您的位置: 专家智库 > >

国家自然科学基金(60572155)

作品数:16 被引量:89H指数:5
相关作者:曹珍富董晓蕾柴震川孙超亮梁晓辉更多>>
相关机构:上海交通大学更多>>
发文基金:国家自然科学基金国家教育部博士点基金上海市科学技术委员会资助项目更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 16篇中文期刊文章

领域

  • 14篇自动化与计算...
  • 3篇电子电信

主题

  • 7篇密码
  • 3篇签名
  • 2篇电子现金
  • 2篇数字签名
  • 2篇现金
  • 2篇密码技术
  • 2篇计算机
  • 2篇服务器
  • 2篇ANONYM...
  • 2篇ID-BAS...
  • 2篇PAIRIN...
  • 1篇代理
  • 1篇代理重签名
  • 1篇电子投票
  • 1篇丢番图
  • 1篇丢番图方程
  • 1篇多项式
  • 1篇多项式函数
  • 1篇信息安全
  • 1篇信息隐藏

机构

  • 4篇上海交通大学

作者

  • 4篇曹珍富
  • 2篇董晓蕾
  • 1篇吕敏芳
  • 1篇梁晓辉
  • 1篇陆荣幸
  • 1篇林兆
  • 1篇孙超亮
  • 1篇柴震川

传媒

  • 5篇Journa...
  • 4篇Wuhan ...
  • 3篇计算机工程
  • 3篇Scienc...
  • 1篇中国科学:信...

年份

  • 2篇2009
  • 2篇2008
  • 4篇2007
  • 8篇2006
16 条 记 录,以下是 1-10
排序方式:
Password-Based Group Key Agreement Protocol for Client-Server Application
2006年
The security issue is always the most important concern of networked client-server application. On the purpose to build the secure group communication among of a group of client users and one server, in this paper, we will present a new password-based group key agreement protocol. Our protocol will meet simplicity, efficiency, and many desired security properties.
LU Rongxing CAO Zhenfu DONG Xiaolei SONG Chao SUN Congkai
关键词:口令组密钥管理服务器
基于自认证密码系统的短指定验证者签名方案
2007年
提出了一个基于自认证密码系统的短指定验证者签名方案。与其他指定验证者签名方案相比,该方案具有自认证密码系统的优点,既不需要证书对公钥显式认证,又避免了密钥托管问题。签名长度比较短,特别适用于带宽受限的场合。
林兆曹珍富董晓蕾陆荣幸
关键词:数字签名指定验证者签名
Non-interactive and Non-malleable Commitment Scheme Based on q-one Way Group Homomorphisms
2008年
Commitment scheme is a basic component of many cryptographic protocols, such as coin-tossing, identification schemes, zero-knowledge and multi-party computation. In order to prevent man-in-middle attacks, non-malleability is taken into account. Many forming works focus on designing non-malleable commitments schemes based on number theory assumptions. In this paper we give a general framework to construct non- interactive and non-malleable commitment scheme with respect to opening based on more general assumptions called q-one way group homomorphisms (q-OWGH). Our scheme is more general since many existing commitment schemes can be deduced from our scheme.
张宗洋董晓蕾曹珍富
关键词:保密技术
A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial被引量:1
2006年
In this paper, we use the polynomial function and Chaum’s RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials’ greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet.
CAO Feng CAO Zhenfu
关键词:电子投票多项式函数
Proofs of Security for Improved Rabin Signature Scheme
2006年
The improved RSA signature scheme can be strictly proved to be equivalent to the factoring problem. In the improved RSA signature scheme, when the public exponent e=1, the scheme becomes the improved Rabin signature. Such an improved Rabin signature scheme is reviewed and the techniques from the provable security is applied to analyze its security.
董晓蕾陆荣幸曹珍富
关键词:网络安全数字技术
The Braid-Based Bit Commitment Protocol被引量:1
2006年
With recent advances of quantum computation, new threats have closed in upon to the classical public key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding. Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks.
王励成曹珍富曹锋钱海峰
关键词:量子密码技术承诺
An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
2006年
Peer-to-peer computing has recently started to gain significant acceptance, since it can greatly increase the performance and reliability of overall system. However, the security issue is still a major gating factor for its full adoption. In order to guarantee the security of data exchanged between two peers in Peer-to-Peer system, this paper comes up with an ID-based authenticated key agreement from bilinear pairings and uses BAN logic to prove the protocol’s security. Compared with other existing protocols, the proposed protocol seems more secure and efficient, since it adopts the static shared Diffie-Hellman key.
陆荣幸曹珍富苏仁旺柴震川
关键词:ID号计算方法计算机系统
A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards
2006年
Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications. Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user’s anonymity.
陆荣幸曹珍富苏仁旺
关键词:密码技术遥控技术
门限代理重签名方案被引量:6
2009年
提出一个新的门限代理重签名方案。标准的代理重签名方案是通过一个半可信任的代理者将一个签名者的签名转化为另一个签名者的签名,而该文提出的方案中2个签名者之间有n个半可信任的代理者,当且仅当至少有t个代理者参与时才能得到重签名。该方案具有门限签名方案和代理重签名方案的特点,适合应用于程序比较多的审查系统和投票系统。
孙超亮曹珍富梁晓辉
关键词:数字签名代理重签名门限签名
Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings被引量:1
2007年
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an es- crow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart’s protocol.
WANG Shengbao CAO Zhenfu
关键词:管理协议安全通信计算机密码
共2页<12>
聚类工具0