期刊文献+
共找到70篇文章
< 1 2 4 >
每页显示 20 50 100
Multi-proxy quantum group signature scheme with threshold shared verification 被引量:4
1
作者 杨宇光 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第2期415-418,共4页
A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy... A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signature on behalf of the original signer. In the scheme, any t or more of n receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the proxy signature. 展开更多
关键词 quantum signature multi-proxy quantum group signature threshold shared verification
下载PDF
A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME 被引量:3
2
作者 Kang Baoyuan Han Jingguang Wang Qinju 《Journal of Electronics(China)》 2006年第4期560-563,共4页
This paper proposes a threshold mult-proxy multi-signature scheme with share verification. In the scheme, a subset of original signers allows a designated group of proxy signers to sign on behalf of the original group... This paper proposes a threshold mult-proxy multi-signature scheme with share verification. In the scheme, a subset of original signers allows a designated group of proxy signers to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. In other words, some threshold values will be given to indicate the number of persons to represent a group to authorize the signing capability or to sign a message or to verify the proxy signature. 展开更多
关键词 CRYPTOGRAPHY Digital signature multi-proxy MULTI-signature
下载PDF
IMPROVEMENT OF NONREPUDIABLE THRESHOLD MULTI-PROXY THRESHOLD MULTI-SIGNATURE SCHEME WITH SHARED VERIFICATION 被引量:2
3
作者 Xie Qi Wang Jilin Yu Xiuyuan 《Journal of Electronics(China)》 2007年第6期806-811,共6页
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv... In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme. 展开更多
关键词 Digital signature Proxy signature Threshold proxy signature Threshold multi-proxy threshold multi-signature Threshold verification
下载PDF
SECURITY ANALYSIS AND IMPROVEMENT OF A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME 被引量:2
4
作者 Lu Rongbo He Dake Wang Chanji 《Journal of Electronics(China)》 2008年第3期372-377,共6页
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. How... Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed. 展开更多
关键词 Proxy signature Threshold proxy signature multi-proxy multi-signature Forgery attack
下载PDF
A Nominative Multi-Proxy Signature Scheme Based on ECC 被引量:1
5
作者 MAChuan-gui GAOFeng-xiu WANGYan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期223-226,共4页
A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the... A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the corresponding one based on traditional discrete logarithm. 展开更多
关键词 proxy signature nominative proxy signature multi-proxy signature elliptic curve cryptosystem (ECC)
下载PDF
A NEW MULTI-PROXY SIGNATURE FROM BILINEAR PAIRING 被引量:1
6
作者 Li Sujuan Zhang Futai 《Journal of Electronics(China)》 2007年第1期90-94,共5页
