期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
一种新的无证书代理签名方案的分析与改进 被引量:5
1
作者 申军伟 杨晓元 +1 位作者 梁中银 陈海滨 《计算机工程与应用》 CSCD 北大核心 2010年第8期96-98,共3页
樊睿等人提出了一种新的无证书代理签名方案,该方案的安全性是基于CDH困难性假设。对该代理签名方案进行了安全性分析,指出该方案不仅泄露了原始签名者的私钥,而且不能抵抗替换公钥攻击和恶意但被动的KGC攻击,从而不满足代理签名的安全... 樊睿等人提出了一种新的无证书代理签名方案,该方案的安全性是基于CDH困难性假设。对该代理签名方案进行了安全性分析,指出该方案不仅泄露了原始签名者的私钥,而且不能抵抗替换公钥攻击和恶意但被动的KGC攻击,从而不满足代理签名的安全性要求。同时提出了一个改进方案,改进方案不仅弥补了原方案的安全缺陷,而且改善了协议的性能。 展开更多
关键词 无证书公钥密码体制 代理签名 替换公钥攻击 密钥生成中心 恶意但被动的kgc攻击
下载PDF
无证书签名方案的分析及改进 被引量:1
2
作者 葛荣亮 高德智 +1 位作者 梁景玲 张云 《计算机工程与应用》 CSCD 2013年第5期96-98,共3页
对一个无证书签名方案进行安全性分析,指出该方案不能抵抗公钥替换攻击和恶意的KGC攻击,即攻击者可以通过替换签名者的公钥来伪造任意消息的签名,恶意的KGC(Key Generation Center)可以获取用户的私钥。分析结果显示该方案不能满足无证... 对一个无证书签名方案进行安全性分析,指出该方案不能抵抗公钥替换攻击和恶意的KGC攻击,即攻击者可以通过替换签名者的公钥来伪造任意消息的签名,恶意的KGC(Key Generation Center)可以获取用户的私钥。分析结果显示该方案不能满足无证书签名方案的安全性要求,同时为了应对这两种攻击,提出了改进的方案。 展开更多
关键词 无证书签名 公钥替换攻击 恶意密钥生成中心(kgc)攻击 双线性对
下载PDF
对标准模型下无证书签名方案的安全性分析 被引量:1
3
作者 胡国政 韩兰胜 夏祥胜 《计算机工程与应用》 CSCD 北大核心 2011年第11期11-14,共4页
通过对一个标准模型下可证安全的无证书签名方案进行分析,指出该方案是不安全的。分析了一种针对该方案的公钥替换攻击和改进方案,说明该公钥替换攻击是一种平凡的伪造攻击,指出了这个改进方案也是不安全的。提出了一种新的密钥生成中心... 通过对一个标准模型下可证安全的无证书签名方案进行分析,指出该方案是不安全的。分析了一种针对该方案的公钥替换攻击和改进方案,说明该公钥替换攻击是一种平凡的伪造攻击,指出了这个改进方案也是不安全的。提出了一种新的密钥生成中心KGC攻击,即通用恶意KGC攻击,在这种攻击下,这两个无证书签名方案的KGC总是能够在系统参数生成阶段生成包含陷门信息的系统参数,利用这些参数,KGC不需要计算出用户的私钥就可以冒充任意系统用户对任意消息进行伪造签名。给出了攻击方法,并针对这种通用恶意KGC攻击提出了新的改进方案,使其能够抵抗这种攻击。 展开更多
关键词 无证书签名 恶意kgc攻击 公钥替换攻击 双线性对
下载PDF
SAC-TA: A Secure Area Based Clustering for Data Aggregation Using Traffic Analysis in WSN 被引量:1
4
作者 Mohanbabu Gopalakrishnan Gopi Saminathan Arumugam +1 位作者 Karthigai Lakshmi Shanmuga Vel 《Circuits and Systems》 2016年第8期1404-1420,共17页
Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the... Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the WSN in the remote and hostile environments for the transmission of the sensitive information, the sensor nodes are more prone to the false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a Secure Area based Clustering approach for data aggregation using Traffic Analysis (SAC-TA) in WSN. Here, the sensor network is clustered into small clusters, such that each cluster has a CH to manage and gather the information from the normal sensor nodes. The CH is selected based on the predefined time slot, cluster center, and highest residual energy. The gathered data are validated based on the traffic analysis and One-time Key Generation procedures to identify the malicious nodes on the route. It helps to provide a secure data gathering process with improved energy efficiency. The performance of the proposed approach is compared with the existing Secure Data Aggregation Technique (SDAT). The proposed SAC-TA yields lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and false data detection rate than the existing technique. 展开更多
关键词 Data Aggregation False Data Injection attacks malicious Nodes One-Time key generation Secure One-Time (SOT) key and Wireless Sensor Networks (WSNs)
下载PDF
Certificateless Encryption Scheme Secure in Standard Model 被引量:2
5
作者 张国艳 王小云 《Tsinghua Science and Technology》 SCIE EI CAS 2009年第4期452-459,共8页
The scheme introduced by Hwang and Liu in 2008 is shown to be insecure against the key re- placement attack. A more practical attack model is introduced, and according to this model, an efficient cer- tificateless enc... The scheme introduced by Hwang and Liu in 2008 is shown to be insecure against the key re- placement attack. A more practical attack model is introduced, and according to this model, an efficient cer- tificateless encryption scheme is presented which is IND-CCA secure against both Type I and Type II at- tackers without random oracle. This encryption scheme can defend against the malicious key generation center attack, and can reach Girault's trusted level 3 as in traditional public key infrastructure-based cryp- tography. This certificateless encryption scheme has a shorter public key than other schemes in the stan- dard model. 展开更多
关键词 certificateless cryptography malicious key generation center key replacement attack IND-CCA secure
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部