assumption was claw-free permutation, our new scheme is based on the existence of one-way functions and its proof of security relies on black-box techniques.", 
        "editor": [
          {
            "familyName": "Wu", 
            "givenName": "Chuan-Kun", 
            "type": "Person"
          }, 
          {
            "familyName": "Yung", 
            "givenName": "Moti", 
            "type": "Person"
          }, 
          {
            "familyName": "Lin", 
            "givenName": "Dongdai", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-34704-7_25", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.4979171", 
            "type": "MonetaryGrant"
          }, 
          {
            "id": "sg:grant.5007729", 
            "type": "MonetaryGrant"
          }, 
          {
            "id": "sg:grant.5000957", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": {
          "isbn": [
            "978-3-642-34703-0", 
            "978-3-642-34704-7"
          ], 
          "name": "Information Security and Cryptology", 
          "type": "Book"
        }, 
        "name": "Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function", 
        "pagination": "363-378", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-34704-7_25"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "cf8012dbb8ef581c09ba4b076d416cb1c6a4e56cc482ab0c53c859139466be71"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1043561673"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-34704-7_25", 
          "https://app.dimensions.ai/details/publication/pub.1043561673"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T10:37", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8659_00000270.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-642-34704-7_25"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34704-7_25'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34704-7_25'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34704-7_25'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-34704-7_25'


     

    This table displays all metadata directly associated to this object as RDF triples.

    165 TRIPLES      23 PREDICATES      49 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-34704-7_25 schema:about anzsrc-for:16
    2 anzsrc-for:1606
    3 schema:author N647ee750c42940aa8f00e76562103b70
    4 schema:citation sg:pub.10.1007/3-540-44598-6_26
    5 sg:pub.10.1007/3-540-44647-8_33
    6 sg:pub.10.1007/3-540-44987-6_4
    7 sg:pub.10.1007/3-540-48658-5_19
    8 sg:pub.10.1007/3-540-48910-x_29
    9 sg:pub.10.1007/978-3-540-70583-3_45
    10 sg:pub.10.1007/978-3-540-78524-8_31
    11 sg:pub.10.1007/978-3-642-00457-5_7
    12 sg:pub.10.1007/978-3-642-14623-7_23
    13 sg:pub.10.1007/bf00196774
    14 sg:pub.10.1007/s00145-005-0307-3
    15 https://doi.org/10.1109/sfcs.2005.27
    16 https://doi.org/10.1109/sffcs.1999.814628
    17 https://doi.org/10.1137/0218012
    18 https://doi.org/10.1137/s0097539792230010
    19 https://doi.org/10.1137/s0097539795291562
    20 https://doi.org/10.1145/100216.100269
    21 https://doi.org/10.1145/100216.100272
    22 https://doi.org/10.1145/1060590.1060670
    23 https://doi.org/10.1145/1536414.1536441
    24 https://doi.org/10.1145/3812.3818
    25 https://doi.org/10.1145/780542.780605
    26 schema:datePublished 2012
    27 schema:datePublishedReg 2012-01-01
    28 schema:description Non-malleable witness indistinguishability (NMWI) is a security notion against man-in-the-middle attacks which requires that the witness encoded in the right interaction is computationally independent of that used by honest prover in the left. In STOC 2009, Lin et al. defined strongly non-malleable witness indistinguishability (SNMWI) which is similar in spirit to NMWI, and proposed a SNMWI scheme based on one-way function. In this paper, we firstly show that the two notions NMWI and SNMWI are incomparable: there exists a SNMWI argument which is not NMWI, and vice versa. Furthermore, it is pointed out that the SNMWI construction given in STOC 2009 is not NMWI. Then, we present a variant of LPV08 scheme [17] and show that this variant is a concurrent NMWI argument. Compared with the concurrent NMWI argument of [22] which was shown to be non-malleable by using non-black-box techniques and whose difficulty assumption was claw-free permutation, our new scheme is based on the existence of one-way functions and its proof of security relies on black-box techniques.
