期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
一种新型的可加密电话计费器的研制
1
作者 韩秀清 《南昌大学学报(工科版)》 CAS 1998年第2期31-33,共3页
介绍了一种新型的可加密电话计费器该系统采用中大规模集成电路,单片机技术设计。
关键词 可加密 电话计费器 单片机
下载PDF
基于NFC安全支付的智能售卖系统研究
2
作者 戴志琳 万凯 王秋卜 《科技传播》 2017年第5期94-95,共2页
针对生活中自动售卖机存在的在线支付速度慢,纸币支付成功率低等特点,文章结合自动售卖机和大学校园内广泛使用的一卡通,设计了基于NFC安全支付的智能售卖系统,大大提高了使用效率,为用户节省了购买时间。同时结合NFC技术抗干扰能力强... 针对生活中自动售卖机存在的在线支付速度慢,纸币支付成功率低等特点,文章结合自动售卖机和大学校园内广泛使用的一卡通,设计了基于NFC安全支付的智能售卖系统,大大提高了使用效率,为用户节省了购买时间。同时结合NFC技术抗干扰能力强、通信迅速、可加密安全性高等特点,使用户的财产安全得以保障,不会出现资金被盗取的安全隐患,在如今这个自动智能逐渐普及的时代应用前景十分宽广。 展开更多
关键词 自动售卖机 NFC 安全支付 抗干扰 可加密
下载PDF
Identity-Based Proxy Verifiably Encrypted Signature Scheme 被引量:2
3
作者 Liu Jianhua Liu Jianwei Qiu Xiufeng 《China Communications》 SCIE CSCD 2012年第11期137-149,共13页
A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages o... A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages of a proxy signature and a VES in order to delegate the signing capability of the VES of an entity called the original signer to another entity, called the proxy signer. In this IPVES scheme, the original signer delegates his/her signing capability to the proxy signer. The proxy signer issues a signature by using a proxy signing key, encrypts the signature under a designated public key, and subsequently convinces a verifier that the resulting ciphertext contains such a signature. We prove that the proposed IPVES scheme is secure in a random oracle model under the computational Diffie-Hellman assumption. 展开更多
关键词 digital signature proxy signature random oracle model information security
下载PDF
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
4
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua... The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 展开更多
关键词 ergodic matrix tensor problem resist quantum key exchange protocol ENCRYPTION
下载PDF
Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings 被引量:7
5
作者 亓延峰 唐春明 +2 位作者 娄裕 徐茂智 郭宝安 《China Communications》 SCIE CSCD 2013年第11期37-41,共5页
Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi... Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure. 展开更多
关键词 certificateless signcryption iden-tity-based cryptography proxy signcryption elliptic curve discrete logarithm problem
下载PDF
Key substitution attacks on some verifiably encrypted signature schemes
6
作者 夏琦 Xu Chunxiang Yu Yong 《High Technology Letters》 EI CAS 2011年第2期191-195,共5页
As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and mos... As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting. 展开更多
关键词 CRYPTOGRAPHY fair exchange verifiably encrypted signature key substitution attack
下载PDF
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT 被引量:1
7
作者 Han Yanyan Hu Yupu He Wencai 《Journal of Electronics(China)》 2009年第5期631-636,共6页
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect. 展开更多
关键词 Visual cryptography Digital signature Time-stamp
下载PDF
加密处理器
8
作者 王晓鸣 《信息安全与通信保密》 1991年第4期35-35,共1页
据《Journal of Eloctronic Defense》1991年7月号报道:美国莫托罗拉政府电子集团最近已研制出一种型号为AN/csz-1A的商用通信保密产品—Sunburst Ⅱ加密处理器。该处理器可加密话音和数据,并能在卫星链路中进行宽带和窄带传输。-5kHZ... 据《Journal of Eloctronic Defense》1991年7月号报道:美国莫托罗拉政府电子集团最近已研制出一种型号为AN/csz-1A的商用通信保密产品—Sunburst Ⅱ加密处理器。该处理器可加密话音和数据,并能在卫星链路中进行宽带和窄带传输。-5kHZ的工作带宽可允许更多的用户访问同样卫星。这种加密处理器可与大多数高频(HF)、甚高频(VHF)、超高频(UHF)及超高频卫星通信无线通信相兼容。 展开更多
关键词 处理器 通信保密 超高频 卫星链路 无线通信 卫星通信 窄带传输 工作带 可加密 甚高频
原文传递
The Gauss sums and Jacobi sums over Galois ring GR(p^2 , r) 被引量:1
9
作者 LI Jin ZHU ShiXin FENG KeQin 《Science China Mathematics》 SCIE 2013年第7期1457-1465,共9页
Galois rings and exponential sums over Galois rings have many applications in algebraic combinatorics, coding theory and cryptography. In this paper, we present explicit description on the Gauss sums and Jacobi sums o... Galois rings and exponential sums over Galois rings have many applications in algebraic combinatorics, coding theory and cryptography. In this paper, we present explicit description on the Gauss sums and Jacobi sums over Galois ring GR(p2 , r), and show that the values of these sums can be reduced to the Gauss sums and Jacobi sums over finite field Fpr for all non-trivial cases. 展开更多
关键词 Galois rings Gauss sums Jacobi sums finite fields
原文传递
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme 被引量:1
10
作者 CHEN Yu CHEN LiQun LIN DongDai 《Science China Mathematics》 SCIE 2013年第7期1385-1401,共17页
