Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an i...Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an important role in security solutions. Several ID-based signature schemes have been put forward, many of which are based on bilinear pairings. In key management and moderate security demand scenarios, ID-based public key cryptosystem is more preferable than other public key infrastructure based systems. In this paper, an improved ID-based proxy ring signature scheme from bilinear pairings is proposed which combines the advantages of proxy signature and of ring signatures. Our scheme can guarantee the profits of the proxy signer via preventing the original signer form generating the proxy ring signature. Furthermore, bilinear pairings are introduced to minimize the computation overhead and to improve the related performance of our scheme. In contrast with Zhang's scheme, our scheme is a computational efficiency improvement for signature verification because the computational cost of bilinear pairings required is reduced from O(n) to O( 1 ). In addition, the proxy ring signature presented in this paper can perfectly satisfy all the security requirements of proxy ring signature, i. e. signer-ambiguity, non-forgeability, verification, non-deniability and distinguishability.展开更多
On the basis of description of the necessity in construction of the Jiangxi red tourism resource E-C/C-E bilingual parallel corpus, this paper discusses the design and construction of the corpus. In its design, it des...On the basis of description of the necessity in construction of the Jiangxi red tourism resource E-C/C-E bilingual parallel corpus, this paper discusses the design and construction of the corpus. In its design, it describes the general design and the framework of the corpus, then it describes its construction including data collection, the standard for the sorted data, data selection, data digitalization, data tagging and data aligning. With the construction, it will not only realize purposes and functions of the corpus, but also provide others with ways or means to use the corpus and to establish such kind of corpus.展开更多
基金Sponsored by the National Natural Science Foundation of China(Grant No.90104033).
文摘Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an important role in security solutions. Several ID-based signature schemes have been put forward, many of which are based on bilinear pairings. In key management and moderate security demand scenarios, ID-based public key cryptosystem is more preferable than other public key infrastructure based systems. In this paper, an improved ID-based proxy ring signature scheme from bilinear pairings is proposed which combines the advantages of proxy signature and of ring signatures. Our scheme can guarantee the profits of the proxy signer via preventing the original signer form generating the proxy ring signature. Furthermore, bilinear pairings are introduced to minimize the computation overhead and to improve the related performance of our scheme. In contrast with Zhang's scheme, our scheme is a computational efficiency improvement for signature verification because the computational cost of bilinear pairings required is reduced from O(n) to O( 1 ). In addition, the proxy ring signature presented in this paper can perfectly satisfy all the security requirements of proxy ring signature, i. e. signer-ambiguity, non-forgeability, verification, non-deniability and distinguishability.
文摘On the basis of description of the necessity in construction of the Jiangxi red tourism resource E-C/C-E bilingual parallel corpus, this paper discusses the design and construction of the corpus. In its design, it describes the general design and the framework of the corpus, then it describes its construction including data collection, the standard for the sorted data, data selection, data digitalization, data tagging and data aligning. With the construction, it will not only realize purposes and functions of the corpus, but also provide others with ways or means to use the corpus and to establish such kind of corpus.