您的位置: 专家智库 > >

国家自然科学基金(s60225007)

作品数:4 被引量:1H指数:1
发文基金:国家自然科学基金更多>>
相关领域:自动化与计算机技术更多>>

文献类型

  • 4篇中文期刊文章

领域

  • 4篇自动化与计算...

主题

  • 2篇ID-BAS...
  • 1篇PROTOC...
  • 1篇QUANTU...
  • 1篇SECURI...
  • 1篇SIGNAT...
  • 1篇SMART_...
  • 1篇USING
  • 1篇ANONYM...
  • 1篇DIGITA...
  • 1篇DS
  • 1篇IMPROV...
  • 1篇AN
  • 1篇BRA
  • 1篇PROOFS
  • 1篇SELF
  • 1篇ATTACK...
  • 1篇ENCRYP...
  • 1篇SIGNAT...

传媒

  • 4篇Journa...

年份

  • 4篇2006
4 条 记 录,以下是 1-4
排序方式:
Proofs of Security for Improved Rabin Signature Scheme
2006年
The improved RSA signature scheme can be strictly proved to be equivalent to the factoring problem. In the improved RSA signature scheme, when the public exponent e=1, the scheme becomes the improved Rabin signature. Such an improved Rabin signature scheme is reviewed and the techniques from the provable security is applied to analyze its security.
董晓蕾陆荣幸曹珍富
The Braid-Based Bit Commitment Protocol被引量:1
2006年
With recent advances of quantum computanon, new threats key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding. Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks.
王励成曹珍富曹锋钱海峰
An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
2006年
Peer-to-peer computing has recently started to gain significant acceptance, since it can greatly increase the performance and reliability of overall system. However, the security issue is still a major gating factor for its full adoption. In order to guarantee the security of data exchanged between two peers in Peer-to-Peer system, this paper comes up with an ID-based authenticated key agreement from bilinear pairings and uses BAN logic to prove the protocol’s security. Compared with other existing protocols, the proposed protocol seems more secure and efficient, since it adopts the static shared Diffie-Hellman key.
陆荣幸曹珍富苏仁旺柴震川
A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards
2006年
Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications. Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user’s anonymity.
陆荣幸曹珍富苏仁旺
共1页<1>
聚类工具0