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear ... Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear pairings using Boneh,Lynn,and Shacham’s (BLS) short signatures. The proxy key for the proxy group is just a short signature on the proxy warrant generated by the original signer. Due to the use of short signatures,our scheme is not only efficient,but also satisfies all the security requirements of the strong proxy signature. 展开更多
关键词 multi-proxy signature Short signature Bilinear pairings
下载PDF
Digital Signature Based on ISRSAC 被引量:7
7
作者 Teng Yang Yanshuo Zhang +1 位作者 Song Xiao Yimin Zhao 《China Communications》 SCIE CSCD 2021年第1期161-168,共8页
Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system ... Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system that has been widely used in cyberspace security in recent years.The most classic public key cryptography algorithm is RSA and its difficulty is based on the large integer decomposition problem.In 2017,ISRSAC was proposed by M.Thangaval.ISRSAC has made security improvements to the RSA algorithm by increasing the complexity in factoring the value of modulus‘n’.A digital signature algorithm based on ISRSAC algorithm was completed in this paper,and furthermore,a proxy signature algorithm based on ISRSAC and two kinds of multi-signature algorithms were presented,which include sequential multi-signature and broadcasting multi-signature. 展开更多
关键词 ISRSAC digital signature proxy signature sequential multi-signature broadcasting multisignature
下载PDF
A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
8
作者 Hu Bin Jin Chenhui 《Journal of Electronics(China)》 2006年第1期54-57,共4页
Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy sign... Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem. Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system, and also secure against the original signer's forgery attack. Furtherlnore, based on the elliptic curve cryptosystem, they are more efficient and have smaller key size than other system. They can be used in electronics transaction and mobile agent environment. 展开更多
关键词 Digital signature Proxy signature multi-proxy signature Elliptic curve cryptosystem
下载PDF
基于身份的跨域分层访问控制加密方案
9
作者 张应辉 李冬娟 +1 位作者 曹进 郑东 《密码学报(中英文)》 CSCD 北大核心 2024年第5期1062-1077,共16页
访问控制加密强制执行读写权限,它通过一个既不知道明文、发送者和接收者,也不知道访问控制策略的净化器,阻断所有不被允许的阈下信道.针对访问控制加密中密钥生成中心所面临的繁重的密钥管理负担,本文提出了基于身份的跨域分层访问控... 访问控制加密强制执行读写权限,它通过一个既不知道明文、发送者和接收者,也不知道访问控制策略的净化器,阻断所有不被允许的阈下信道.针对访问控制加密中密钥生成中心所面临的繁重的密钥管理负担,本文提出了基于身份的跨域分层访问控制加密方案.首先,在基于身份的分层广播加密方案的基础上提出了与聚合器兼容的净化的基于身份的分层广播加密方案,进一步结合结构保持签名、非交互式零知识证明和聚合器提出了一个跨域分层访问控制加密的通用构造.然后证明了通用构造的安全性,即满足无读和无写规则.此外,对通用构造进行了实例化,实现了半静态安全并且密文大小是恒定的.最后对实例化方案进行了性能分析,结果表明本方案在保证效率的同时实现了更加丰富的功能. 展开更多
关键词 访问控制加密 基于身份的分层广播加密 非交互式零知识证明 结构保持签名
下载PDF
一种无损嵌入信息的广播电视播出图片审核方法实践
10
作者 陈海彬 吴颂涛 《广播与电视技术》 2024年第9期122-125,共4页
本文通过分析现有流行的图片文件格式,找出图片文件共同的特点,在文件中利用空闲空间存储加密的审核信息,达到对图片进行审核的目的。该方法确保了图片文件从发起到播出的内容一致性,不影响原有图片的正常阅览,能有效提高广播电视播出... 本文通过分析现有流行的图片文件格式,找出图片文件共同的特点,在文件中利用空闲空间存储加密的审核信息,达到对图片进行审核的目的。该方法确保了图片文件从发起到播出的内容一致性,不影响原有图片的正常阅览,能有效提高广播电视播出图片的内容安全,确保安全播出。 展开更多
关键词 数字签名 文件结构 安全播出
下载PDF
应急广播系统密码应用类行业标准解读
11
作者 宫铭豪 丁森华 王晓艳 《广播与电视技术》 2024年第2期23-26,共4页
本文主要对《应急广播系统数字签名技术规范》的修订情况以及《应急广播系统密码应用技术规范》标准的制定情况进行了说明。
关键词 应急广播 密码应用 数字签名
下载PDF
无人机网络中数控分离的安全传输机制
12
