期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
一种基于伽罗瓦域的密码系统 被引量:1
1
作者 焦占亚 曾永莹 刘海峰 《计算机工程与应用》 CSCD 北大核心 2005年第30期146-148,共3页
研究GF(pn)多项式求逆运算的特性,给出了多项式求逆的方法,并建立可交换的加密算法。该算法安全性高,适合于数据的分组加密。最后,对该密码系统的安全性进行了分析。
关键词 伽罗瓦域 多项式 加密多项式 解密多项式
下载PDF
一种新的基于本地协作的组密钥管理方案 被引量:1
2
作者 游林 李珍格 《计算机安全》 2013年第1期13-16,共4页
结合拉格朗日插值原理和单向哈希函数,提出了一种分布式的组密钥管理方案。该方案采用密钥预置和本地协作的方式实现了组密钥的更新,并对加密多项式分量进行更新,有效地提高了系统的抗合谋攻击能力。理论分析和仿真实验表明,该方案满足... 结合拉格朗日插值原理和单向哈希函数,提出了一种分布式的组密钥管理方案。该方案采用密钥预置和本地协作的方式实现了组密钥的更新,并对加密多项式分量进行更新,有效地提高了系统的抗合谋攻击能力。理论分析和仿真实验表明,该方案满足前向安全性和后向安全性,且对通信开销和存储开销也有明显地改善。 展开更多
关键词 组密钥管理 密钥预置 本地协作 加密多项式分量
下载PDF
基于二次剩余的密钥体制的构造 被引量:1
3
作者 罗婧 范自强 《佳木斯大学学报(自然科学版)》 CAS 2020年第1期168-170,共3页
为了避免确定性的公钥密码体制容易遭受选择明文攻击的问题,文中以大数因数分解的困难性和模Blum数的二次剩余求平方根的不易性为理论基础,引入随机数,构造了一种以二次剩余为基础的多项式加密密钥体制。该密码体制的密码强度不低于RSA... 为了避免确定性的公钥密码体制容易遭受选择明文攻击的问题,文中以大数因数分解的困难性和模Blum数的二次剩余求平方根的不易性为理论基础,引入随机数,构造了一种以二次剩余为基础的多项式加密密钥体制。该密码体制的密码强度不低于RSA公钥密码体制的密码强度,可以有效地抵挡来自选择明文的攻击,安全性较高。它的密文膨胀率不高于Blum和Goldwasser提出的BG密码体制的密文膨胀率,当我们要传输的明文较长时,它的密文膨胀率近似为1。 展开更多
关键词 Blum数 二次剩余 多项式加密
下载PDF
Pitfalls in Identity Based Encryption Using Extended Chebyshev Polynomial
4
作者 Qian Haifeng Li Xiangxue Yu Yu 《China Communications》 SCIE CSCD 2012年第1期58-63,共6页
Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite ... Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite field Ze, Algehawi and Samsudin presented recently an Identity Based Encryption (IBE) scheme. In this paper, we showed their proposal is not as secure as they chimed. More specifically, we presented a concrete attack on the scheme of Algehawi and Samsudin, which indicated the scheme cannot be consolidated as a real altemative of IBE schemes since one can exploit the semi group property (bilinearity) of extended Chebyshev polynomials over Zp to implement the attack without any difficulty. 展开更多
关键词 IBE extended Chebyshev polynomial chaotic cryptography bilinearity
下载PDF
Ad-Hoc Broadcast Encryption wit Dynamic Revocation
5
作者 王晓明 廖志委 《China Communications》 SCIE CSCD 2012年第5期129-140,共12页
In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based struct... In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based structure is proposed, as Mu-Vmdharajan's scheme cannot securely remove subscribers with data redundancy. In the proposed scheme, we employ polynomial function and filter functions as the basic means of constructing broadcast encryption procedure in order to reduce computation and shortage overhead. Compared with existing schemes, our scheme requires low computation, corrmaunication and storage over- heads in receivers and can support the dynamics of the privileged users. Furthermore, our scheme can avoid n^assive message to exchange for estab-fishing the decryption key between members of the cluster. The analysis of security and perforrmnce shows that our scheme is more secure than Mu- Vmdharajan's scheme and has the same speed of encryption and decryption as theirs. So our scheme is particularly suitable for the devices with low power setting such as ad hoc networks. 展开更多
关键词 mobile ad hoc network broadcast en-cryption added and revoked members
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部