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash func... In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash functions of the original BF-IBE. Compared with prior proofs, our new proof provides a tighter security reduction and minimizes the use of random oracles, thus indicates BF-IBE has better provable security with our new choices of hash functions. The techniques developed in our proof can also be applied to improving security analysis of some other IBE schemes. As an independent technical contribution, we also give a rigorous proof of the Fujisaki-Okamoto (FO) transformation in the case of CPA-to-CCA, which demonstrates the efficiency of the FO-transformation (CPA-to-CCA), in terms of the tightness of security reduction, has long been underestimated. This result can remarkably benefit the security proofs of encryption schemes using the FO-transformation for CPA-to-CCA enhancement. 展开更多
关键词 identity-based encryption Fujisaki-Okamoto transformation provable security cascading reduction
原文传递
Constructing pairing-free certificateless public key encryption with keyword search
11
作者 Yang LU Ji-guo LI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第8期1049-1061,共13页
Searchable public key encryption enables a storage server to retrieve the publicly encrypted data without revealing the original data contents.It offers a perfect cryptographic solution to encrypted data retrieval in ... Searchable public key encryption enables a storage server to retrieve the publicly encrypted data without revealing the original data contents.It offers a perfect cryptographic solution to encrypted data retrieval in encrypted data storage systems.Certificateless cryptography(CLC)is a novel cryptographic primitive that has many merits.It overcomes the key escrow problem in identity-based cryptosystems and the cumbersome certificate problem in conventional public key cryptosystems.Motivated by the appealing features of CLC,three certificateless encryption with keyword search(CLEKS)schemes were presented in the literature.However,all of them were constructed with the costly bilinear pairing and thus are not suitable for the devices that have limited computing resources and battery power.So,it is interesting and worthwhile to design a CLEKS scheme without using bilinear pairing.In this study,we put forward a pairing-free CLEKS scheme that does not exploit bilinear pairing.We strictly prove that the scheme achieves keyword ciphertext indistinguishability against adaptive chosen-keyword attacks under the complexity assumption of the computational Diffie-Hellman problem in the random oracle model.Efficiency comparison and the simulation show that it enjoys better performance than the previous pairing-based CLEKS schemes.In addition,we briefly introduce three extensions of the proposed CLEKS scheme. 展开更多
关键词 Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing Computational Diffie-Hellman problem
原文传递
Engineering “JiaoJiao”(maltose syrup) with chopsticks: From traditional Chinese sweet food to skin-like iontronics
12
作者 Jiahui Huang Peiyi Wu 《Science China Materials》 SCIE EI CAS CSCD 2021年第12期3059-3068,共10页
The advancement of technology has had a profound impact on all areas of life, with an ever more intimate integration of the digital and biological spheres, but it may also be accompanied by an environmental crisis cau... The advancement of technology has had a profound impact on all areas of life, with an ever more intimate integration of the digital and biological spheres, but it may also be accompanied by an environmental crisis caused by the abuse of large quantities of electronics and petrochemicals.Next-generation "green" electronics or iontronics with high biocompatibility, biodegradation, low cost and mechanical compliance promise to mitigate these adverse effects, but are often limited by the finite choices of materials and strategies.Herein, maltose syrup, a traditional water-dissolvable saccharide food called "JiaoJiao" in Chinese, is engineered to replace unsustainable conductive components of current electronic devices. After churning and pulling with two chopsticks, known as aeration, the aerated maltose syrup has optimized viscoelasticity, mechanical adaptation, robustness,remodeling and self-healing capability, yet with transient behavior. Moreover, the structural and viscoelastic evolution during aeration is also analyzed to maximize the contribution from structures. As a proof-of-concept, a type of "green" skinlike iontronics is prepared, which exhibits reliable strain sensing ability and is subsequently applied for intelligent information encryption and transmission based on a novel concept of sending Morse code. This work greatly extends the current material choice and is expected to shed light on the development of a sustainable future. 展开更多
关键词 green electronics skin-like iontronics sustainable viscoelastic transient electronics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部