期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于密钥校验值的联机更换主密钥方法
1
作者 孙秀胜 张康丽 刘凯 《中国新通信》 2018年第22期47-47,共1页
根据人民银行和银监会要求,银行自助终端设备需要实现一机一密。对于存量设备的改造,采用传统打印密钥信封方式导致人工成本较高,而采用联机更换主密钥方式存在传输失误导致无法正常交易的问题,因此,本文在分析各银行密钥更换方法的基础... 根据人民银行和银监会要求,银行自助终端设备需要实现一机一密。对于存量设备的改造,采用传统打印密钥信封方式导致人工成本较高,而采用联机更换主密钥方式存在传输失误导致无法正常交易的问题,因此,本文在分析各银行密钥更换方法的基础上,提出一种基于密钥校验值的联机更换终端主密钥方法,该方法能有效降低更换密钥出错成本,减少设备管理人员的人力成本。 展开更多
关键词 一机一 更换主 校验
下载PDF
基于二维模运算的高效率可逆信息隐藏方案
2
作者 李越 唐聃 +3 位作者 孙敏钧 王燮 蔡红亮 曾琼 《计算机应用》 CSCD 北大核心 2024年第6期1880-1888,共9页
针对在较大数据量传递的场景中使用可逆信息隐藏(RDH)保护数据时嵌入效率和抗检测能力较低的问题,提出一种基于二维模运算的高效率可逆信息隐藏方案。首先通过模运算较小的修改像素值嵌入较大的信息量,再结合增强的进制转换系统增加嵌... 针对在较大数据量传递的场景中使用可逆信息隐藏(RDH)保护数据时嵌入效率和抗检测能力较低的问题,提出一种基于二维模运算的高效率可逆信息隐藏方案。首先通过模运算较小的修改像素值嵌入较大的信息量,再结合增强的进制转换系统增加嵌入位数,最后使用折半法结合双图像赋予可逆性。在USC-SIPI标准图像库上进行的仿真实验结果表明,在嵌入高达100万比特秘密信息时,所提方案的隐写图像的峰值信噪比(PSNR)值保持在40 dB左右,且该隐写图像可有效抵抗RS(Regular Singular)隐写分析、像素差直方图(PDH)隐写分析和位平面隐写分析的静态攻击。因此,所提方案有效提高了对原始图像的嵌入效率,同时具有良好的抗检测能力。 展开更多
关键词 可逆信息隐藏 增强进制 模运算 密钥值 高效率
下载PDF
Improved key exchange protocol for three-party based on verifier authentication 被引量:3
3
作者 柳秀梅 周福才 常桂然 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期322-324,共3页
To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w... To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient. 展开更多
关键词 key exchange for three-party password-based authentication VERIFIER
下载PDF
A threshold key escrow scheme based on public key cryptosystem 被引量:16
4
作者 曹珍富 《Science China(Technological Sciences)》 SCIE EI CAS 2001年第4期441-448,共8页
In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no... In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme. 展开更多
关键词 key escrow scheme threshold cryptography public key cryptosystem improved RSA cryptosystem LEAF
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部