Pre‐image sample algorithm with irregular Gaussian distribution and construction of identity‐based signature
Summary Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and flexibility. The pre‐image sample algorithm is the most fundamental algorithm in lattice‐based cryptography for its comprehensive applicat...
Saved in:
| Published in | Concurrency and computation Vol. 29; no. 20 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Hoboken
Wiley Subscription Services, Inc
25.10.2017
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1532-0626 1532-0634 |
| DOI | 10.1002/cpe.3925 |
Cover
| Abstract | Summary
Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and flexibility. The pre‐image sample algorithm is the most fundamental algorithm in lattice‐based cryptography for its comprehensive applications in various primitives. Currently,
SampleDO due to Micciancio and Peikert (MP) sample algorithm is the most efficient pre‐image sample algorithm. However, this algorithm also needs massive computations. On the one hand, it expenses the cube of the lattice dimension multiplications over reals to set matrices as Gaussian parameters. On the other hand, it needs complex discrete convolution computations.
First, this paper proposes an efficient pre‐image sample algorithm with outputs obeying irregular Gaussian distribution. Two measures are adopted to prevent the leakage of the geometrical property of trapdoor caused by irregular Gaussian outputs. A variant of MP trapdoor is proposed, and a new trapdoor is randomly assembled from a big enough space in each sample. Although still using a matrix as the Guassian parameter, in the proposed algorithm, the computational cost to set Gaussian parameters is zero. Meanwhile, the computational overhead for every sample is far less than that of MP sample algorithm. Second, to demonstrate the security and efficiency of the proposed sample algorithm, a hierarchical identity‐based signature scheme is put forward. This scheme is proved existentially unforgeable against selective identity adaptively chosen‐message attacks. Furthermore, the theoretical analysis shows that the proposed identity‐based signature is more efficient than the existing schemes. Copyright © 2016 John Wiley & Sons, Ltd. |
|---|---|
| AbstractList | Summary
Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and flexibility. The pre‐image sample algorithm is the most fundamental algorithm in lattice‐based cryptography for its comprehensive applications in various primitives. Currently,
SampleDO due to Micciancio and Peikert (MP) sample algorithm is the most efficient pre‐image sample algorithm. However, this algorithm also needs massive computations. On the one hand, it expenses the cube of the lattice dimension multiplications over reals to set matrices as Gaussian parameters. On the other hand, it needs complex discrete convolution computations.
