期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
基于双线性配对的可验证签密方案 被引量:2
1
作者 黄梦桥 李庆国 马昌社 《计算机工程》 CAS CSCD 北大核心 2010年第1期139-142,共4页
在传统的签密方案中,只有接收者能验证其签名的正确性,导致签密不能直接应用于公平交换协议的设计中。针对上述问题,提出一个可验证的签密方案及其形式化安全模型,基于双线性配对设计一个高效的可验证算法,在随机预言机模型下证明该方... 在传统的签密方案中,只有接收者能验证其签名的正确性,导致签密不能直接应用于公平交换协议的设计中。针对上述问题,提出一个可验证的签密方案及其形式化安全模型,基于双线性配对设计一个高效的可验证算法,在随机预言机模型下证明该方案的不可伪造性和安全性。 展开更多
关键词 验证 随机预言机 可证明安全
在线阅读 下载PDF
一个采用分段验证签密隐蔽路由的设计与实现 被引量:1
2
作者 赵福祥 赵红云 +1 位作者 王育民 杨世平 《电子学报》 EI CAS CSCD 北大核心 2002年第7期995-998,共4页
在公开的计算机网络中采用隐蔽路由网络连接 ,任何隐蔽网络的用户只能获得与其直接连接的前序和后继节点的地址 ,使得攻击者既不能窃听到机密 ,也不能实施流量分析 .现有的隐蔽路由方案或采用原子签名和加密 ,或采用嵌套加密和签名 ,即... 在公开的计算机网络中采用隐蔽路由网络连接 ,任何隐蔽网络的用户只能获得与其直接连接的前序和后继节点的地址 ,使得攻击者既不能窃听到机密 ,也不能实施流量分析 .现有的隐蔽路由方案或采用原子签名和加密 ,或采用嵌套加密和签名 ,即洋葱路由 ,本文应用分段验证签密的方法提出了一个新的隐蔽路由实现方案 ,该方案用签密代替现有方案中先签名再加密两步常规密码方法 ,减少协议的计算和通信量 ,提高了执行效率 ,并包容了两种方法各自具有的优点 .最后分析了方案的安全性 . 展开更多
关键词 网络安全 信息隐蔽 隐蔽路由 分段验证 计算机网
在线阅读 下载PDF
采用分段验证签密的移动代理新方案
3
作者 赵福祥 《计算机应用》 CSCD 北大核心 2008年第S2期252-254,共3页
密码的应用可使移动代理免受运行主机上恶意软件的攻击,保持其携带信息的机密性并不受撺扰。结合分段验证签密与多方签密,一个采用分段验证签密的移动代理系统新方案被提出,此设计方案具有防止各主机彼此间偷窥与伪造信息的性能。这类... 密码的应用可使移动代理免受运行主机上恶意软件的攻击,保持其携带信息的机密性并不受撺扰。结合分段验证签密与多方签密,一个采用分段验证签密的移动代理系统新方案被提出,此设计方案具有防止各主机彼此间偷窥与伪造信息的性能。这类移动代理的目标是采集网络多方的敏感数据,这种情况下,对信息提供主机和非信息提供主机的防犯都是重要的。 展开更多
关键词 网络安全 移动代理 分段验证
在线阅读 下载PDF
使用双线性对的指定验证人代理签密
4
作者 俞惠芳 王彩芬 《计算机工程与应用》 CSCD 北大核心 2010年第18期125-127,共3页
指定验证人代理签密要求代理签密人只能对发给指定验证人的信息代理原始签密人签密,而其他人则不能代理原始签密人签密。基于指定验证人代理签密和自认证密码系统的理论,一个使用双线性对的指定验证人代理签密被提出。该方案具有以下特... 指定验证人代理签密要求代理签密人只能对发给指定验证人的信息代理原始签密人签密,而其他人则不能代理原始签密人签密。基于指定验证人代理签密和自认证密码系统的理论,一个使用双线性对的指定验证人代理签密被提出。该方案具有以下特点:在传送代理签密时,没有必要传送消息,因为指定验证人能从代理签密中正确恢复出消息;能够在逻辑单步内同时验证代理签密的有效性和公钥的真伪;克服了密钥托管问题;不需要对公钥显式认证。与已有方案相比,新方案仅仅需要2次pairings运算,效率很高。 展开更多
关键词 双线性对 指定验证人代理 自认证密码系统
在线阅读 下载PDF
一个采用分段验证签密的Mobile Agent新方案
5
作者 赵福祥 《西安外事学院学报》 2008年第1期96-101,共6页
移动代理系统在未来分布式计算机环境中将会起到极为重要的作用。引入异步式通信软件移动代理的主要目的在于提高整个网络的效率,把现有网络中信息被动地传输的结构转变成为以信息传输与处理相结合主动的分布式结构。它将带来许多益处... 移动代理系统在未来分布式计算机环境中将会起到极为重要的作用。引入异步式通信软件移动代理的主要目的在于提高整个网络的效率,把现有网络中信息被动地传输的结构转变成为以信息传输与处理相结合主动的分布式结构。它将带来许多益处因而应用前景广阔。但是,软件编制的移动代理容易受其运行主机上恶意软件的攻击,保护移动代理不受撺扰成为移动代理能正常运行的关键。而一般的加密及签字技术不能直接适用于移动代理环境,因此,需要开发新的签字加密技术。结合多方签密技术,文中提出了一个采用分段验证签密的移动代理系统新方案,以增强移动代理的安全效率和可靠性。最后对其做了安全分析。 展开更多
关键词 网络安全 移动代理 分段验证
在线阅读 下载PDF
一个改进的强指定验证者签密方案 被引量:1
6
作者 李元晓 周彦伟 杨波 《计算机应用研究》 CSCD 北大核心 2020年第2期518-520,534,共4页
Sujata等人在2012年提出了一个基于离散对数的强指定验证者签密方案,然而分析可知Sujata等人的方案无法抵抗授权攻击,并且验证权具有可委托性。针对上述不足,给出了一个改进的强指定验证者签密方案,仅有指定的验证者才能验证签密密文的... Sujata等人在2012年提出了一个基于离散对数的强指定验证者签密方案,然而分析可知Sujata等人的方案无法抵抗授权攻击,并且验证权具有可委托性。针对上述不足,给出了一个改进的强指定验证者签密方案,仅有指定的验证者才能验证签密密文的有效性;此外,指定的验证者能够生成一个与原始签密密文不可区分的签密副本。安全分析表明,该方案不仅能够抵抗适应性选择明文攻击,而且在提供认证的同时可保证签密密文的不可伪造性。由于该方案的上述优越性能,在实际生活中具有广泛的应用前景,如区块链、电子投票、电子招标等场景。 展开更多
关键词 强指定验证 授权攻击 不可伪造 不可区分
在线阅读 下载PDF
对共享验证门限代理签密方案的改进
7
作者 邢星 谢琪 《计算机工程与应用》 CSCD 北大核心 2008年第33期89-92,共4页
指出了王等的具有共享验证的门限代理签密方案存在两个安全性缺陷,一是该方案并不满足共享验证这一特性,二是代理组可修改授权证书。进一步,给出了改进方案,克服了原方案的缺陷。
