期刊文献+
共找到409篇文章
< 1 2 21 >
每页显示 20 50 100
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
1
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
下载PDF
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
2
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
3
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
下载PDF
A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things
4
作者 Caifen Wang Bin Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1857-1878,共22页
The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizati... The mushroom growth of IoT has been accompanied by the generation of massive amounts of data.Subject to the limited storage and computing capabilities ofmost IoT devices,a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing.One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results.Linearly homomorphic proxy signature(LHPS)is a desirable solution to ensure the reliability of outsourcing computing in the case of authorized signing right.Blockchain has the characteristics of tamper-proof and traceability,and is a new technology to solve data security.However,as far as we know,constructions of LHPS have been few and far between.In addition,the existing LHPS scheme does not focus on homomorphic unforgeability and does not use blockchain technology.Herein,we improve the security model of the LHPS scheme,and the usual existential forgery and homomorphic existential forgery of two types of adversaries are considered.Under the new model,we present a blockchain-based LHPS scheme.The security analysis shows that under the adaptive chosen message attack,the unforgeability of the proposed scheme can be reduced to the CDH hard assumption,while achieving the usual and homomorphic existential unforgeability.Moreover,comparedwith the previous LHPS scheme,the performance analysis shows that our scheme has the same key size and comparable computational overhead,but has higher security. 展开更多
关键词 Homomorphic signature proxy signature security model provable security UNFORGEABILITY
下载PDF
The Connection Between Medical Self-determination and the System of Adult Guardianship——The Institutional Construction of Medical Proxy
5
作者 李敏 SU Yilong 《The Journal of Human Rights》 2023年第3期576-598,共23页
China has established the basic rules of informed consent in the medical field through Articles 1219 and 1220 of the tort liability part of the Civil Code of China to address the legality of medical conduct.Since pati... China has established the basic rules of informed consent in the medical field through Articles 1219 and 1220 of the tort liability part of the Civil Code of China to address the legality of medical conduct.Since patients’capacity to consent is the prerequisite,when the patient is a fully competent person,it is sufficient to give consent based on valid notification by the doctor.However,for those who are unable to give valid consent,especially adult patients with impaired capacity,resolving the legality of the doctor’s medical conduct remains an issue when it infringes on the patient’s body and health.To solve this issue,someone must give consent in place of the patient when the adult is unable to give valid consent.However,the