期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
THE SCITECH TOWER & PLACE AWARDED DOUBLE AUTHENTICATION
1
《China's Foreign Trade》 2002年第5期63-63,共1页
At present, as capital well-known office building, the SCITECHTOWER & PLACE achieved authenticated certificates of ISO 14001both international and China environmental management system fromUKAS and CACEB. It’s th... At present, as capital well-known office building, the SCITECHTOWER & PLACE achieved authenticated certificates of ISO 14001both international and China environmental management system fromUKAS and CACEB. It’s the first time for an office building gained thedouble authentication in mainland. Ms. Zhang Keping, general managerof the SCITECH TOWER & PLACE claimed that, it’s the 展开更多
关键词 PLACE AWARDED double authentication THE SCITECH TOWER ZHANG
下载PDF
An Algorithm Substitution Attack on Fiat-Shamir Signatures Based on Lattice
2
作者 LIU Jinhui YU Yong +2 位作者 WU Fusheng CHENG Yuehua ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2022年第1期17-25,共9页
Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing the... Many evidences have showed that some intelligence agencies(often called big brother)attempt to monitor citizens’communication by providing coerced citizens a lot of subverted cryptographic algorithms and coercing them to adopt these algorithms.Since legalized services on large number of various applications and system architectures depend on digital signature techniques,in the context some coerced users who use double authentication preventing signatures to design some novel digital signature techniques,have some convincing dissertations to defuse requests from authorities and big brothers creating some corresponding subverted signatures.As rapid progress in quantum computers,National Security Agency advisory memorandum and announcement of National Institute of Standards and Technology procedures from standardization focus on some cryptographic algorithms which are post quantum secure.Motivated by these issues,we design an algorithm substitution attack against Fiat-Shamir family based on lattices(e.g.,BLISS,BG,Ring-TESLA,PASSSign and GLP)that are proven post-quantum computational secure.We also show an efficient deterable way to eliminate big brother’s threat by leaking signing keys from signatures on two messages to be public.Security proof shows that our schemes satisfy key extraction,undetectability and deterability.Through parameters analysis and performance evaluation,we demonstrate that our deterring subverted Fiat-Shamir signature is practical,which means that it can be applied to privacy and protection in some system architectures. 展开更多
关键词 algorithm substitution attack double authentication preventing signatures LATTICE ring-SIS(small integer solution)problem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部