期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于PKI体系的信息安全技术研究 被引量:5
1
作者 吴琼 《现代计算机》 2007年第3期44-46,共3页
PKI技术是利用公钥理论和技术建立的提供安全服务的基础设施。PKI技术是信息安全技术的核心,也是电子商务的关键和基础技术。该文探讨了PKI体系组成和基于PKI体系的几种网络信息安全技术。
关键词 PKI 网络信息 安全技术 公钥理论 电子商务
下载PDF
CA系统在网络银行中的应用
2
作者 张凯 荆继武 《中国科学院研究生院学报》 CAS CSCD 2001年第2期173-176,共4页
讨论了在网络银行等实际电子商务应用中 ,实施构建一个高安全级别的CA系统的意义、方法和具体要求 。
关键词 PKI 网络银行 电子商务 网络安全 CA系统 公钥理论 非对称密码体制
下载PDF
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
3
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua... The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 展开更多
关键词 ergodic matrix tensor problem resist quantum key exchange protocol ENCRYPTION
下载PDF
电子签名技术浅议
4
《数码世界(A)》 2005年第03A期20-21,共2页
今年4月1日,《中华人民共和国电子签名法》将开始实施。
关键词 电子签名 数字签名 公钥密码理论 网络安全 信息安全 计算机网络 《中华人民共和国电子签名法》
下载PDF
Public-key encryption and authentication of quantum information 被引量:7
5
作者 LIANG Min YANG Li 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2012年第9期1618-1629,共12页
Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and t... Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and then construct an informationtheoretic secure instance.Then,we propose a quantum public-key authentication scheme,which can protect the integrity of quantum messages.This scheme can both encrypt and authenticate quantum messages.It is information-theoretic secure with regard to encryption,and the success probability of tampering decreases exponentially with the security parameter with regard to authentication.Compared with classical public-key cryptosystems,one private-key in our schemes corresponds to an exponential number of public-keys,and every quantum public-key used by the sender is an unknown quantum state to the sender. 展开更多
关键词 quantum cryptography AUTHENTICATION quantum public-key private quantum channel
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部