期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
An Improved Ring Signature Scheme without Trusted Key Generation Center for Wireless Sensor Network 被引量:1
1
作者 肖俊芳 曾贵华 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第2期189-194,共6页
Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitab... Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitable way used in WSN. But key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest key generation center (KGC) can forge the signature of any node and on the other hand the node can deny the signature actually signed by him/herself. To solving this problem, we propose an ID-based ring signature scheme without trusted KGC. We also present the accurate secure proof to prove that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other ring signature schemes, we think proposed scheme is more efficient. 展开更多
关键词 wireless sensor network SIGNATURE bilinear pairings key escrow trusted key generation center (kgc
原文传递
Certificateless Encryption Scheme Secure in Standard Model 被引量:2
2
作者 张国艳 王小云 《Tsinghua Science and Technology》 SCIE EI CAS 2009年第4期452-459,共8页
The scheme introduced by Hwang and Liu in 2008 is shown to be insecure against the key re- placement attack. A more practical attack model is introduced, and according to this model, an efficient cer- tificateless enc... The scheme introduced by Hwang and Liu in 2008 is shown to be insecure against the key re- placement attack. A more practical attack model is introduced, and according to this model, an efficient cer- tificateless encryption scheme is presented which is IND-CCA secure against both Type I and Type II at- tackers without random oracle. This encryption scheme can defend against the malicious key generation center attack, and can reach Girault's trusted level 3 as in traditional public key infrastructure-based cryp- tography. This certificateless encryption scheme has a shorter public key than other schemes in the stan- dard model. 展开更多
关键词 certificateless cryptography malicious key generation center key replacement attack IND-CCA secure
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部