Pre‐image sample algorithm with irregular Gaussian distribution and construction of identity‐based signature

Summary Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and flexibility. The pre‐image sample algorithm is the most fundamental algorithm in lattice‐based cryptography for its comprehensive applicat...

Full description

Saved in:
Bibliographic Details
Published inConcurrency and computation Vol. 29; no. 20
Main Authors Yan, Jianhua, Wang, Licheng, Li, Jing, Li, Muzi, Yang, Yixan, Yao, Wenbin
Format Journal Article
LanguageEnglish
Published Hoboken Wiley Subscription Services, Inc 25.10.2017
Subjects
Online AccessGet full text
ISSN1532-0626
1532-0634
DOI10.1002/cpe.3925

Cover

Abstract Summary Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and flexibility. The pre‐image sample algorithm is the most fundamental algorithm in lattice‐based cryptography for its comprehensive applications in various primitives. Currently, SampleDO due to Micciancio and Peikert (MP) sample algorithm is the most efficient pre‐image sample algorithm. However, this algorithm also needs massive computations. On the one hand, it expenses the cube of the lattice dimension multiplications over reals to set matrices as Gaussian parameters. On the other hand, it needs complex discrete convolution computations. First, this paper proposes an efficient pre‐image sample algorithm with outputs obeying irregular Gaussian distribution. Two measures are adopted to prevent the leakage of the geometrical property of trapdoor caused by irregular Gaussian outputs. A variant of MP trapdoor is proposed, and a new trapdoor is randomly assembled from a big enough space in each sample. Although still using a matrix as the Guassian parameter, in the proposed algorithm, the computational cost to set Gaussian parameters is zero. Meanwhile, the computational overhead for every sample is far less than that of MP sample algorithm. Second, to demonstrate the security and efficiency of the proposed sample algorithm, a hierarchical identity‐based signature scheme is put forward. This scheme is proved existentially unforgeable against selective identity adaptively chosen‐message attacks. Furthermore, the theoretical analysis shows that the proposed identity‐based signature is more efficient than the existing schemes. Copyright © 2016 John Wiley & Sons, Ltd.
AbstractList Summary Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and flexibility. The pre‐image sample algorithm is the most fundamental algorithm in lattice‐based cryptography for its comprehensive applications in various primitives. Currently, SampleDO due to Micciancio and Peikert (MP) sample algorithm is the most efficient pre‐image sample algorithm. However, this algorithm also needs massive computations. On the one hand, it expenses the cube of the lattice dimension multiplications over reals to set matrices as Gaussian parameters. On the other hand, it needs complex discrete convolution computations. First, this paper proposes an efficient pre‐image sample algorithm with outputs obeying irregular Gaussian distribution. Two measures are adopted to prevent the leakage of the geometrical property of trapdoor caused by irregular Gaussian outputs. A variant of MP trapdoor is proposed, and a new trapdoor is randomly assembled from a big enough space in each sample. Although still using a matrix as the Guassian parameter, in the proposed algorithm, the computational cost to set Gaussian parameters is zero. Meanwhile, the computational overhead for every sample is far less than that of MP sample algorithm. Second, to demonstrate the security and efficiency of the proposed sample algorithm, a hierarchical identity‐based signature scheme is put forward. This scheme is proved existentially unforgeable against selective identity adaptively chosen‐message attacks. Furthermore, the theoretical analysis shows that the proposed identity‐based signature is more efficient than the existing schemes. Copyright © 2016 John Wiley & Sons, Ltd.
Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and flexibility. The pre‐image sample algorithm is the most fundamental algorithm in lattice‐based cryptography for its comprehensive applications in various primitives. Currently, due to Micciancio and Peikert (MP) sample algorithm is the most efficient pre‐image sample algorithm. However, this algorithm also needs massive computations. On the one hand, it expenses the cube of the lattice dimension multiplications over reals to set matrices as Gaussian parameters. On the other hand, it needs complex discrete convolution computations. First, this paper proposes an efficient pre‐image sample algorithm with outputs obeying irregular Gaussian distribution. Two measures are adopted to prevent the leakage of the geometrical property of trapdoor caused by irregular Gaussian outputs. A variant of MP trapdoor is proposed, and a new trapdoor is randomly assembled from a big enough space in each sample. Although still using a matrix as the Guassian parameter, in the proposed algorithm, the computational cost to set Gaussian parameters is zero. Meanwhile, the computational overhead for every sample is far less than that of MP sample algorithm. Second, to demonstrate the security and efficiency of the proposed sample algorithm, a hierarchical identity‐based signature scheme is put forward. This scheme is proved existentially unforgeable against selective identity adaptively chosen‐message attacks. Furthermore, the theoretical analysis shows that the proposed identity‐based signature is more efficient than the existing schemes. Copyright © 2016 John Wiley & Sons, Ltd.
Summary Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst-case hardness, simple computation kind, and flexibility. The pre-image sample algorithm is the most fundamental algorithm in lattice-based cryptography for its comprehensive applications in various primitives. Currently, SampleD O due to Micciancio and Peikert (MP) sample algorithm is the most efficient pre-image sample algorithm. However, this algorithm also needs massive computations. On the one hand, it expenses the cube of the lattice dimension multiplications over reals to set matrices as Gaussian parameters. On the other hand, it needs complex discrete convolution computations. First, this paper proposes an efficient pre-image sample algorithm with outputs obeying irregular Gaussian distribution. Two measures are adopted to prevent the leakage of the geometrical property of trapdoor caused by irregular Gaussian outputs. A variant of MP trapdoor is proposed, and a new trapdoor is randomly assembled from a big enough space in each sample. Although still using a matrix as the Guassian parameter, in the proposed algorithm, the computational cost to set Gaussian parameters is zero. Meanwhile, the computational overhead for every sample is far less than that of MP sample algorithm. Second, to demonstrate the security and efficiency of the proposed sample algorithm, a hierarchical identity-based signature scheme is put forward. This scheme is proved existentially unforgeable against selective identity adaptively chosen-message attacks. Furthermore, the theoretical analysis shows that the proposed identity-based signature is more efficient than the existing schemes. Copyright © 2016 John Wiley & Sons, Ltd.
