期刊文献+
共找到128篇文章
< 1 2 7 >
每页显示 20 50 100
Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings 被引量:12
1
作者 SHAOZu-hua 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期267-270,共4页
An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl... An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure. 展开更多
关键词 authenticated key agreement protocol self-certified public keys bilinearpairings
下载PDF
A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key 被引量:3
2
作者 LIJi-guo ZHANGYi-chen ZHUYue-long 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期219-222,共4页
A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the t... A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer. 展开更多
关键词 key words cryptography proxy signature SELF certified public key non REPUDIATION
下载PDF
A New Threshold Signature Scheme Using Self-Certified Public Keys
3
作者 SHAOJun LURong-xing CAOZhen-fu 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期263-266,共4页
To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation... To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation cost than previous schemes. Furthermore, the signatmeprocess of the proposed scheme is non-interactive. 展开更多
关键词 self-certified threshold signature public key cryptosy stems
下载PDF
Leadership,communication,and science:three pillars essential to public health emergency response and closing the gap in the HIV response among key populations
4
作者 Tafadzwa Dzinamarira Enos Moyo +2 位作者 Perseverance Moyo Munashe Chimene Grant Murewanhema 《Global Health Journal》 2023年第4期182-185,共4页
Globally,there have been multiple public health emergencies in recent decades.High rates of morbidity,occasionally mortality,and economic instability are usually associated with pandemics.One of the epidemics that has... Globally,there have been multiple public health emergencies in recent decades.High rates of morbidity,occasionally mortality,and economic instability are usually associated with pandemics.One of the epidemics that has significantly increased morbidity and mortality worldwide is the human immunodeficiency virus(HIV)and acquired immune deficiency syndrome(AIDS)pandemic.HIV has a disproportionately negative impact on key populations.Strong leadership,effective communication,and sound science are necessary for public health emergency(PHE)responses to be successful.These three PHE response pllars are also essential for bridging the HIV response gap among key populations in the setting of restrictive laws.In this review,we explored the importance of these three pillars of successful PHEs responses,and how they are essential to closing the gap in the HIV response among key populations.Leaders must make decisions and instil a sense of authority in the populace during PHEs to foster trust and confidence.Leaders should base their choices on scientific evidence.Effective communication during PHEs should be proactive,polite,imaginative,innovative,and constructive.To address gaps in the HIV response among key populations,leaders must create a supportive environment for effective communication and scientific research,communication should be used to raise awareness of HIV and to dispel stigma and discrimination,while science should provide evidence of efficacy and effectiveness of interventions amongkey populations. 展开更多
关键词 public health emergencies LEADERSHIP COMMUNICATION SCIENCE key populations HIV response
下载PDF
Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography 被引量:23
5
作者 SHI Yijuan LI Jianhua 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期71-74,共4页
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. M... Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. Many certificateless public key encryption and signature schemes have been proposed. However, the key agreement in CL-PKE is seldom discussed. In this paper, we present a new certificateless two party authentication key agreement protocol and prove its security attributes. Compared with the existing protocol, our protocol is more efficient. 展开更多
关键词 key agreement two party certificateless public key encryotion
下载PDF
Certificateless Public Key Encryption with Keyword Search 被引量:23
6
作者 PENG Yanguo CUI Jiangtao +1 位作者 PENG Changgen YING Zuobin 《China Communications》 SCIE CSCD 2014年第11期100-113,共14页
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ... Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem. 展开更多
关键词 provable secure certificateless public key encryption keyword search
下载PDF
Public Key Cryptography Based on Ergodic Matrices over Finite Field 被引量:8
7
作者 PEI Shihui ZHAO Hongwei ZHAO Yongzhe 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1525-1528,共4页
A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over fini... A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can't be solved with polynomial time algorithm. 展开更多
关键词 ergodic matrix strong matrix public key cryptography
下载PDF
Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model 被引量:5
8
作者 FU Cai HONG Fan LI Rui-xian HONG Liang CHEN Jing 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期188-192,共5页
In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public k... In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better. 展开更多
关键词 Ad Hoc networks self-organize bidirectional trust public key management.
下载PDF
Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes 被引量:4
9
作者 王后珍 沈昌祥 +1 位作者 徐正全 张焕国 《China Communications》 SCIE CSCD 2011年第4期23-31,共9页
Advances in quantum computers pose potential threats to the currently used public-key cryptographic algorithms such as RSA and ECC.As a promising candidate against attackers equipped with quantum computational power,M... Advances in quantum computers pose potential threats to the currently used public-key cryptographic algorithms such as RSA and ECC.As a promising candidate against attackers equipped with quantum computational power,Multivariate Public-Key Cryptosystems(MPKCs)has attracted increasing attention in recently years.Unfortunately,the existing MPKCs can only be used as multivariate signature schemes,and the way to construct an efficient MPKC enabling secure encryption remains unknown.By employing the basic MQ-trapdoors,this paper proposes a novel multivariate encryption scheme by combining MPKCs and code-based public-key encryption schemes.Our new construction gives a positive response to the challenges in multivariate public key cryptography.Thorough analysis shows that our scheme is secure and efficient,and its private key size is about 10 times smaller than that of McEliece-type cryptosystems. 展开更多
关键词 CRYPTOGRAPHY multivariate public key cryptosystems Goppa codes
下载PDF
An Internet Key Exchange Protocol Based on Public Key Infrastructure 被引量:2
10
作者 朱建明 马建峰 《Journal of Shanghai University(English Edition)》 CAS 2004年第1期51-56,共6页
Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for provi... Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange. 展开更多
关键词 AUTHENTICATION ENCRYPTION Interent key exchange(IKE) public key infrastructure(PKI).
下载PDF
A Multivariate Public Key Cryptographic Scheme 被引量:5
11
作者 YUAN Feng SUN Ying +2 位作者 JIANG Jijun ZHAO Shangwei XU Shengwei 《China Communications》 SCIE CSCD 2014年第12期120-124,共5页
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is a... This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is analyzed in detail,and this paper indicates that the scheme can withstand the up to date differential cryptanalysis.We give heuristic arguments to show that this scheme resists all known attacks. 展开更多
关键词 public key cryptography polynomials multivariate finite field
下载PDF
Secured Cloud Data Migration Technique by Competent Probabilistic Public Key Encryption 被引量:3
12
作者 M.G.Aruna K.G.Mohan 《China Communications》 SCIE CSCD 2020年第5期168-190,共23页
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident... Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc. 展开更多
关键词 Luhn algorithm ENCRYPTION efficient probabilistic public key encryption(EPPKE) covariance matrix adaptation evolution strategies(CMA-ES) trusted third party(TTP)
下载PDF
A New Fast Modular Arithmetic Method in Public Key Cryptography 被引量:1
13
作者 WANG Bangju ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1645-1648,共4页
Modular arithmetic is a fundamental operation and plays an important role in public key cryptosystem. A new method and its theory evidence on the basis of modular arithmetic with large integer modulus-changeable modul... Modular arithmetic is a fundamental operation and plays an important role in public key cryptosystem. A new method and its theory evidence on the basis of modular arithmetic with large integer modulus-changeable modulus algorithm is proposed to improve the speed of the modular arithmetic in the presented paper. For changeable modulus algorithm, when modular computation of modulo n is difficult, it can be realized by computation of modulo n-1 and n-2 on the perquisite of easy modular computations of modulo n-1 and modulo n-2. The conclusion is that the new method is better than the direct method by computing the modular arithmetic operation with large modulus. Especially, when computations of modulo n-1 and modulo n-2 are easy and computation of modulo n is difficult, this new method will be faster and has more advantages than other algorithms on modular arithmetic. Lastly, it is suggested that the proposed method be applied in public key cryptography based on modular multiplication and modular exponentiation with large integer modulus effectively 展开更多
关键词 public key cryptography modular arithmetic modular multiplication modular exponentiation
下载PDF
Public Key Cryptosystem Based on Two Sided Action of Different Exotic Semirings 被引量:1
14
作者 Mariana Durcheva 《Journal of Mathematics and System Science》 2014年第1期6-13,共8页
The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic prob... The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic problems, optimization theory, discrete event systems, fuzzy logics. In this paper we consider the expansion of the semirings Rmax and Rmin with residuals and describe how to use these expended semirings in public key cryptography. 展开更多
关键词 public key cryptosystem exotic semirings semiring action residuals.
下载PDF
Provably Secure Self-Certified Signature Schemes with Message Recovery
15
作者 Zhang Shengyuan Tang Fei Lin Changlu Ke Pinhui 《China Communications》 SCIE CSCD 2012年第10期112-119,共8页
To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key... To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes . 展开更多
关键词 digital signature self-certified public key message recovery random oracle model
下载PDF
A New Self-Generated-Certificate Public Key Encryption Scheme with Flexible Public Key
16
作者 赵彦慧 徐茂智 沈浔浔 《China Communications》 SCIE CSCD 2011年第2期12-20,共9页
Self-Generated-Certificate Public Key Cryptography(SGC-PKC) ,is the enhanced version of Certificateless Public Key Cryptography(CL-PKC) . It preserves all advantages of CL-PKC. Similar to CL-PKC,every user is given a ... Self-Generated-Certificate Public Key Cryptography(SGC-PKC) ,is the enhanced version of Certificateless Public Key Cryptography(CL-PKC) . It preserves all advantages of CL-PKC. Similar to CL-PKC,every user is given a partial private key by the KGC and generates his own private key and corresponding public key. In addition,it can defend against the Denial-of-Decryption(DoD) Attack. In this paper,we propose a new approach to construction SGC-PKE scheme that derived from a new application of chameleon hash and give a concrete scheme. It is the first scheme which has flexible public key and reaches Girault's trusted level 3,the same level as is enjoyed in a traditional PKI. 展开更多
关键词 certificateless public key crypto-graphy self-generated-certificate public key cryptography chameleon hash flexible public key
下载PDF
Novel Hyper-Combined Public Key Based Cloud Storage Key Management Scheme
17
作者 SONG Ningning CHEN Yucyun 《China Communications》 SCIE CSCD 2014年第A02期185-194,共10页
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme... In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system 展开更多
关键词 cloud storage hyperelliptic curve combined public key key management hiddenmapping
下载PDF
New Public Key Cryptosystems from Combinatorial Group Theory
18
作者 TANG Xueming WANG Xiaofei HONG Fan CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1267-1270,共4页
External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in... External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in the quantum computing epoch. Three hard problems on this new platform, Subgroup Root Problem, Multi-variant Subgroup Root Problem and Subgroup Action Problem are presented and well analyzed, which all have no relations with conjugacy. New secure public key encryption system and key agreement protocol are designed based on these hard problems. The new cryptosystems can be implemented in a general group environment other than in braid or Artin groups. 展开更多
关键词 public key cryptosystem key agreement protocol combinatorial group theory Artin group external direct product quantum computing
下载PDF
Applying Evolutionary Algorithm to Public Key Cryptosystems
19
作者 Tu Hang, Li Li, Wu Tao-jun, Li Yuan-xiangState Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, Hubei,China)School of Computer, Wuhan University, Wuhan 430072, Hubei,China 《Wuhan University Journal of Natural Sciences》 CAS 2003年第S1期287-293,共7页
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under diffe... A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public key cryptography. The model contributes to designing public key cryptography system too. 展开更多
关键词 prime generation RSA public key cryptography evolutionary algorithm
下载PDF
Generative Trapdoors for Public Key Cryptography Based on Automatic Entropy Optimization
20
作者 Shuaishuai Zhu Yiliang Han 《China Communications》 SCIE CSCD 2021年第8期35-46,共12页
Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally har... Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally hard problem,such as the NPC problems.So the trapdoor in a public key encryption mechanism turns out to be a type of limited resource.In this paper,we generalize the methodology of adversarial learning model in artificial intelligence and introduce a novel way to conveniently obtain sub-optimal and computationally hard trapdoors based on the automatic information theoretic search technique.The basic routine is constructing a generative architecture to search and discover a probabilistic reversible generator which can correctly encoding and decoding any input messages.The architecture includes a trapdoor generator built on a variational autoencoder(VAE)responsible for searching the appropriate trapdoors satisfying a maximum of entropy,a random message generator yielding random noise,and a dynamic classifier taking the results of the two generator.The evaluation of our construction shows the architecture satisfying basic indistinguishability of outputs under chosen-plaintext attack model(CPA)and high efficiency in generating cheap trapdoors. 展开更多
关键词 generative model public key encryption indistinguishability model security model deep learning
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部