First, this paper proposes an efficient pre‐image sample algorithm with outputs obeying irregular Gaussian distribution. Two measures are adopted to prevent the leakage of the geometrical property of trapdoor caused by irregular Gaussian outputs. A variant of MP trapdoor is proposed, and a new trapdoor is randomly assembled from a big enough space in each sample. Although still using a matrix as the Guassian parameter, in the proposed algorithm, the computational cost to set Gaussian parameters is zero. Meanwhile, the computational overhead for every sample is far less than that of MP sample algorithm. Second, to demonstrate the security and efficiency of the proposed sample algorithm, a hierarchical identity‐based signature scheme is put forward. This scheme is proved existentially unforgeable against selective identity adaptively chosen‐message attacks. Furthermore, the theoretical analysis shows that the proposed identity‐based signature is more efficient than the existing schemes. Copyright © 2016 John Wiley & Sons, Ltd. Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and flexibility. The pre‐image sample algorithm is the most fundamental algorithm in lattice‐based cryptography for its comprehensive applications in various primitives. Currently, due to Micciancio and Peikert (MP) sample algorithm is the most efficient pre‐image sample algorithm. However, this algorithm also needs massive computations. On the one hand, it expenses the cube of the lattice dimension multiplications over reals to set matrices as Gaussian parameters. On the other hand, it needs complex discrete convolution computations. First, this paper proposes an efficient pre‐image sample algorithm with outputs obeying irregular Gaussian distribution. Two measures are adopted to prevent the leakage of the geometrical property of trapdoor caused by irregular Gaussian outputs. A variant of MP trapdoor is proposed, and a new trapdoor is randomly assembled from a big enough space in each sample. Although still using a matrix as the Guassian parameter, in the proposed algorithm, the computational cost to set Gaussian parameters is zero. Meanwhile, the computational overhead for every sample is far less than that of MP sample algorithm. Second, to demonstrate the security and efficiency of the proposed sample algorithm, a hierarchical identity‐based signature scheme is put forward. This scheme is proved existentially unforgeable against selective identity adaptively chosen‐message attacks. Furthermore, the theoretical analysis shows that the proposed identity‐based signature is more efficient than the existing schemes. Copyright © 2016 John Wiley & Sons, Ltd. Summary Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst-case hardness, simple computation kind, and flexibility. The pre-image sample algorithm is the most fundamental algorithm in lattice-based cryptography for its comprehensive applications in various primitives. Currently, SampleD O due to Micciancio and Peikert (MP) sample algorithm is the most efficient pre-image sample algorithm. However, this algorithm also needs massive computations. On the one hand, it expenses the cube of the lattice dimension multiplications over reals to set matrices as Gaussian parameters. On the other hand, it needs complex discrete convolution computations. First, this paper proposes an efficient pre-image sample algorithm with outputs obeying irregular Gaussian distribution. Two measures are adopted to prevent the leakage of the geometrical property of trapdoor caused by irregular Gaussian outputs. A variant of MP trapdoor is proposed, and a new trapdoor is randomly assembled from a big enough space in each sample. Although still