Author Li, Jing
Yan, Jianhua
Yang, Yixan
Li, Muzi
Wang, Licheng
Yao, Wenbin
Author_xml – sequence: 1
  givenname: Jianhua
  surname: Yan
  fullname: Yan, Jianhua
  organization: Beijing University of Posts and Telecommunications
– sequence: 2
  givenname: Licheng
  surname: Wang
  fullname: Wang, Licheng
  email: wanglc@bupt.edu.cn
  organization: Beijing University of Posts and Telecommunications
– sequence: 3
  givenname: Jing
  surname: Li
  fullname: Li, Jing
  organization: Beijing University of Posts and Telecommunications
– sequence: 4
  givenname: Muzi
  surname: Li
  fullname: Li, Muzi
  organization: Ludong University
– sequence: 5
  givenname: Yixan
  surname: Yang
  fullname: Yang, Yixan
  organization: Beijing University of Posts and Telecommunications
– sequence: 6
  givenname: Wenbin
  surname: Yao
  fullname: Yao, Wenbin
  organization: Beijing University of Posts and Telecommunications
BookMark eNp1kM9Kw0AQxhdRsK2Cj7DgxUvqbjbZZo9SahUK9qDnsH_jlnQTdzeU3nwEn9EnMWnFg-hlZvj4zTfMNwanrnEagCuMphih9Fa2ekpYmp-AEc5JmiBKstOfOaXnYBzCBiGMEcEj0K69_nz_sFteaRj4tq015HXVeBtft3DXV2i911VXcw-XvAvBcgeVDdFb0UXbOMidgrJxvdLJg9AYaJV20cZ9by140AoGWzkeO68vwJnhddCX330CXu4Xz_OHZPW0fJzfrRKZMpIneS4YN5rmApOZykXGCjSTM0ZnFBlZKFoookhaiIJxhjiSimZEaEOMESlThEzA9dG39c1bp0MsN03nXX-yxCzDmGZpNlA3R0r6JgSvTdn6Pgu_LzEqhzzLPs9yyLNHp79QaSMfHo6e2_qvheS4sLO13v9rXM7XiwP_BXTOjHI
CitedBy_id crossref_primary_10_1109_ACCESS_2017_2757464
crossref_primary_10_1002_cpe_4162
crossref_primary_10_1093_comjnl_bxaa011
Cites_doi 10.1007/978-3-642-14623-7_5
10.1007/978-3-642-40041-4_5
10.1007/s00224-010-9278-3
10.1007/978-3-662-46447-2_32
10.1007/978-3-642-13013-7_29
10.1145/2090236.2090262
10.1007/978-3-642-38348-9_28
10.1007/978-3-642-14623-7_6
10.1145/1536414.1536461
10.1137/080733954
10.1145/1060590.1060603
10.1007/978-1-4615-0897-7
10.1007/978-3-642-40041-4_3
10.1137/S0097539705447360
10.1007/978-3-642-32009-5_50
10.1007/978-3-642-25385-0_2
10.1145/2488608.2488677
10.1007/978-3-642-29011-4_41
10.1109/FOCS.2011.12
10.1007/978-3-642-13190-5_28
10.1002/sec.531
10.1007/978-3-642-12929-2_14
10.1155/2013/416282
10.1137/S0097539795293172
10.1007/978-3-642-28914-9_5
10.1145/1374376.1374407
ContentType Journal Article
Copyright Copyright © 2016 John Wiley & Sons, Ltd.
Copyright © 2017 John Wiley & Sons, Ltd.
Copyright_xml – notice: Copyright © 2016 John Wiley & Sons, Ltd.
– notice: Copyright © 2017 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/cpe.3925
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
CrossRef
Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1532-0634
EndPage n/a
ExternalDocumentID 10_1002_cpe_3925
CPE3925
Genre article
GrantInformation_xml – fundername: National Natural Science Foundation of China (NSFC)
  funderid: nos. 61370194; 61411146001; 61502048
GroupedDBID .3N
.DC
.GA
05W
0R~
10A
1L6
1OB
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHQN
AAMNL
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABEML
ABIJN
ACAHQ
ACCZN
ACPOU
