{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:06:27Z","timestamp":1730228787817,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/icait.2017.8388821","type":"proceedings-article","created":{"date-parts":[[2018,6,21]],"date-time":"2018-06-21T22:32:13Z","timestamp":1529620333000},"page":"20-24","source":"Crossref","is-referenced-by-count":0,"title":["A public key encryption scheme based on compressed sensing"],"prefix":"10.1109","author":[{"given":"Liu","family":"Zhen","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1561\/0400000074"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2010.26"},{"key":"ref14","first-page":"319","article-title":"Better key sizes (and attacks) for LWE-based encryption[C]","author":"lindnerr","year":"2011","journal-title":"Cryptographers&#x2018; Track at the RSA Conference"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11659-4_12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-010-9278-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_41"},{"journal-title":"Inverse Problems of Compressed Sensing and Cooperative Networks over Finite Fields[J]","year":"2014","author":"seong","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2277451"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0909892106"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753187"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2189222"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2450676"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2407315"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909108"},{"key":"ref9","first-page":"13","article-title":"Survey of lattice-based cryptography[J]","volume":"1","author":"wang","year":"2014","journal-title":"Journal of Cryptologic Research"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638794"},{"journal-title":"On the compressed measurements over finite fields Sparse or dense sampling[J]","year":"2012","author":"seong","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205666"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025257"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488680"}],"event":{"name":"2017 9th International Conference on Advanced Infocomm Technology (ICAIT)","start":{"date-parts":[[2017,11,22]]},"location":"Chengdu","end":{"date-parts":[[2017,11,24]]}},"container-title":["2017 9th International Conference on Advanced Infocomm Technology (ICAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8379735\/8388809\/08388821.pdf?arnumber=8388821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T22:59:07Z","timestamp":1531177147000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8388821\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icait.2017.8388821","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}