关键词 门限代理 共享验证 验证
在线阅读 下载PDF
身份基广义指定验证者签密方案的分析
8
作者 徐明恒 周才学 《福建电脑》 2021年第9期50-52,共3页
为了更好地探究广义指定验证者签密方案的安全性,对一个随机预言机模型下的身份基广义指定验证者签密方案进行了安全性分析,利用接收者与任意第三方合谋的方法对原方案进行了伪造性攻击。本文通过对原方案的具体攻击,演示了一个恶意的... 为了更好地探究广义指定验证者签密方案的安全性,对一个随机预言机模型下的身份基广义指定验证者签密方案进行了安全性分析,利用接收者与任意第三方合谋的方法对原方案进行了伪造性攻击。本文通过对原方案的具体攻击,演示了一个恶意的接收者可以与某个第三方合谋来破坏方案的不可伪造性。该攻击表明原方案是不安全的,难以在实际环境中进行应用。 展开更多
关键词 广义指定验证 身份基 双线性对 随机预言机
在线阅读 下载PDF
电子云医疗中的指定验证者签密方案
9
作者 岳峰 《无线互联科技》 2021年第9期53-55,共3页
电子云医疗正逐步取代传统纸质,成为记录患者医疗数据和信息的主要方式。电子云医疗将患者医疗数据存储于云上,既有助于医院对病人信息的高效管理,更有助于医生对患者病情做出精准判断。但由于数据存储在远程云上,患者医疗信息的私密性... 电子云医疗正逐步取代传统纸质,成为记录患者医疗数据和信息的主要方式。电子云医疗将患者医疗数据存储于云上,既有助于医院对病人信息的高效管理,更有助于医生对患者病情做出精准判断。但由于数据存储在远程云上,患者医疗信息的私密性、安全性无法得到保证。文章基于密码学提出一个指定验证者签密方案,对存储于云上的医疗数据进行签密处理。该方案中只有签名者指定的人才可以解密数据和验证签名,达到保护患者隐私的目的。 展开更多
关键词 电子云医疗 隐私安全 密码学 指定验证
在线阅读 下载PDF
Verifiable threshold signature schemes against conspiracy attack 被引量:21
10
作者 甘元驹 《Journal of Zhejiang University Science》 EI CSCD 2004年第1期50-54,共5页
In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by th... In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced. 展开更多
关键词 CRYPTOGRAPHY Threshold group signature Conspiracy attack Forgery attack
在线阅读 下载PDF
Preventing“Bad”Content Dispersal in Named Data Networking 被引量:2
11
作者 Yi Wang Zhuyun Qi Bin Liu 《China Communications》 SCIE CSCD 2018年第6期109-119,共11页
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ... Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead. 展开更多
关键词 named data networking ROUTER content verification encryption algorithm
在线阅读 下载PDF
Identity-Based Proxy Verifiably Encrypted Signature Scheme 被引量:2
12
作者 Liu Jianhua Liu Jianwei Qiu Xiufeng 《China Communications》 SCIE CSCD 2012年第11期137-149,共13页
A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages o... A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages of a proxy signature and a VES in order to delegate the signing capability of the VES of an entity called the original signer to another entity, called the proxy signer. In this IPVES scheme, the original signer delegates his/her signing capability to the proxy signer. The proxy signer issues a signature by using a proxy signing key, encrypts the signature under a designated public key, and subsequently convinces a verifier that the resulting ciphertext contains such a signature. We prove that the proposed IPVES scheme is secure in a random oracle model under the computational Diffie-Hellman assumption. 展开更多
关键词 digital signature proxy signature random oracle model information security
在线阅读 下载PDF
Signature Verification for Multiuser Online Kanji Learning System
13
作者 Jungpil Shin Junichi Sato 《Computer Technology and Application》 2012年第3期211-218,共8页
Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' res... Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system. 展开更多
关键词 Signature verification character learning method dynamic programming.