using a matrix as the Guassian parameter, in the proposed algorithm, the computational cost to set Gaussian parameters is zero. Meanwhile, the computational overhead for every sample is far less than that of MP sample algorithm. Second, to demonstrate the security and efficiency of the proposed sample algorithm, a hierarchical identity-based signature scheme is put forward. This scheme is proved existentially unforgeable against selective identity adaptively chosen-message attacks. Furthermore, the theoretical analysis shows that the proposed identity-based signature is more efficient than the existing schemes. Copyright © 2016 John Wiley & Sons, Ltd. |
| Author | Li, Jing Yan, Jianhua Yang, Yixan Li, Muzi Wang, Licheng Yao, Wenbin |
| Author_xml | – sequence: 1 givenname: Jianhua surname: Yan fullname: Yan, Jianhua organization: Beijing University of Posts and Telecommunications – sequence: 2 givenname: Licheng surname: Wang fullname: Wang, Licheng email: wanglc@bupt.edu.cn organization: Beijing University of Posts and Telecommunications – sequence: 3 givenname: Jing surname: Li fullname: Li, Jing organization: Beijing University of Posts and Telecommunications – sequence: 4 givenname: Muzi surname: Li fullname: Li, Muzi organization: Ludong University – sequence: 5 givenname: Yixan surname: Yang fullname: Yang, Yixan organization: Beijing University of Posts and Telecommunications – sequence: 6 givenname: Wenbin surname: Yao fullname: Yao, Wenbin organization: Beijing University of Posts and Telecommunications |
| BookMark | eNp1kM9Kw0AQxhdRsK2Cj7DgxUvqbjbZZo9SahUK9qDnsH_jlnQTdzeU3nwEn9EnMWnFg-hlZvj4zTfMNwanrnEagCuMphih9Fa2ekpYmp-AEc5JmiBKstOfOaXnYBzCBiGMEcEj0K69_nz_sFteaRj4tq015HXVeBtft3DXV2i911VXcw-XvAvBcgeVDdFb0UXbOMidgrJxvdLJg9AYaJV20cZ9by140AoGWzkeO68vwJnhddCX330CXu4Xz_OHZPW0fJzfrRKZMpIneS4YN5rmApOZykXGCjSTM0ZnFBlZKFoookhaiIJxhjiSimZEaEOMESlThEzA9dG39c1bp0MsN03nXX-yxCzDmGZpNlA3R0r6JgSvTdn6Pgu_LzEqhzzLPs9yyLNHp79QaSMfHo6e2_qvheS4sLO13v9rXM7XiwP_BXTOjHI |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2017_2757464 crossref_primary_10_1002_cpe_4162 crossref_primary_10_1093_comjnl_bxaa011 |
| Cites_doi | 10.1007/978-3-642-14623-7_5 10.1007/978-3-642-40041-4_5 10.1007/s00224-010-9278-3 10.1007/978-3-662-46447-2_32 10.1007/978-3-642-13013-7_29 10.1145/2090236.2090262 10.1007/978-3-642-38348-9_28 10.1007/978-3-642-14623-7_6 10.1145/1536414.1536461 10.1137/080733954 10.1145/1060590.1060603 10.1007/978-1-4615-0897-7 10.1007/978-3-642-40041-4_3 10.1137/S0097539705447360 10.1007/978-3-642-32009-5_50 10.1007/978-3-642-25385-0_2 10.1145/2488608.2488677 10.1007/978-3-642-29011-4_41 10.1109/FOCS.2011.12 10.1007/978-3-642-13190-5_28 10.1002/sec.531 10.1007/978-3-642-12929-2_14 10.1155/2013/416282 10.1137/S0097539795293172 10.1007/978-3-642-28914-9_5 10.1145/1374376.1374407 |
| ContentType | Journal Article |
| Copyright | Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd. |
| Copyright_xml | – notice: Copyright © 2016 John Wiley & Sons, Ltd. – notice: Copyright © 2017 John Wiley & Sons, Ltd. |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1002/cpe.3925 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1532-0634 |
| EndPage | n/a |
| ExternalDocumentID | 10_1002_cpe_3925 CPE3925 |