作者 马诗雨 张俊伟 +2 位作者 张兴隆 卢笛 马建峰 《航空科学技术》 2023年第9期110-120,共11页
数据和飞控指令的安全性是无人机网络安全性的一个重要方面。针对现有的无人机网络安全机制中的不足,本文提出了一种数控分离的安全传输机制。针对无人机向地面站发送的数据采用基于高级加密标准的计数器和密文分组链接消息认证码(AES-C... 数据和飞控指令的安全性是无人机网络安全性的一个重要方面。针对现有的无人机网络安全机制中的不足,本文提出了一种数控分离的安全传输机制。针对无人机向地面站发送的数据采用基于高级加密标准的计数器和密文分组链接消息认证码(AES-CCM)认证加密机制的数据安全传输协议,保证数据的机密性和完整性,针对地面站向无人机发送的飞控指令设计了基于一次签名的飞控广播认证协议,保证飞控指令的完整性。通过安全性分析,证明所提出的方案能够保护数据的机密性和完整性,以及飞控指令的完整性。最后,通过仿真试验分析了所提出方案的性能,结果表明,所提出的数据安全传输协议发送100B和1KB的消息时,平均每个消息的认证加密时间和解密验证时间均不超过1ms;所提出的飞控广播认证协议在使用不同的哈希函数时,对1MB的飞控指令生成签名和验证签名的时间为1~2.7ms,在实际应用中具有高效性。 展开更多
关键词 无人机网络 认证加密 广播认证 一次签名 网络安全
下载PDF
Improved certificateless multi-proxy signature 被引量:4
13
作者 XU Jie SUN Hong-xiang +1 位作者 WEN Qiao-yan ZHANG Hua 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第4期94-105,116,共13页
Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on... Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer. Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature (CLMPS) and proposed a concrete CLMPS scheme. However, their construction model is inaccurate, the concrete signature scheme has has three problems: the definition of the strengthened security a security flaw, and the proof of the security is imperfect. With further consideration, a remedial strengthened security model is redefined, and an improved scheme is also proposed, which is existentially unforgeable against adaptively chosen-warrant, chosen-message and chosen-identity attacks in the random oracles. In this condition, the computational Diffie-Hellman (CDH) assumption is used to prove full security for our CLMPS scheme. 展开更多
关键词 CERTIFICATELESS multi-proxy signature provable security bilinear map
原文传递
Self-certified multi-proxy signature schemes with message recovery 被引量:2
14
作者 Tzong-sun WU Chien-lung HSU Han-yu LIN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第2期290-300,共11页
Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original sign... Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public-key systems and the message recovery signature schemes,our proposed schemes have the following advan-tages:(1) They do not require the signing message to be transmitted,since the verifier can recover it from the signature;(2) The authentication of the public keys,verification of the signature,and recovery of the message can be simultaneously carried out in a single logical step;(3) No certificate is needed for validating the public keys. Further,the elliptic curve variant with short key lengths especially suits the cryptographic applications with limited computing power and storage space,e.g.,smart cards. As compared with the previous work that was implemented with the certificate-based public-key systems,the proposed schemes give better performance in terms of communication bandwidth and computation efforts. 展开更多
关键词 Self-certified multi-proxy signature Message recovery Smart cards Discrete logarithms Elliptic curve
原文传递
A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State 被引量:3
15
作者 牛旭峰 张建中 谢淑翠 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第7期43-48,共6页
