ETO(engineering to order)型企业生产是一种集产品设计、配件加工及成品组装一体化的生产方式,其产品的生产过程难以实时监管,生产数据也难以追溯。为此,利用区块链的安全性高、数据不易篡改以及数据易追溯的特点,基于超级账本区块链...ETO(engineering to order)型企业生产是一种集产品设计、配件加工及成品组装一体化的生产方式,其产品的生产过程难以实时监管,生产数据也难以追溯。为此,利用区块链的安全性高、数据不易篡改以及数据易追溯的特点,基于超级账本区块链框架实现一种ETO型企业生产过程溯源系统。研究结果表明,该溯源网络具有良好的数据吞吐率,数据查询延迟和上链延迟较低,有效地解决了ETO型企业产品生产流程数据追溯不便的问题,提高了数据安全性和可追溯性。展开更多
Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.pro...Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.proposed a novel multivariate signature scheme with Hash-based Tame Transformation and Minus(HTTM)in 2011.For this extended MQ-based signature,we can transform it into an SFLASH variant by splitting and merging HT transformation,and solve an equivalent private key corresponding to the public key of HTTM.Thus,the adversary can forge legitimate signature for any message by using this equivalent private key.展开更多
By using the minimal polynomial of ergodic matrix and the property of polynomial over finite field,we present a polynomial time algorithm for the two-side exponentiation problem about ergodic matrices over finite fie...By using the minimal polynomial of ergodic matrix and the property of polynomial over finite field,we present a polynomial time algorithm for the two-side exponentiation problem about ergodic matrices over finite field (TSEPEM),and analyze the time and space complexity of the algorithm.According to this algorithm,the public key scheme based on TSEPEM is not secure.展开更多
文摘ETO(engineering to order)型企业生产是一种集产品设计、配件加工及成品组装一体化的生产方式,其产品的生产过程难以实时监管,生产数据也难以追溯。为此,利用区块链的安全性高、数据不易篡改以及数据易追溯的特点,基于超级账本区块链框架实现一种ETO型企业生产过程溯源系统。研究结果表明,该溯源网络具有良好的数据吞吐率,数据查询延迟和上链延迟较低,有效地解决了ETO型企业产品生产流程数据追溯不便的问题,提高了数据安全性和可追溯性。
基金Supported by the National Natural Science Foundation of China(No.61142007)Natural Science Foundation of Universities of Jiangsu Province(13KJB520005)the Research Fund for the Graduate Innovation Program of Jiangsu Province(CXZZ13_0493)
文摘Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.proposed a novel multivariate signature scheme with Hash-based Tame Transformation and Minus(HTTM)in 2011.For this extended MQ-based signature,we can transform it into an SFLASH variant by splitting and merging HT transformation,and solve an equivalent private key corresponding to the public key of HTTM.Thus,the adversary can forge legitimate signature for any message by using this equivalent private key.
基金Supported by the National Natural Science Foundation of China (70671096)Jiangsu Teachers University of Technology (KYY08004,KYQ09002)
文摘By using the minimal polynomial of ergodic matrix and the property of polynomial over finite field,we present a polynomial time algorithm for the two-side exponentiation problem about ergodic matrices over finite field (TSEPEM),and analyze the time and space complexity of the algorithm.According to this algorithm,the public key scheme based on TSEPEM is not secure.