| Genre | article |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China (NSFC) funderid: nos. 61370194; 61411146001; 61502048 |
| GroupedDBID | .3N .DC .GA 05W 0R~ 10A 1L6 1OB 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHQN AAMNL AANLZ AAONW AASGY AAXRX AAYCA AAZKR ABCQN ABCUV ABEML ABIJN ACAHQ ACCZN ACPOU ACSCC ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADMLS ADOZA ADXAS ADZMN AEIGN AEIMD AEUYR AEYWJ AFBPY AFFPM AFGKR AFWVQ AGHNM AGYGG AHBTC AITYG AIURR AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZBYB BAFTC BDRZF BFHJK BHBCM BMNLL BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM EBS EJD F00 F01 F04 F5P G-S G.N GNP GODZA HGLYW HHY HZ~ IX1 JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LW6 LYRES MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A O66 O9- OIG P2W P2X P4D PQQKQ Q.N Q11 QB0 QRW R.K ROL RX1 SUPJJ TN5 UB1 V2E W8V W99 WBKPD WIH WIK WOHZO WQJ WXSBR WYISQ WZISG XG1 XV2 ~IA ~WT AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c2935-55b9afe65b137d5b49807c796760fc8d68d3d328b89a90a0cd643bef3ffb29d33 |
| IEDL.DBID | DR2 |
| ISSN | 1532-0626 |
| IngestDate | Sun Jul 13 03:59:23 EDT 2025 Thu Apr 24 22:57:43 EDT 2025 Wed Oct 01 00:58:56 EDT 2025 Tue Sep 09 05:11:36 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 20 |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2935-55b9afe65b137d5b49807c796760fc8d68d3d328b89a90a0cd643bef3ffb29d33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 1941164243 |
| PQPubID | 2045170 |
| PageCount | 1 |
| ParticipantIDs | proquest_journals_1941164243 crossref_primary_10_1002_cpe_3925 crossref_citationtrail_10_1002_cpe_3925 wiley_primary_10_1002_cpe_3925_CPE3925 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 25 October 2017 |
| PublicationDateYYYYMMDD | 2017-10-25 |
| PublicationDate_xml | – month: 10 year: 2017 text: 25 October 2017 day: 25 |
| PublicationDecade | 2010 |
| PublicationPlace | Hoboken |
| PublicationPlace_xml | – name: Hoboken |
| PublicationTitle | Concurrency and computation |
| PublicationYear | 2017 |
| Publisher | Wiley Subscription Services, Inc |
| Publisher_xml | – name: Wiley Subscription Services, Inc |
| References | 2012 2011 2013; 2013 2010 1997; 26 2011; 40 2009 2008 2005 2015 2011; 48 2013 2002 2013; 6 2007; 37 e_1_2_10_23_1 e_1_2_10_24_1 e_1_2_10_21_1 e_1_2_10_22_1 e_1_2_10_20_1 e_1_2_10_2_1 e_1_2_10_4_1 e_1_2_10_18_1 e_1_2_10_3_1 e_1_2_10_19_1 e_1_2_10_6_1 e_1_2_10_16_1 e_1_2_10_5_1 e_1_2_10_17_1 e_1_2_10_8_1 e_1_2_10_14_1 e_1_2_10_7_1 e_1_2_10_15_1 e_1_2_10_12_1 e_1_2_10_9_1 e_1_2_10_13_1 e_1_2_10_10_1 e_1_2_10_11_1 e_1_2_10_27_1 e_1_2_10_25_1 e_1_2_10_26_1 |
| References_xml | – start-page: 716 year: 2015 end-page: 730 – start-page: 309 year: 2012 end-page: 325 – volume: 48 start-page: 535 year: 2011 end-page: 553 article-title: Generating shorter bases for hard random lattices publication-title: Theory of Computing Systems – start-page: 97 year: 2011 end-page: 106 – start-page: 98 year: 2010 end-page: 115 – start-page: 40 year: 2013 end-page: 56 – start-page: 868 year: 2012 end-page: 886 – volume: 37 start-page: 267 issue: 1 year: 2007 end-page: 302 article-title: Worst‐case to average‐case reductions based on Gaussian measure publication-title: SIAM Journal on Computing – start-page: 553 year: 2010 end-page: 572 – start-page: 499 year: 2010 end-page: 517 – start-page: 21 year: 2011 end-page: 40 – start-page: 80 year: 2010 end-page: 97 – start-page: 75 year: 2012 end-page: 93 – volume: 40 start-page: 1803 issue: 6 year: 2011 end-page: 1844 article-title: Lossy trapdoor functions and their applications publication-title: SIAM Journal on Computing – start-page: 197 year: 2008 end-page: 206 – volume: 6 start-page: 69 issue: 1 year: 2013 end-page: 77 article-title: Efficient and strongly unforgeable identity‐based signature scheme from lattices in the standard model publication-title: Security and Communication Networks – volume: 26 start-page: 1484 issue: 5 year: 1997 end-page: 1509 article-title: Polynomial‐time algorithms for prime factorization and discrete logarithms on a quantum computer publication-title: SIAM Journal on Computing – start-page: 461 year: 2013 end-page: 485 – start-page: 700 year: 2012 end-page: 718 – volume: 2013 start-page: 1 year: 2013 end-page: 18 article-title: Efficient lattice‐based signcryption in standard model publication-title: Mathematical Problems in Engineering – start-page: 333—342 year: 2009 – start-page: 545 year: 2013 end-page: 554 – year: 2002 – start-page: 182 year: 2010 end-page: 200 – start-page: 75 year: 2013 end-page: 92 – start-page: 84 year: 2005 end-page: 93 – ident: e_1_2_10_16_1 doi: 10.1007/978-3-642-14623-7_5 – ident: e_1_2_10_11_1 doi: 10.1007/978-3-642-40041-4_5 – ident: e_1_2_10_15_1 doi: 10.1007/s00224-010-9278-3 – ident: e_1_2_10_17_1 doi: 10.1007/978-3-662-46447-2_32 – ident: e_1_2_10_27_1 doi: 10.1007/978-3-642-13013-7_29 – ident: e_1_2_10_9_1 doi: 10.1145/2090236.2090262 – ident: e_1_2_10_24_1 doi: 10.1007/978-3-642-38348-9_28 – ident: e_1_2_10_20_1 doi: 10.1007/978-3-642-14623-7_6 – ident: e_1_2_10_4_1 doi: 10.1145/1536414.1536461 – ident: e_1_2_10_5_1 doi: 10.1137/080733954 – ident: e_1_2_10_19_1 doi: 10.1145/1060590.1060603 – ident: e_1_2_10_21_1 doi: 10.1007/978-1-4615-0897-7 – ident: e_1_2_10_7_1 doi: 10.1007/978-3-642-40041-4_3 – ident: e_1_2_10_18_1 doi: 10.1137/S0097539705447360 – ident: e_1_2_10_10_1 doi: 10.1007/978-3-642-32009-5_50 – ident: e_1_2_10_12_1 doi: 10.1007/978-3-642-25385-0_2 – ident: e_1_2_10_13_1 doi: 10.1145/2488608.2488677 – ident: e_1_2_10_14_1 doi: 10.1007/978-3-642-29011-4_41 – ident: e_1_2_10_8_1 doi: 10.1109/FOCS.2011.12 – ident: e_1_2_10_22_1 doi: 10.1007/978-3-642-13190-5_28 – ident: e_1_2_10_23_1 doi: 10.1002/sec.531 – ident: e_1_2_10_25_1 doi: 10.1007/978-3-642-12929-2_14 – ident: e_1_2_10_26_1 doi: 10.1155/2013/416282 – ident: e_1_2_10_2_1 doi: 10.1137/S0097539795293172 – ident: e_1_2_10_6_1 doi: 10.1007/978-3-642-28914-9_5 – ident: e_1_2_10_3_1 doi: 10.1145/1374376.1374407 |
| SSID | ssj0011031 |
| Score | 2.1587536 |
| Snippet | Summary
Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind,... Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst‐case hardness, simple computation kind, and... Summary Lattice has become an attractive cryptographic tool due to its potential resistance to quantum attacks, worst-case hardness, simple computation kind,... |
| SourceID | proquest crossref wiley |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| SubjectTerms | Algorithms concurrent computation Convolution Costs Cryptography Gaussian distribution IBS irregular Gaussian distribution Normal distribution post‐quantum cryptography pre‐image sample algorithm Surface hardness |