ACSCC
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADMLS
ADOZA
ADXAS
ADZMN
AEIGN
AEIMD
AEUYR
AEYWJ
AFBPY
AFFPM
AFGKR
AFWVQ
AGHNM
AGYGG
AHBTC
AITYG
AIURR
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
EJD
F00
F01
F04
F5P
G-S
G.N
GNP
GODZA
HGLYW
HHY
HZ~
IX1
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LW6
LYRES
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
O66
O9-
OIG
P2W
P2X
P4D
PQQKQ
Q.N
Q11
QB0
QRW
R.K
ROL
RX1
SUPJJ
TN5
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WOHZO
WQJ
WXSBR
WYISQ
WZISG
XG1
XV2
~IA
~WT
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2935-55b9afe65b137d5b49807c796760fc8d68d3d328b89a90a0cd643bef3ffb29d33
IEDL.DBID DR2
ISSN 1532-0626
IngestDate Sun Jul 13 03:59:23 EDT 2025
Thu Apr 24 22:57:43 EDT 2025
Wed Oct 01 00:58:56 EDT 2025
Tue Sep 09 05:11:36 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 20
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2935-55b9afe65b137d5b49807c796760fc8d68d3d328b89a90a0cd643bef3ffb29d33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1941164243
PQPubID 2045170
PageCount 1
ParticipantIDs proquest_journals_1941164243
crossref_primary_10_1002_cpe_3925
crossref_citationtrail_10_1002_cpe_3925
wiley_primary_10_1002_cpe_3925_CPE3925
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 25 October 2017
PublicationDateYYYYMMDD 2017-10-25
PublicationDate_xml – month: 10
  year: 2017
  text: 25 October 2017
  day: 25
PublicationDecade 2010
PublicationPlace Hoboken
PublicationPlace_xml – name: Hoboken
PublicationTitle Concurrency and computation
PublicationYear 2017
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2012
2011
2013; 2013
2010
1997; 26
2011; 40
2009
2008
2005
2015
2011; 48
2013
2002
2013; 6
2007; 37
e_1_2_10_23_1
e_1_2_10_24_1
e_1_2_10_21_1
e_1_2_10_22_1
e_1_2_10_20_1
e_1_2_10_2_1
e_1_2_10_4_1
e_1_2_10_18_1
e_1_2_10_3_1
e_1_2_10_19_1
e_1_2_10_6_1
e_1_2_10_16_1
e_1_2_10_5_1
e_1_2_10_17_1
e_1_2_10_8_1
e_1_2_10_14_1
e_1_2_10_7_1
e_1_2_10_15_1
e_1_2_10_12_1
e_1_2_10_9_1
e_1_2_10_13_1
e_1_2_10_10_1
e_1_2_10_11_1
e_1_2_10_27_1
e_1_2_10_25_1
e_1_2_10_26_1
References_xml – start-page: 716
  year: 2015
  end-page: 730
– start-page: 309
  year: 2012
  end-page: 325
– volume: 48
  start-page: 535
  year: 2011
  end-page: 553
  article-title: Generating shorter bases for hard random lattices
  publication-title: Theory of Computing Systems
– start-page: 97
  year: 2011
  end-page: 106
– start-page: 98
  year: 2010
  end-page: 115
– start-page: 40
  year: 2013
  end-page: 56
– start-page: 868
  year: 2012
  end-page: 886
– volume: 37
  start-page: 267
  issue: 1
  year: 2007
  end-page: 302
  article-title: Worst‐case to average‐case reductions based on Gaussian measure
  publication-title: SIAM Journal on Computing
– start-page: 553
  year: 2010
  end-page: 572
– start-page: 499
  year: 2010
  end-page: 517
– start-page: 21
  year: 2011
  end-page: 40
– start-page: 80
  year: 2010
  end-page: 97
– start-page: 75
  year: 2012
  end-page: 93
– volume: 40
  start-page: 1803
  issue: 6
  year: 2011
  end-page: 1844
  article-title: Lossy trapdoor functions and their applications
  publication-title: SIAM Journal on Computing
– start-page: 197
  year: 2008
  end-page: 206
– volume: 6
  start-page: 69
  issue: 1
  year: 2013
  end-page: 77
  article-title: Efficient and strongly unforgeable identity‐based signature scheme from lattices in the standard model
  publication-title: Security and Communication Networks
– volume: 26
  start-page: 1484
  issue: 5
  year: 1997
  end-page: 1509
  article-title: Polynomial‐time algorithms for prime factorization and discrete logarithms on a quantum computer
  publication-title: SIAM Journal on Computing
– start-page: 461
  year: 2013
  end-page: 485
– start-page: 700
  year: 2012
  end-page: 718
– volume: 2013
  start-page: 1
  year: 2013
  end-page: 18
  article-title: Efficient lattice‐based signcryption in standard model
  publication-title: Mathematical Problems in Engineering
– start-page: 333—342
  year: 2009
– start-page: 545
  year: 2013
  end-page: 554
– year: 2002
– start-page: 182
  year: 2010
  end-page: 200
– start-page: 75
  year: 2013
  end-page: 92
– start-page: 84
  year: 2005
  end-page: 93
– ident: e_1_2_10_16_1
  doi: 10.1007/978-3-642-14623-7_5
– ident: e_1_2_10_11_1
  doi: 10.1007/978-3-642-40041-4_5
– ident: e_1_2_10_15_1
  doi: 10.1007/s00224-010-9278-3
– ident: e_1_2_10_17_1
  doi: 10.1007/978-3-662-46447-2_32
– ident: e_1_2_10_27_1
  doi: 10.1007/978-3-642-13013-7_29
– ident: e_1_2_10_9_1
  doi: 10.1145/2090236.2090262
– ident: e_1_2_10_24_1
  doi: 10.1007/978-3-642-38348-9_28
– ident: e_1_2_10_20_1
  doi: 10.1007/978-3-642-14623-7_6
– ident: e_1_2_10_4_1
  doi: 10.1145/1536414.1536461
– ident: e_1_2_10_5_1
  doi: 10.1137/080733954
– ident: e_1_2_10_19_1
  doi: 10.1145/1060590.1060603
– ident: e_1_2_10_21_1
  doi: 10.1007/978-1-4615-0897-7
– ident: e_1_2_10_7_1
  doi: 10.1007/978-3-642-40041-4_3
– ident: e_1_2_10_18_1
  doi: 10.1137/S0097539705447360
– ident: e_1_2_10_10_1
  doi: 10.1007/978-3-642-32009-5_50
– ident: e_1_2_10_12_1
  doi: 10.1007/978-3-642-25385-0_2
– ident: e_1_2_10_13_1
  doi: 10.1145/2488608.2488677
– ident: e_1_2_10_14_1
  doi: 10.1007/978-3-642-29011-4_41
– ident: e_1_2_10_8_1
  doi: 10.1109/FOCS.2011.12
– ident: e_1_2_10_22_1
  doi: 10.1007/978-3-642-13190-5_28
– ident: e_1_2_10_23_1
  doi: 10.1002/sec.531
– ident: e_1_2_10_25_1
  doi: 10.1007/978-3-642-12929-2_14
– ident: e_1_2_10_26_1
  doi: 10.1155/2013/416282
– ident: e_1_2_10_2_1
  doi: 10.1137/S0097539795293172
– ident: e_1_2_10_6_1
  doi: 10.1007/978-3-642-28914-9_5
– ident: e_1_2_10_3_1
  doi: 10.1145/1374376.1374407
SSID ssj0011031
Score 2.1587536
Snippet Summary Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind,...
Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and...
Summary Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst-case hardness, simple computation kind,...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
SubjectTerms Algorithms
concurrent computation
Convolution
Costs
Cryptography
Gaussian distribution
IBS
irregular Gaussian distribution
Normal distribution
post‐quantum cryptography
pre‐image sample algorithm
Surface hardness
Title Pre‐image sample algorithm with irregular Gaussian distribution and construction of identity‐based signature