在线阅读 下载PDF
A Public Verifiable Identity Based Signcryption in the Random Oracle Model
14
作者 陈雯 潘峰 +1 位作者 郭放 雷飞宇 《Journal of Donghua University(English Edition)》 EI CAS 2009年第4期368-373,共6页
Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue a... Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model. 展开更多
关键词 identity based signcrvption public verifiability random oracle
在线阅读 下载PDF
Key substitution attacks on some verifiably encrypted signature schemes
15
作者 夏琦 Xu Chunxiang Yu Yong 《High Technology Letters》 EI CAS 2011年第2期191-195,共5页
As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and mos... As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting. 展开更多
关键词 CRYPTOGRAPHY fair exchange verifiably encrypted signature key substitution attack
在线阅读 下载PDF
Provably Secure Self-Certified Signature Schemes with Message Recovery
16
作者 Zhang Shengyuan Tang Fei Lin Changlu Ke Pinhui 《China Communications》 SCIE CSCD 2012年第10期112-119,共8页
To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key... To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes . 展开更多
关键词 digital signature self-certified public key message recovery random oracle model
在线阅读 下载PDF
标准模型下几个签密方案的密码学分析 被引量:1
17
作者 周才学 《数学的实践与认识》 北大核心 2016年第21期134-140,共7页
针对5个文献中所提出的标准模型下的签密方案进行了安全性分析.指出它们或者存在恶意但被动的KGC(Key generation center)攻击、或者存在内部攻击者的保密性攻击、或者存在内部攻击者的伪造性攻击、或者存在选择明文攻击.通过这些攻击,... 针对5个文献中所提出的标准模型下的签密方案进行了安全性分析.指出它们或者存在恶意但被动的KGC(Key generation center)攻击、或者存在内部攻击者的保密性攻击、或者存在内部攻击者的伪造性攻击、或者存在选择明文攻击.通过这些攻击,攻击者或者可以伪造一个签密文、或者可以破坏方案的保密性.最后表明要设计标准模型下安全的签密方案仍然是一个值得研究的问题. 展开更多
关键词 广义 广义指定验证 随机预言机模型 标准模型 双线性对
原文传递
投票选举现场工作人员的职责是什么
18
作者 邓敏杰 《社区》 2003年第15期30-30,共1页
一般来说,在社区居委会进行投票选举的工作现场,应当由选举工作主持人、选票验证员、签证员、监督员、选举监管人员等组成选举工作人员,负责对选举现场的签验证与管理监督工作。他们的职责是:
关键词 社区 居委会 投票选举工作 工作人员 签验证 管理监督工作
原文传递
Quantum proxy signature scheme with public verifiability 被引量:6
19
作者 ZHOU JingXian ZHOU YaJian +1 位作者 NIU XinXin YANG YiXian 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第10期1828-1832,共5页
In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be v... In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person.Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantumentanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key whenhe generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone canverify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be publicverified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme.Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal. 展开更多
关键词 quantum cryptography proxy signature quantum one-way function public verifiably
原文传递
SEVERAL CRYPTOGRAPHIC APPLICATIONS OF ∑-PROTOCOL
20
作者 Chunming TANG Zheng-an YAO 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2009年第2期260-279,共20页
∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the f... ∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the following difficult problems 1-3 and to construct three ettlcient cryptographic protocols 4 6:1) How to construct a protocol for proving a secret integer to be a Blum integer with form PQ, where P, Q are two different primes and both -- 3(mod 4);2) How to construct a protocol for proving a secret polynomial with exact degree t - 1 iil a (t, n)- threshold secret sharing scheme:3) How to construct witness indistinguishable and witness hiding protocol not from zero-knowledge proof;4) A publicly verifiable secret sharing scheme with information-theoretic security;5) A delegateable signature scheme under the existence of one-way permutations;6) Non-interactive universal designated verifier signature schemes. 展开更多
关键词 ∑-protocol Blum integer delegateable signature secret sharing witness hiding protocol witness indistinguishable protocol universal designated verifier signature.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部