期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Identity Based Group Key Agreement in Multiple PKG Environment 被引量:1
1
作者 WANG Liming wu chuankun 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1605-1608,共4页
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative applications. In this paper, we propose the first identity-based authenticated ... Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative applications. In this paper, we propose the first identity-based authenticated group key agreement in multiple private key generators (PKG) environment. It is inspired on a new two-party identity-based key agreement protocol first proposed by Hoonjung Lee et al. In our scheme, although each member comes from different domain and belongs to different PKGs which do not share the common system parameters, they can agree on a shared secret group key. We show that our scheme satisfies every security requirements of the group key agreement protocols. 展开更多
关键词 group key agreement MULTICAST bilinear pairing
下载PDF
Identity Based Group Key Agreement from Bilinear Pairing
2
作者 WANG Liming wu chuankun 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1731-1735,共5页
We present a provably secure authenticated tree based key agreement scheme for multicast. There is a wide variety of applications that can benefit from using our scheme, e. g. , pay-Tv, teleconferencing, software upda... We present a provably secure authenticated tree based key agreement scheme for multicast. There is a wide variety of applications that can benefit from using our scheme, e. g. , pay-Tv, teleconferencing, software updates. Compared with the previous published schemes, our scheme provides group member authentication without introducing additional mechanism. Future, we give the security proof of our scheme under the random oracle model. 展开更多
关键词 group key agreement MULTICAST bilinear pairing provable security
下载PDF
Construction and enumeration of Boolean functions with maximum algebraic immunity 被引量:4
3
作者 ZHANG WenYing wu chuankun LIU XiangZhong 《Science in China(Series F)》 2009年第1期32-40,共9页
Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This ... Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also n given. For a given function p(x) with deg(p(x)) 〈 [n/2], we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than [n/2]. 展开更多
关键词 CRYPTOGRAPHY algebraic attack algebraic immunity Boolean function
原文传递
Some Functions with Low Differential Uniformity
4
作者 SUN Guanghong wu chuankun 《Wuhan University Journal of Natural Sciences》 CAS 2010年第6期479-487,共9页
We study the functions with low differential uniformity,and concentrates mainly on the properties of perfect nonlinear(PN) functions,including the properties of the derivative of the components of those functions.So... We study the functions with low differential uniformity,and concentrates mainly on the properties of perfect nonlinear(PN) functions,including the properties of the derivative of the components of those functions.Some sufficient and necessary conditions have been explored to judge when a function is a PN function.These conditions may be useful in constructing new PN functions.We also construct some functions with differential 4-uniformity that have rarely been studied in the literature.Some of the constructed functions with differential 4-uniformity have high nonlinearity as well.Finally,a class of functions with differential 4-uniformity which are not extended affine equivalent to any power functions are constructed. 展开更多
关键词 differential uniformity perfect nonlinear function Carlet-Charpin-Zinoviev equivalence derivative function spectrum
原文传递
Set signatures and their applications
5
作者 wu chuankun 《Science in China(Series F)》 2009年第8期1346-1357,共12页
There are many constraints in the use of digital signatures. This paper proposes a new way of using digital signatures with some restrictions, i.e. set signatures. It works in such a way that when the signing algorith... There are many constraints in the use of digital signatures. This paper proposes a new way of using digital signatures with some restrictions, i.e. set signatures. It works in such a way that when the signing algorithm is given, one can use it to create a valid signature on a message if and only if the message belongs to a pre-defined set, and given the information about the signing algorithm, it is computationally infeasible to create valid signatures on any other arbitrary messages outside of the set. This special property enables the signing algorithm to be made public, which seems to contradict with the traditional signature where a private key is needed, which must be kept secret. What makes the problem challenging is that the signing algorithm does not reveal the secret signing key, and hence forging normal signatures for arbitrary messages is computationally infeasible. In many cases, the signing algorithm does not reveal the elements in the authorized set. As an application of the new concept, set signatures for intelligent mobile agents committing "smaller than" condition is studied, which shows the applicability of set signatures on small sets. 展开更多
关键词 CRYPTOGRAPHY set signature forward security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部