    29 schema:editor N84e6d29079064d4da8fbb811d84b781c
    30 schema:genre chapter
    31 schema:inLanguage en
    32 schema:isAccessibleForFree false
    33 schema:isPartOf N21eb893397c04174838043c5a8e0e30b
    34 schema:name Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function
    35 schema:pagination 363-378
    36 schema:productId N0352f6062e8b476591afa2bad93265ca
    37 N791588fc1bfe4c9bb7fe352d3eddc5b9
    38 Nfe85c7b396c7428b9f4f34b088bf5e5e
    39 schema:publisher N0958157ea84e40bc9713f5131aa5ed08
    40 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043561673
    41 https://doi.org/10.1007/978-3-642-34704-7_25
    42 schema:sdDatePublished 2019-04-15T10:37
    43 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    44 schema:sdPublisher Na89d969673dd433ba58277a227b68e54
    45 schema:url http://link.springer.com/10.1007/978-3-642-34704-7_25
    46 sgo:license sg:explorer/license/
    47 sgo:sdDataset chapters
    48 rdf:type schema:Chapter
    49 N0352f6062e8b476591afa2bad93265ca schema:name doi
    50 schema:value 10.1007/978-3-642-34704-7_25
    51 rdf:type schema:PropertyValue
    52 N0958157ea84e40bc9713f5131aa5ed08 schema:location Berlin, Heidelberg
    53 schema:name Springer Berlin Heidelberg
    54 rdf:type schema:Organisation
    55 N21eb893397c04174838043c5a8e0e30b schema:isbn 978-3-642-34703-0
    56 978-3-642-34704-7
    57 schema:name Information Security and Cryptology
    58 rdf:type schema:Book
    59 N647ee750c42940aa8f00e76562103b70 rdf:first sg:person.015537351057.08
    60 rdf:rest N7f17c26e4390460cae428f3bdc680ee6
    61 N6d323752206341e796b6e7cca6f156bc rdf:first Nc081e8b858044d37b03eb3de87c294bb
    62 rdf:rest rdf:nil
    63 N791588fc1bfe4c9bb7fe352d3eddc5b9 schema:name readcube_id
    64 schema:value cf8012dbb8ef581c09ba4b076d416cb1c6a4e56cc482ab0c53c859139466be71
    65 rdf:type schema:PropertyValue
    66 N7f17c26e4390460cae428f3bdc680ee6 rdf:first sg:person.011566074635.42
    67 rdf:rest rdf:nil
    68 N84e6d29079064d4da8fbb811d84b781c rdf:first N9c402c9f1d85419992b9169aff47bb1d
    69 rdf:rest Nad75d7b1f8ac4714b64f274ed147458f
    70 N9c402c9f1d85419992b9169aff47bb1d schema:familyName Wu
    71 schema:givenName Chuan-Kun
    72 rdf:type schema:Person
    73 Na11158ad107a4361b2b5fe46aba635ff schema:familyName Yung
    74 schema:givenName Moti
    75 rdf:type schema:Person
    76 Na89d969673dd433ba58277a227b68e54 schema:name Springer Nature - SN SciGraph project
    77 rdf:type schema:Organization
    78 Nad75d7b1f8ac4714b64f274ed147458f rdf:first Na11158ad107a4361b2b5fe46aba635ff
    79 rdf:rest N6d323752206341e796b6e7cca6f156bc
    80 Nc081e8b858044d37b03eb3de87c294bb schema:familyName Lin
    81 schema:givenName Dongdai
    82 rdf:type schema:Person
    83 Nfe85c7b396c7428b9f4f34b088bf5e5e schema:name dimensions_id
    84 schema:value pub.1043561673
    85 rdf:type schema:PropertyValue
    86 anzsrc-for:16 schema:inDefinedTermSet anzsrc-for:
    87 schema:name Studies in Human Society
    88 rdf:type schema:DefinedTerm
    89 anzsrc-for:1606 schema:inDefinedTermSet anzsrc-for:
    90 schema:name Political Science
    91 rdf:type schema:DefinedTerm
    92 sg:grant.4979171 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-642-34704-7_25
    93 rdf:type schema:MonetaryGrant
    94 sg:grant.5000957 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-642-34704-7_25
    95 rdf:type schema:MonetaryGrant
    96 sg:grant.5007729 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-642-34704-7_25
    97 rdf:type schema:MonetaryGrant
    98 sg:person.011566074635.42 schema:affiliation https://www.grid.ac/institutes/grid.410726.6
    99 schema:familyName Hu
    100 schema:givenName Lei
    101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011566074635.42
    102 rdf:type schema:Person
    103 sg:person.015537351057.08 schema:affiliation https://www.grid.ac/institutes/grid.410726.6
    104 schema:familyName Huang
    105 schema:givenName Guifang
    106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015537351057.08
    107 rdf:type schema:Person
    108 sg:pub.10.1007/3-540-44598-6_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016268856
    109 https://doi.org/10.1007/3-540-44598-6_26
    110 rdf:type schema:CreativeWork
    111 sg:pub.10.1007/3-540-44647-8_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041886095
    112 https://doi.org/10.1007/3-540-44647-8_33
    113 rdf:type schema:CreativeWork
    114 sg:pub.10.1007/3-540-44987-6_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051386971
    115 https://doi.org/10.1007/3-540-44987-6_4
    116 rdf:type schema:CreativeWork
    117 sg:pub.10.1007/3-540-48658-5_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053299783
    118 https://doi.org/10.1007/3-540-48658-5_19
    119 rdf:type schema:CreativeWork
    120 sg:pub.10.1007/3-540-48910-x_29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022783348
    121 https://doi.org/10.1007/3-540-48910-x_29
    122 rdf:type schema:CreativeWork
    123 sg:pub.10.1007/978-3-540-70583-3_45 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009055574
    124 https://doi.org/10.1007/978-3-540-70583-3_45
    125 rdf:type schema:CreativeWork
    126 sg:pub.10.1007/978-3-540-78524-8_31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045918187
    127 https://doi.org/10.1007/978-3-540-78524-8_31
    128 rdf:type schema:CreativeWork
    129 sg:pub.10.1007/978-3-642-00457-5_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037673283
    130 https://doi.org/10.1007/978-3-642-00457-5_7
    131 rdf:type schema:CreativeWork
    132 sg:pub.10.1007/978-3-642-14623-7_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019333414
    133 https://doi.org/10.1007/978-3-642-14623-7_23
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/bf00196774 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003773885
    136 https://doi.org/10.1007/bf00196774
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/s00145-005-0307-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024425059
    139 https://doi.org/10.1007/s00145-005-0307-3
    140 rdf:type schema:CreativeWork
    141 https://doi.org/10.1109/sfcs.2005.27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093826880
    142 rdf:type schema:CreativeWork
    143 https://doi.org/10.1109/sffcs.1999.814628 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094312189
    144 rdf:type schema:CreativeWork
    145 https://doi.org/10.1137/0218012 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062842111
    146 rdf:type schema:CreativeWork
    147 https://doi.org/10.1137/s0097539792230010 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062879724
    148 rdf:type schema:CreativeWork
    149 https://doi.org/10.1137/s0097539795291562 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062880061
    150 rdf:type schema:CreativeWork
    151 https://doi.org/10.1145/100216.100269 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018730073
    152 rdf:type schema:CreativeWork
    153 https://doi.org/10.1145/100216.100272 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046008657
    154 rdf:type schema:CreativeWork
    155 https://doi.org/10.1145/1060590.1060670 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019204631
    156 rdf:type schema:CreativeWork
    157 https://doi.org/10.1145/1536414.1536441 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023611973
    158 rdf:type schema:CreativeWork
    159 https://doi.org/10.1145/3812.3818 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026929083
    160 rdf:type schema:CreativeWork
    161 https://doi.org/10.1145/780542.780605 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011991136
    162 rdf:type schema:CreativeWork
    163 https://www.grid.ac/institutes/grid.410726.6 schema:alternateName University of Chinese Academy of Sciences
    164 schema:name State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, 100049, P.R. China
    165 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...