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.3925
https://www.proquest.com/docview/1941164243
Volume 29
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1532-0634
  dateEnd: 20241102
  omitProxy: false
  ssIdentifier: ssj0011031
  issn: 1532-0626
  databaseCode: ADMLS
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1532-0626
  databaseCode: DR2
  dateStart: 19960101
  customDbUrl:
  isFulltext: true
  eissn: 1532-0634
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0011031
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1LS8QwEMeDePLiW1xdJYLoqZqmbdocRdRFUBZREDyUTJLq4r7orgc9-RH8jH4SJ33sqiiIl_aSlDbJdH4TMv8hZBcgYxIM9wBi64WI6B7g1ZMgDCiDCJu4ROGLS9G6Cc9vo9vqVKXLhSn1ISYbbs4yiv-1M3AFo8OpaKgeWgzYucsv9wNRRFNXE-Uo31UvKKVSuccQ2mvdWcYP645fPdEULz9DauFlThfIXf1-5eGSx4OnMRzol2_Sjf_7gEUyX8EnPSpXyxKZsf1lslAXdqCVna-QYTu3769vnR7-bOhIOQFhqrr3g7wzfuhRt3VLO3leVLHP6Zl6GrlMTGqcBm9VPouqvqF6MJWnpYOMdsqk4Gd8tHOehrrDI4Ww6Cq5OT25Pm55VWkGTyMfRF4UgVSZFRH4QWwiCGXCYh1LEQuW6cSIxAQm4AkkUkmmmDZIPmCzIMuASxMEa2S2P-jbdUKFiLUNM2Q9ZkOETyUMA8SeiCuOAaJukP16mlJd6Za78hndtFRc5ikOZOoGskF2Ji2HpVbHD22a9UynlbWOUl-GPoaNPAwaZK-Ysl_7p8ftE3ff-GvDTTLHHQmgu-NRk8zisNst5JgxbBcr9gM8kfPF
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ3NTtwwEMdHlB7KBdpSxAKlrlTBKeB1YicWpwpBty0ghEDigBR5bKddAbur7HJoT32EPiNP0nE-dmnVSqiX5GJHiccT_8by_AfgHWLBNToRIaY-SgjRI6RrpFE5NI4QNguJwscnqneRfLqUl3Ow1-bC1PoQ0w234BnV_zo4eNiQ3p2phtqRp4hdyCfwNFEUpgQiOptqR3VD_YJaLFVEnLC9VZ7lYrft-ftaNAPMh5harTOHS3DVvmF9vOR6526CO_b7H-KN__kJz2Gx4U_2vp4wL2DOD17CUlvbgTWuvgyj09Lf__jZv6X_DRuboCHMzM2XYdmffL1lYfeW9cuyKmRfsg_mbhySMZkLMrxNBS1mBo7Z4Uyhlg0L1q_zgr_Ro8P66Vg4P1Jpi76Ci8OD8_1e1FRniCwhgoykRG0KryR249RJTHTGU5tqlSpe2MypzMUuFhlm2mhuuHUEP-iLuChQaBfHKzA_GA78KjClUuuTgnCP-4T40yjHkchHCiMoRrQd2G7tlNtGujxU0LjJa9FlkdNA5mEgO_B22nJUy3X8pc1Ga-q8cdhx3tVJlyJHkcQd2Kps9s_--f7pQbivPbbhG3jWOz8-yo8-nnxehwURwIBWPyE3YJ5M4F8T1kxws5q-vwBz7_fm
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1Lb9QwEMdHpZUQF1oKiIVSXKmCU1qvEzuxOKG22_JotUJU6gEp8vgBK9rdVXZ7gBMfgc_IJ2Gcxy4gkBCX5GJHiceT-dvy_AZgFzFwjU4kiLlPMpLoCdI10agcGkcStoiJwqdn6uQ8e3UhL1bgeZcL0_AhFhtu0TPq_3V0cD91YX9JDbVTTyt2IW_AWiZ1Ec_zHb5dsKP6sX5BA0sVCSfZ3pFnudjvev4ai5YC82eZWseZwTq8796wOV7yae96jnv2y2_wxv_8hA243epP9qKZMHdgxY83Yb2r7cBaV78L02Hlv3_9Nrqi_w2bmcgQZubyw6QazT9esbh7y0ZVVReyr9ixuZ7FZEzmIoa3raDFzNgxO1kSatkksFGTF_yZHh3jp2Px_EjNFr0H54OjdwcnSVudIbEkEWQiJWoTvJLYT3MnMdMFz22uVa54sIVThUtdKgostNHccOtI_KAPaQgotEvT-7A6noz9A2BK5dZngeQe9xnpT6McR1I-UhhBa0Tbg2ednUrbostjBY3LsoEui5IGsowD2YOdRctpg-v4Q5utztRl67Czsq-zPq0cRZb24Glts7_2Lw-GR_H-8F8bPoGbw8NB-ebl2etHcEtEXUDBT8gtWCUL-Mekaua4Xc_eHyi292o
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Pre%E2%80%90image+sample+algorithm+with+irregular+Gaussian+distribution+and+construction+of+identity%E2%80%90based+signature&rft.jtitle=Concurrency+and+computation&rft.au=Yan%2C+Jianhua&rft.au=Wang%2C+Licheng&rft.au=Li%2C+Jing&rft.au=Li%2C+Muzi&rft.date=2017-10-25&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=29&rft.issue=20&rft_id=info:doi/10.1002%2Fcpe.3925&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_cpe_3925
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon