您的位置: 专家智库 > >

国家自然科学基金(90704004)

作品数:6 被引量:23H指数:2
相关作者:陈克非洪璇李强郑燕飞董玲更多>>
相关机构:上海交通大学上海师范大学更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 5篇中文期刊文章

领域

  • 5篇自动化与计算...
  • 1篇电子电信

主题

  • 1篇新鲜性
  • 1篇形式化
  • 1篇形式化分析
  • 1篇形式主义
  • 1篇数据安全
  • 1篇通用可组合
  • 1篇通用可组合安...
  • 1篇主义
  • 1篇密码
  • 1篇密钥管理
  • 1篇拒绝服务
  • 1篇拒绝服务攻击
  • 1篇计算机
  • 1篇计算机技术
  • 1篇PROACT...
  • 1篇THRESH...
  • 1篇UC安全
  • 1篇CONSTR...
  • 1篇IEEE
  • 1篇CERTIF...

机构

  • 2篇上海交通大学
  • 1篇上海师范大学

作者

  • 2篇洪璇
  • 2篇陈克非
  • 1篇董玲
  • 1篇郑燕飞
  • 1篇李强

传媒

  • 3篇Journa...
  • 1篇通信学报
  • 1篇上海交通大学...

年份

  • 2篇2009
  • 3篇2008
6 条 记 录,以下是 1-5
排序方式:
Formal Analysis of Authentication in 802.11i
2009年
Authentication is the basis of the security of IEEE 802.11i standard.The authentication process in 802.11i involves two important protocols:a 4-way handshake and a group key handshake.A formal analysis of authentication in 802.11i is given via a belief multisets formalism.The analysis shows that the 4-way handshake and the group key handshake may provide satisfactory mutual authentication,key management,and issue of a new group temporal key from an access point to a user device,under the guarantee of mutual possession of a confidential pairwise master key.The analysis also shows that there ex(?)sts a denial of service attack in the 4-way handshake and some seeming redundancies are useful in the protocol implementation.
董玲陈克非来学嘉
关键词:形式化分析拒绝服务攻击IEEE形式主义密钥管理
Universally Composable Proactive Threshold RSA Signature
2008年
Recently some efforts were made towards capturing the security requirements within the composable security framework.This modeling has some significant advantages in designing and analyzing complex systems.The threshold signature was discussed and a definition was given based on the universal composability framework, which is proved to be equivalent to the standard security definition.Furthermore, a simple, effcient and proactive threshold RSA signature protocol was presented.It is proved to be correct, consistent and unforgeable relative to the environment that at most t-1 parties are corrupted in each proactive stage.It is also secure under the universal composability framework.It is a UC based security and is proved to be equivalent to the standard security.
洪璇陈克非龙宇
关键词:计算机技术数据安全
通用可组合安全的门限签名协议被引量:9
2009年
门限签名协议使得签名团体中任何t个参与者合作可以生成某个消息的有效签名;而少于t个参与者就无法得到该消息的合法签名。目前关于门限签名协议的安全性研究只是专注于单一协议执行时的安全性,针对这点,引入通用可组合框架。利用该框架的通用可组合性可以模块化地设计与分析门限签名协议。首先定义了门限签名协议在通用可组合框架下的安全模型,并证明其等价于门限签名协议标准概念下的安全模型,然后以前摄门限签名协议为例描述如何应用这个安全模型。提出的门限签名协议和前摄性门限签名协议不仅满足可证明安全性,还具有通用可组合安全性。
洪璇陈克非李强
关键词:UC安全
认证协议的安全性保证被引量:1
2008年
提出了保证认证协议安全性的2个条件:主体的活现性和会话密钥的保密性、新鲜性和关联性,并形式化证明了2个条件满足基于不可区分性的安全性定义.以Needham-Schroeder认证协议和SSL协议为例,说明分析认证协议是否满足2个条件的方法,以及如何根据安全属性的缺失直接构造攻击.基于2个条件的安全性分析方法不仅能用于证明协议正确,也能用于查找协议漏洞.该分析方法与攻击者的具体行为描述和多协议运行环境无关,是安全性的精确量化指标,其简单、有效,能帮助研究人员分析和改善认证协议设计.
董玲陈克非郑燕飞洪璇
关键词:新鲜性
On Constructing Certificateless Proxy Signature from Certificateless Signature被引量:1
2008年
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.Recently many identity-based(ID-based) proxy signature schemes have been proposed, however, the problem of key escrow is inherent in this setting.Certificateless cryptography can overcome the key escrow problem.In this paper, we present a general security model for certificateless proxy signature scheme.Then, we give a method to construct a secure certificateless proxy scheme from a secure certificateless signature scheme, and prove that the security of the construction can be reduced to the security of the original certificateless signature scheme.
万中美来学嘉翁健洪璇龙宇贾巍巍
关键词:密码
共1页<1>
聚类工具0