personal and exclusive nature of the right to medical consent,which is informed consent,makes it impossible to simply delegate it to a guardian or other person to exercise it on behalf of the patient.In this paper,we borrow the concept of“medical proxy”proposed by Japanese scholar Teruaki Tayama,and for the first time,we discuss the construction of medical proxy from the perspective of adult guardianship by connecting the two systems from the standpoint of interpretive theory. 展开更多
关键词 medical proxy medical self-determination adult guardianship capacity to consent
下载PDF
IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION 被引量:2
6
作者 Xie Qi Wang Jilin Yu Xiuyuan 《Journal of Electronics(China)》 2007年第6期806-811,共6页
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv... In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme. 展开更多
关键词 Digital signature proxy signature Threshold proxy signature Threshold multi-proxy threshold multi-signature Threshold verification
下载PDF
SECURITY ANALYSIS AND IMPROVEMENT OF A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME 被引量:2
7
作者 Lu Rongbo He Dake Wang Chanji 《Journal of Electronics(China)》 2008年第3期372-377,共6页
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. How... Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed. 展开更多
关键词 proxy signature Threshold proxy signature Multi-proxy multi-signature Forgery attack
下载PDF
A Nominative Multi-Proxy Signature Scheme Based on ECC 被引量:1
8
作者 MAChuan-gui GAOFeng-xiu WANGYan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期223-226,共4页
A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the... A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the corresponding one based on traditional discrete logarithm. 展开更多
关键词 proxy signature nominative proxy signature multi-proxy signature elliptic curve cryptosystem (ECC)
下载PDF
基于Proxy的网络计费系统的设计与实现 被引量:15
9
作者 易正强 王耀军 《计算机工程》 CAS CSCD 北大核心 2001年第2期166-168,共3页
讨论在校园网环境下的网络计费,对基于Proxy的网络计费与管理进行了详细设计,给出了巨量数据的处理方法。
关键词 校园网 网络计费系统 代理服务器 proxy INTERNE
下载PDF
一种基于Proxy的Web应用安全漏洞检测方法及实现 被引量:6
10
作者 王鹃 李俊娥 刘珺 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2005年第5期135-140,共6页
指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL... 指出了Web应用中存在的各种安全漏洞,在分析并总结Web应用安全漏洞特点的基础上,设计了一种基于Proxy的Web应用安全漏洞检测方法,该方法可以用来检测一些常见的Web应用安全漏洞,如参数篡改、跨站点脚本漏洞等.给出了利用该方法检测SQL代码插入、跨站点脚本算法的JAVA语言实现. 展开更多
关键词 WEB应用安全 漏洞检测 proxy JAVA
下载PDF
基于Proxy服务器的计费系统 被引量:14
11
作者 鲍剑洋 王亚 《计算机应用》 CSCD 1999年第4期50-52,共3页
本文主要论述网络管理中计费系统的开发方法,探讨代理服务器的主要功能和工作流程,提出了基于Proxy服务器计费系统的系统结构和流程,最后给出了基于Proxy服务器计费系统的逻辑结构和系统功能。
关键词 网络管理 计费系统 proxy 服务器 计算机网络
下载PDF
基于MS Proxy Server的网络计费系统的实现 被引量:2
12
作者 邹刚 敖永红 +1 位作者 柯水洲 曹承倜 《计算机工程与应用》 CSCD 北大核心 2003年第6期151-154,共4页
文中介绍了代理服务器的计费方式,阐述了基于MSProxyServer的网络计费系统的设计与实现。
关键词 MS proxy Server 网络计费系统 计算机网络 网络管理 防火墙 代理服务器
下载PDF
基于策略DNS和HTTP Proxy的多宿主网络服务部署的研究 被引量:2
13
作者 王子荣 胡浩 +1 位作者 尹绍锋 王宇科 《计算机工程与科学》 CSCD 北大核心 2014年第2期238-243,共6页
针对目前常用的多宿主网络服务部署方法中存在的由于ISP网络地址集的变化或DNS配置等因素会造成服务访问路由不可达的不足,提出了一种基于策略DNS与HTTP Proxy在多宿主网络中服务的部署策略,在各ISP出口安装HTTP Proxy服务器,配合策略DN... 针对目前常用的多宿主网络服务部署方法中存在的由于ISP网络地址集的变化或DNS配置等因素会造成服务访问路由不可达的不足,提出了一种基于策略DNS与HTTP Proxy在多宿主网络中服务的部署策略,在各ISP出口安装HTTP Proxy服务器,配合策略DNS服务进行联合部署。从理论上对该策略进行了分析,并对部署方法进行了详细阐述。通过实例分析及效果测量,证实了在不改变网络拓扑、基本不增加投入的情况下,通过该策略可大幅度提高校园网或企业网信息资源服务的互联网用户访问速度和访问质量,并解决了传统方式中路由不可达的问题。 展开更多
关键词 策略 DNS HTTP proxy 多宿主网络
下载PDF
EPON系统中IGMP Proxy技术实现方案 被引量:3
14
作者 朱敏 邹君妮 林如俭 《光通信技术》 CSCD 北大核心 2006年第12期19-21,共3页
提出了一种基于VLAN的EPON系统组播实现方案,满足当前宽带接入网中有效传输组播业务的需求。该方案充分利用ONU端的IGMPProxy技术,大大降低了IGMP控制报文在EPON系统、上端核心网中的流量。仿真显示了该方案在IGMP控制报文网络流量上的... 提出了一种基于VLAN的EPON系统组播实现方案,满足当前宽带接入网中有效传输组播业务的需求。该方案充分利用ONU端的IGMPProxy技术,大大降低了IGMP控制报文在EPON系统、上端核心网中的流量。仿真显示了该方案在IGMP控制报文网络流量上的性能大幅提高和优越性。 展开更多
关键词 IGMP proxy IGMP SNOOPING 组播 VLAN 以太无源光网络
下载PDF
基于PROXY服务器的网络计费系统原理与实现 被引量:3
15
作者 谭跃生 王静宇 《内蒙古大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第2期221-223,共3页
网络计费是网络管理中重要的一部分 ,一个有效而合理的计费系统是校园网络正常运行的保证 .文章研究了代理机制 ,分析了基于 PROXY服务器的网络计费系统原理 ,提出了网络计费系统的一个开发模型 ,并对模型中的数据采集、计费信息处理、... 网络计费是网络管理中重要的一部分 ,一个有效而合理的计费系统是校园网络正常运行的保证 .文章研究了代理机制 ,分析了基于 PROXY服务器的网络计费系统原理 ,提出了网络计费系统的一个开发模型 ,并对模型中的数据采集、计费信息处理、数据查询等主要模块的设计作了较详细的阐述 . 展开更多
关键词 代理服务器 网络计费系统 日志文件 网络管理 代理机制 proxy服务器 校园网 工作原理
下载PDF
基于NAT-PT和PROXY的HTTP过渡方案的研究与改进 被引量:2
16
作者 杨怡 陶军 《计算机工程与应用》 CSCD 北大核心 2006年第4期149-151,共3页
NAT-PT技术和PROXY技术是HTTP服务从IPv4向IPv6过渡的两种主要技术,文章讨论了基于这两种技术的过渡方案的实现与改进。论文从原理上分析现有方案,提出现有实现方案存在的问题,如NAT-PT中的动态映射地址对过期而导致的访问出错的问题,以... NAT-PT技术和PROXY技术是HTTP服务从IPv4向IPv6过渡的两种主要技术,文章讨论了基于这两种技术的过渡方案的实现与改进。论文从原理上分析现有方案,提出现有实现方案存在的问题,如NAT-PT中的动态映射地址对过期而导致的访问出错的问题,以及PROXY方案中IPv4端不能通过IPv6地址直接访问的问题。针对上述问题提出了改进方案,并通过实验证明了改进方案的可行性和有效性。 展开更多
关键词 IPV6 过渡 NAT—PT proxy
下载PDF
采用SNMP Proxy技术的集群系统的单IP管理 被引量:1
17
作者 张俊 黄林鹏 《计算机工程》 EI CAS CSCD 北大核心 2005年第12期119-121,124,共4页
在互联网IP地址日益紧张的情况下,尽可能占用最少的IP地址对集群系统进行管理,将大大节约互联网IP地址资源。该文通过对比RFC1631和RFC2663中提出的NAT、NAPT技术实现原理,提出了SNMPPROXY技术,可以在不改造路由器的情况下,实现集群系... 在互联网IP地址日益紧张的情况下,尽可能占用最少的IP地址对集群系统进行管理,将大大节约互联网IP地址资源。该文通过对比RFC1631和RFC2663中提出的NAT、NAPT技术实现原理,提出了SNMPPROXY技术,可以在不改造路由器的情况下,实现集群系统的单IP地址SNMP管理。 展开更多
关键词 集群系统 路由器 NAT NAPT SNMP proxy
下载PDF
基于HTTP和Proxy防毒过滤网关的研究 被引量:1
18
作者 林碧英 王素琴 《计算机工程与应用》 CSCD 北大核心 2005年第25期155-158,共4页
随着Internet的飞速发展和广泛应用,大量的网络病毒已将Internet作为其一种主要的传播途径。网络病毒传播的方式很多,如通过访问网页、电子邮件以及FTP文件传输等等。为了使Web病毒(通过Web传播的网络病毒)的查杀工作对用户及Web服务器... 随着Internet的飞速发展和广泛应用,大量的网络病毒已将Internet作为其一种主要的传播途径。网络病毒传播的方式很多,如通过访问网页、电子邮件以及FTP文件传输等等。为了使Web病毒(通过Web传播的网络病毒)的查杀工作对用户及Web服务器透明化,同时降低Web服务器的风险,提高病毒查杀效率。我们采用了KPSG(KILLProxy Shield Gateway,代理过滤网关)的方式提供对Web病毒(如NIMDA)和蠕虫的查杀。 展开更多
关键词 KPSG Web病毒 proxy wgav 负载均衡
下载PDF
分布网络管理体系结构中若干术语的辨析——Agent、Delegator、Broker和Proxy 被引量:1
19
作者 赵慧 施伯乐 《计算机科学》 CSCD 北大核心 2002年第8期24-26,98,共4页
Internet的普及,使网络管理已经成为计算机网络不可缺少的个重要部分.网络管理作为一种特殊的应用领域,研究其体系结构可以使设计人员在较高的抽象层次分析管理功能,有着重要的理论和实践意义,而且对于管理协议和服务的设计有一定的指... Internet的普及,使网络管理已经成为计算机网络不可缺少的个重要部分.网络管理作为一种特殊的应用领域,研究其体系结构可以使设计人员在较高的抽象层次分析管理功能,有着重要的理论和实践意义,而且对于管理协议和服务的设计有一定的指导意义. 展开更多
关键词 计算机网络 分布网络管理体系结构 术语 人工智能 自治管理 BROKER proxy 代理
下载PDF
基于Full Proxy的NAT/Firewall的穿越 被引量:1
20
作者 章仁龙 罗宁 《计算机应用与软件》 CSCD 北大核心 2006年第7期101-103,123,共4页
VoIP语音视频流对NAT/F irewall的穿越已经成为语音数据业务开展过程中最大的障碍。Fu ll Proxy提供了一种NAT/F irewall穿越的有效途径,具有很强的适应性和透明性。深入讨论了Fu ll Proxy的实现原理和基于Fu ll Proxy的整个呼叫流程,... VoIP语音视频流对NAT/F irewall的穿越已经成为语音数据业务开展过程中最大的障碍。Fu ll Proxy提供了一种NAT/F irewall穿越的有效途径,具有很强的适应性和透明性。深入讨论了Fu ll Proxy的实现原理和基于Fu ll Proxy的整个呼叫流程,最后在一个嵌入式双CPU系统的基础上实现了一个Fu ll Proxy。 展开更多
关键词 Full proxy 嵌入式 NAT 防火墙 SIP
下载PDF
上一页 1 2 21 下一页 到第
使用帮助 返回顶部