In this paper, a multi-proxy blind signature scheme based on controlled quantum teleportation is proposed.Entangled four-qubit Cluster state functions as quantum channel, which needs less resource to complete the quan... In this paper, a multi-proxy blind signature scheme based on controlled quantum teleportation is proposed.Entangled four-qubit Cluster state functions as quantum channel, which needs less resource to complete the quantum multi-proxy blind signature. The scheme uses the physical characteristics of quantum mechanics to guarantee its blindness, unforgeability, and undeniability. The eavesdropping check is used to ensure the security. Our scheme has a foreseeable application to the E-business, E-governments, and etc. 展开更多
关键词 multi-proxy blind signature controlled quantum teleportation cluster state von Neumann measurement
原文传递
A Practical E-Payment Protocol Based on Quantum Multi-Proxy Blind Signature 被引量:1
16
作者 牛旭峰 张建中 +1 位作者 谢淑翠 陈步青 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第11期529-533,共5页
A practical E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature,... A practical E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our E-payment system could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security, which the classical E-payment systems can not provide. Furthermore, compared with the existing quantum E-payment systems, this practical system could not only support mobile E-payment transactions but also inter-bank transactions. 展开更多
关键词 mobile E-PAYMENT INTER-BANK TRANSACTION QUANTUM multi-proxy blind signature unconditionalsecurity
原文传递
一种多终端交互的安播指令阅签系统的设计与实现
17
作者 周建海 叶灵 《中国有线电视》 2023年第6期9-12,共4页
安全播出是广播电视工作的生命线,贯穿节目编排、制作、存储、播出、传输等多个环节,安播指令的快速准确下达与执行是安全播出工作的关键之一。浙江广播电视集团下属多个播出平台,涉及部门多、人员分散,存在指令线下确认难、纸质签字文... 安全播出是广播电视工作的生命线,贯穿节目编排、制作、存储、播出、传输等多个环节,安播指令的快速准确下达与执行是安全播出工作的关键之一。浙江广播电视集团下属多个播出平台,涉及部门多、人员分散,存在指令线下确认难、纸质签字文件存档难等问题,通过设计一种多终端交互的安播指令阅签系统,实现安播指令实时发布、权限控制、快速阅签、数据留痕、OCR技术、分析统计等功能,提升了安全播出管理水平。 展开更多
关键词 安全播出 多终端 交互式 移动阅签
下载PDF
基于RSA的多重数字签名 被引量:34
18
作者 张键红 韦永壮 王育民 《通信学报》 EI CSCD 北大核心 2003年第8期150-154,共5页
基于RSA和哈希函数求逆的困难性给出了两种多重数字签名方案,一种是可验证的按序数字多重签名,另一种是广播数字签名。在该两种方案中签名的长度不随签名者的人数线性增长,并且能够抵制各种勾结,具有计算量少、通信量低等特点。
关键词 多重数字签名 按序签名方式 可验证性 广播签名
下载PDF
多重数字签名方案及其安全性证明 被引量:22
19
作者 王晓峰 张璟 王尚平 《计算机学报》 EI CSCD 北大核心 2008年第1期176-183,共8页
基于因数分解和二次剩余困难性假设,构造了一个新的按序多重数字签名方案和广播多重数字签名方案.新方案的特点是:多重签名不是由签名成员所生成的多个单签名的累加,而是每个签名成员生成部分签名,以合作的方式生成多重签名;部分签名的... 基于因数分解和二次剩余困难性假设,构造了一个新的按序多重数字签名方案和广播多重数字签名方案.新方案的特点是:多重签名不是由签名成员所生成的多个单签名的累加,而是每个签名成员生成部分签名,以合作的方式生成多重签名;部分签名的长度固定,不随签名人数的改变而变化;部分签名算法和验证算法的复杂度与签名人数的多少无关;新的按序多重签名方案的签名成员不能擅自改变签名顺序.新方案抗现存的对多重签名方案的几种攻击.基于因数分解和二次剩余困难性假设,在随机预言模型下证明了方案的安全性. 展开更多
关键词 二次剩余 按序多重数字签名 广播多重数字签名 安全性证明
下载PDF
广播多重量子数字签名方案的设计与分析 被引量:5
20
作者 杨亚涛 薛霆 李子臣 《中国科学技术大学学报》 CAS CSCD 北大核心 2011年第10期924-927,共4页
提出了一种广播多重量子数字签名方案,通过执行CNOT操作来对所要签名的信息进行加密,并利用幺正变换来实现信息的签名和验证.分析表明,本方案不受签名者多少的限制,具有可验证性,安全性高且技术实现简单,是一种可实现的广播多重量子数... 提出了一种广播多重量子数字签名方案,通过执行CNOT操作来对所要签名的信息进行加密,并利用幺正变换来实现信息的签名和验证.分析表明,本方案不受签名者多少的限制,具有可验证性,安全性高且技术实现简单,是一种可实现的广播多重量子数字签名方案. 展开更多
关键词 量子签名 广播多重签名 幺正变换 CNOT操作
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部