期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
An Identity-Based Strong Designated Verifier Proxy Signature Scheme 被引量:3
1
作者 WANG Qin CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1633-1635,共3页
In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In ... In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements. 展开更多
关键词 strong designated verifier signature proxy signature identity-based cryptosystem bilinear pairing
下载PDF
Threshold Subliminal Channel Based on Designated Verifier Signature 被引量:1
2
作者 SU Li CUI Guohua YANG Muxiang CHEN Jing 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1485-1488,共4页
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a mess... The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient. 展开更多
关键词 THRESHOLD subliminal channel designated verifier signature digital signature
下载PDF
Certificateless universal designated verifier signature schemes 被引量:8
3
作者 MING Yang SHEN Xiao-qin WANG Yu-min 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第3期85-90,94,共7页
Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unabl... Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact. The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required. This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed. The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system. Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve. 展开更多
关键词 certificateless cryptography universal designated verifier signature bilinear pairing
原文传递
Cloud data auditing with designated verifier 被引量:4
4
作者 Solomon Guadie WORKU Chunxiang XU Jining ZHAO 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第3期503-512,共10页
An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build... An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappy with this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.'s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oracle model assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps. 展开更多
关键词 cloud data storage designated verifier data privacy storage correctness cloud computing
原文传递
A short non-delegatable strong designated verifier signature
5
作者 Haibo TIAN Jin LI 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第3期490-502,共13页
A non-delegatable strong designated verifier signature (NSDVS) enforces verification of a signature by a designated verifier only. The concept is useful in various commercial cryptographic applications such as copyr... A non-delegatable strong designated verifier signature (NSDVS) enforces verification of a signature by a designated verifier only. The concept is useful in various commercial cryptographic applications such as copyright protection, e-voting, and e-libraries. This paper reports the shortest NSDVS so far that consists of only two elements. The scheme is inspired by an identification scheme and Cramer et al.'s OR-proof technique where a prover can prove that he knows at least one out two secrets. It is solidified by a symmetric key based group to group encryption algorithm. Two implementations of the algorithm are reported. The scheme is provably secure with respect to its properties of unforgeability, non-transferability, privacy of signer's identity, and non-delegatability. 展开更多
关键词 designated verifier signature non-delegatability symmetric encryption
原文传递
Two t-out-of-n Oblivious Transfer Schemes with Designated Receiver
6
作者 ZHANG Jianhong ZOU Wei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1903-1906,共4页
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the... Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable. 展开更多
关键词 oblivious transfer designated verifier EFFICIENCY
下载PDF
Universal Designated Multi Verifier Signature Scheme without Random Oracles 被引量:1
7
作者 MING Yang WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期685-691,共7页
In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) ba... In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) based on Waters' signature scheme. In this setting, a signature holder can to designate the signature to multi verifiers. Moreover, the security of our proposed scheme is based on the Gap Bilinear Difffie-Hellman assumption. 展开更多
关键词 universal designated multi verifier signature random oracle bilinear pairing
原文传递
Deployment of Effective Testing Methodology in Automotive Software Development
8
作者 P. Sivakumar B. Vinod +1 位作者 R. S. Sandhya Devi R. Divya 《Circuits and Systems》 2016年第9期2568-2577,共10页
Software development in automotive industry has bestowed greater comforts and conveniences to mankind. A remarkable progress in this field often faces a setback due to minor defects in the software. So there is recurr... Software development in automotive industry has bestowed greater comforts and conveniences to mankind. A remarkable progress in this field often faces a setback due to minor defects in the software. So there is recurring need for standardization and implementation of testing strategies. But the process of creation of test scripts to check if the software created complies with its specifications and requirements is both time- and resource-consuming. Generating a short but effective test suite usually requires a lot of manual work and expert knowledge. Patronizing research work in this field is the need of the hour. This paper solves the problem by using Model-Based Testing where test harness and evaluation are performed economically through automation. Simulink Design Verifier and Reactis are the tools used to carry out this purpose in Adaptive Front Light System. The resulting outputs obtained from Simulink Design Verifier and Reactis using Model-Based Testing prove that short test suites can be generated for the model where full model coverage can be achieved easily through automation. The outputs of these test cases when compared with the expected outputs confirm that the model developed is working as per the requirements. 展开更多
关键词 Model Advisor Model-Based Testing Reactis Simulink Design verifier
下载PDF
New concurrent digital signature scheme based on the computational Diffie-Hellman problem 被引量:3
9
作者 QIN Wen,ZHOU Nan-run Department of Electronic Information Engineering,Nanchang University,Nanchang 330031,China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第6期89-94,100,共7页
Based on strong designated verifiers signatures,a new fair concurrent signature scheme is proposed. Compared with the previous concurrent signature schemes,even if a keystone must be chosen by the initial signer,the m... Based on strong designated verifiers signatures,a new fair concurrent signature scheme is proposed. Compared with the previous concurrent signature schemes,even if a keystone must be chosen by the initial signer,the matching signer will easily get the keystone through an extraction algorithm. Due to the property of strong designate verifying,the initial signer couldn't make use of the keystone prepared carefully to deceive the matching signer. Then the matching signer is able to participate actively the signature scheme. Besides,there aren't bilinear operations in the keystone algorithm to deliver the keystone efficiently. Therefore the efficiency of our signature scheme is also improved. 展开更多
关键词 designated verifiers signature FAIRNESS concurrent signature information security
原文传递
SEVERAL CRYPTOGRAPHIC APPLICATIONS OF ∑-PROTOCOL
10
作者 Chunming TANG Zheng-an YAO 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2009年第2期260-279,共20页
∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the f... ∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the following difficult problems 1-3 and to construct three ettlcient cryptographic protocols 4 6:1) How to construct a protocol for proving a secret integer to be a Blum integer with form PQ, where P, Q are two different primes and both -- 3(mod 4);2) How to construct a protocol for proving a secret polynomial with exact degree t - 1 iil a (t, n)- threshold secret sharing scheme:3) How to construct witness indistinguishable and witness hiding protocol not from zero-knowledge proof;4) A publicly verifiable secret sharing scheme with information-theoretic security;5) A delegateable signature scheme under the existence of one-way permutations;6) Non-interactive universal designated verifier signature schemes. 展开更多
关键词 ∑-protocol Blum integer delegateable signature secret sharing witness hiding protocol witness indistinguishable protocol universal designated verifier signature.
原文传递
System-level simulation of microbolometer and read-out integrated circuit
11
作者 CHEN Chao JIANG YaDong +2 位作者 ZHANG Long ZHOU Yun ZHENG Xing 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2015年第5期907-915,共9页
A method for system-level simulation between microbolometer designing and Read-Out Integrated Circuit(ROIC) was studied. Three-dimensional(3D) structure modeling of the microbolometer was built. Thermal capacity, ther... A method for system-level simulation between microbolometer designing and Read-Out Integrated Circuit(ROIC) was studied. Three-dimensional(3D) structure modeling of the microbolometer was built. Thermal capacity, thermal conductivity and resistance of the model were obtained from thermoelectric coupling Finite Element Method(FEM) based on the model. An electrical equipment circuit of microbolometer which contains these three parameters was established. By using Verilog-AMS language, the electrical equipment circuit was described as a reduced-order macro-model. Then, the reduced-order macromodel was compiled in cadence to form IP unit of microbolometer, which could be used and identified in cadence. Systemlevel simulation between microbolometer and ROIC was accomplished. Key performances of the device, including input and output characteristics, were obtained in simulation and verified by experimental results. 展开更多
关键词 verified pixel Verilog histogram NETD accomplished Figure capacitance captured designing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部