| Title | Pre‐image sample algorithm with irregular Gaussian distribution and construction of identity‐based signature |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.3925 https://www.proquest.com/docview/1941164243 |
| Volume | 29 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1532-0634 dateEnd: 20241102 omitProxy: false ssIdentifier: ssj0011031 issn: 1532-0626 databaseCode: ADMLS dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1532-0626 databaseCode: DR2 dateStart: 19960101 customDbUrl: isFulltext: true eissn: 1532-0634 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0011031 providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1LS8QwEMeDePLiW1xdJYLoqZqmbdocRdRFUBZREDyUTJLq4r7orgc9-RH8jH4SJ33sqiiIl_aSlDbJdH4TMv8hZBcgYxIM9wBi64WI6B7g1ZMgDCiDCJu4ROGLS9G6Cc9vo9vqVKXLhSn1ISYbbs4yiv-1M3AFo8OpaKgeWgzYucsv9wNRRFNXE-Uo31UvKKVSuccQ2mvdWcYP645fPdEULz9DauFlThfIXf1-5eGSx4OnMRzol2_Sjf_7gEUyX8EnPSpXyxKZsf1lslAXdqCVna-QYTu3769vnR7-bOhIOQFhqrr3g7wzfuhRt3VLO3leVLHP6Zl6GrlMTGqcBm9VPouqvqF6MJWnpYOMdsqk4Gd8tHOehrrDI4Ww6Cq5OT25Pm55VWkGTyMfRF4UgVSZFRH4QWwiCGXCYh1LEQuW6cSIxAQm4AkkUkmmmDZIPmCzIMuASxMEa2S2P-jbdUKFiLUNM2Q9ZkOETyUMA8SeiCuOAaJukP16mlJd6Za78hndtFRc5ikOZOoGskF2Ji2HpVbHD22a9UynlbWOUl-GPoaNPAwaZK-Ysl_7p8ftE3ff-GvDTTLHHQmgu-NRk8zisNst5JgxbBcr9gM8kfPF |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ3NTtwwEMdHlB7KBdpSxAKlrlTBKeB1YicWpwpBty0ghEDigBR5bKddAbur7HJoT32EPiNP0nE-dmnVSqiX5GJHiccT_8by_AfgHWLBNToRIaY-SgjRI6RrpFE5NI4QNguJwscnqneRfLqUl3Ow1-bC1PoQ0w234BnV_zo4eNiQ3p2phtqRp4hdyCfwNFEUpgQiOptqR3VD_YJaLFVEnLC9VZ7lYrft-ftaNAPMh5harTOHS3DVvmF9vOR6526CO_b7H-KN__kJz2Gx4U_2vp4wL2DOD17CUlvbgTWuvgyj09Lf__jZv6X_DRuboCHMzM2XYdmffL1lYfeW9cuyKmRfsg_mbhySMZkLMrxNBS1mBo7Z4Uyhlg0L1q_zgr_Ro8P66Vg4P1Jpi76Ci8OD8_1e1FRniCwhgoykRG0KryR249RJTHTGU5tqlSpe2MypzMUuFhlm2mhuuHUEP-iLuChQaBfHKzA_GA78KjClUuuTgnCP-4T40yjHkchHCiMoRrQd2G7tlNtGujxU0LjJa9FlkdNA5mEgO_B22nJUy3X8pc1Ga-q8cdhx3tVJlyJHkcQd2Kps9s_--f7pQbivPbbhG3jWOz8-yo8-nnxehwURwIBWPyE3YJ5M4F8T1kxws5q-vwBz7_fm |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1Lb9QwEMdHpZUQF1oKiIVSXKmCU1qvEzuxOKG22_JotUJU6gEp8vgBK9rdVXZ7gBMfgc_IJ2Gcxy4gkBCX5GJHiceT-dvy_AZgFzFwjU4kiLlPMpLoCdI10agcGkcStoiJwqdn6uQ8e3UhL1bgeZcL0_AhFhtu0TPq_3V0cD91YX9JDbVTTyt2IW_AWiZ1Ec_zHb5dsKP6sX5BA0sVCSfZ3pFnudjvev4ai5YC82eZWseZwTq8796wOV7yae96jnv2y2_wxv_8hA243epP9qKZMHdgxY83Yb2r7cBaV78L02Hlv3_9Nrqi_w2bmcgQZubyw6QazT9esbh7y0ZVVReyr9ixuZ7FZEzmIoa3raDFzNgxO1kSatkksFGTF_yZHh3jp2Px_EjNFr0H54OjdwcnSVudIbEkEWQiJWoTvJLYT3MnMdMFz22uVa54sIVThUtdKgostNHccOtI_KAPaQgotEvT-7A6noz9A2BK5dZngeQe9xnpT6McR1I-UhhBa0Tbg2ednUrbostjBY3LsoEui5IGsowD2YOdRctpg-v4Q5utztRl67Czsq-zPq0cRZb24Glts7_2Lw-GR_H-8F8bPoGbw8NB-ebl2etHcEtEXUDBT8gtWCUL-Mekaua4Xc_eHyi292o |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Pre%E2%80%90image+sample+algorithm+with+irregular+Gaussian+distribution+and+construction+of+identity%E2%80%90based+signature&rft.jtitle=Concurrency+and+computation&rft.au=Yan%2C+Jianhua&rft.au=Wang%2C+Licheng&rft.au=Li%2C+Jing&rft.au=Li%2C+Muzi&rft.date=2017-10-25&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=29&rft.issue=20&rft_id=info:doi/10.1002%2Fcpe.3925&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_cpe_3925 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon |