期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Word文档保密有绝招
1
作者 李顺 《电脑知识与技术(过刊)》 2004年第6期28-28,共1页
随着电脑的越来越普及,会电脑的人越来越多,文件的安全性也越来越重要。对于我们用的比较多的办公软件word来说,掌握一些保密方面的小技巧,对于我们的工作和学习还是非常有益处的。下面就将我掌握的一些小的方法“共享”给大家。
关键词 WORD文档 安全性 属性隐藏 修改扩展名 字体颜色 加密码法 copy命令 字体效果
下载PDF
On the Group Based Cryptography
2
作者 Mehmet KALKAN Hacl AKTAS 《Journal of Mathematics and System Science》 2014年第11期710-714,共5页
There are quite more applications of group theory. The recent application of group theory is public key (asymmetric) cryptography. All cryptographic algorithms have some weaknesses. To avoid its weakness, some speci... There are quite more applications of group theory. The recent application of group theory is public key (asymmetric) cryptography. All cryptographic algorithms have some weaknesses. To avoid its weakness, some special groups and methods can applied on. We will touch on group based public key cryptography and will give some suggestions in this area. 展开更多
关键词 Soft Groups Soft Cryptography Public Key Cryptography
下载PDF
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
3
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
下载PDF
A chaos-based quantum group signature scheme in quantum cryptosystem
4
作者 娄小平 陈志刚 Moon Ho Lee 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第7期2604-2611,共8页
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp... A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers. 展开更多
关键词 group signature chaotic encryption quantum entanglement quantum cryptography
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部