期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
一种高效的基于令牌的密钥生成方案 被引量:1
1
作者 童立 甘嘉州 《计算机工程》 CAS CSCD 北大核心 2002年第9期111-112,共2页
提出了两个基于令牌的密钥生成和身份认证方案,两个协议的实施都只需两步,而现有的基于公钥的密码生成和身份认证方案至少需要步。同时还结合一些实现细节和因特网标准说明了方案的可行性。
关键词 令牌 密钥生成方案 双因素身份认证 网络安全 计算机网络
下载PDF
Secure Network Coding Against Intra/Inter-Generation Pollution Attacks 被引量:4
2
作者 刘光军 王斌 《China Communications》 SCIE CSCD 2013年第8期100-110,共11页
By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue eith... By allowing routers to combine the received packets before forwarding them,network coding-based applications are susceptible to possible malicious pollution attacks.Existing solutions for counteracting this issue either incur inter-generation pollution attacks(among multiple generations)or suffer high computation/bandwidth overhead.Using a dynamic public key technique,we propose a novel homomorphic signature scheme for network coding for each generation authentication without updating the initial secret key used.As per this idea,the secret key is scrambled for each generation by using the generation identifier,and each packet can be fast signed using the scrambled secret key for the generation to which the packet belongs.The scheme not only can resist intra-generation pollution attacks effectively but also can efficiently prevent inter-generation pollution attacks.Further,the communication overhead of the scheme is small and independent of the size of the transmitting files. 展开更多
关键词 network coding pollution attacks homomorphic signature authentication homomorphic cryptography
下载PDF
An Improved Ring Signature Scheme without Trusted Key Generation Center for Wireless Sensor Network 被引量:1
3
作者 肖俊芳 曾贵华 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第2期189-194,共6页
Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitab... Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitable way used in WSN. But key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest key generation center (KGC) can forge the signature of any node and on the other hand the node can deny the signature actually signed by him/herself. To solving this problem, we propose an ID-based ring signature scheme without trusted KGC. We also present the accurate secure proof to prove that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other ring signature schemes, we think proposed scheme is more efficient. 展开更多
关键词 wireless sensor network SIGNATURE bilinear pairings key escrow trusted key generation center (KGC)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部