期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Security of Application System 被引量:1
1
作者 李小平 钟宏 +5 位作者 丁俨 向智 胡海生 吴学林 张琦 朱建学 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期198-202,共5页
A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has be... A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method. 展开更多
关键词 INTERNET/INTRANET identity recognition data encryption digital signature security mechanism
下载PDF
新加坡的电子公众服务
2
作者 王炽 《信息化建设》 2003年第3期48-49,共2页
新加坡政府的电子化有其坚实的基础.与其他亚洲国家相比,新加坡有自已独特的因特网发展模式,新加坡政府一直努力扩充带宽,"新加坡一号"工程,重点放在建立贯穿新加坡电话和有限电视网络的高频光纤线路上.它设有及时视频服务、... 新加坡政府的电子化有其坚实的基础.与其他亚洲国家相比,新加坡有自已独特的因特网发展模式,新加坡政府一直努力扩充带宽,"新加坡一号"工程,重点放在建立贯穿新加坡电话和有限电视网络的高频光纤线路上.它设有及时视频服务、有线新闻、远程学习、网上购物、网上银行等,新加坡90%的家庭每月支付大约21美元,就可以使用这条线路.尤其需要指出的是,新加坡的因特网接入服务,是由政府控制的三个ISP运作的,它们负责收费和维护网络动作效率,政府设置的服务器,同时封锁了所有色情和政治敏感网址.这种动作方式,使新加坡成为亚洲因特网用户比例最高的国家,有三分之一的成年人使用过因特网,13%的因特网用户曾利用因特网处理电子商务. 展开更多
关键词 新加坡 电子公众服务 电子政务 工作效率 数码签名 信息技术
下载PDF
CERTIFICATELESS SIGNATURE AND BLIND SIGNATURE 被引量:13
3
作者 Zhang Lei Zhang Futai 《Journal of Electronics(China)》 2008年第5期629-635,共7页
Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-... Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem. 展开更多
关键词 Certificateless cryptography Digital signature Blind signature Certificateless blind signature Computational Diffie-Hellman (CDH) problem
下载PDF
Cryptanalysis and Improvement of Signcryption Schemes on Elliptic Curves 被引量:2
4
作者 LIXiang-xue CHENKe-fei LIShi-qun 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期231-234,共4页
In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose... In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose confidentiality to gain non-repudiation. We also propose two improvement versions that not only overcome the security leak inherent in the schemes but also provide public verifiability or forward security. Our improvement versions require smaller computing cost than that required by signature-then-encryption methods. 展开更多
关键词 SIGNCRYPTION elliptic curve CRYPTANALYSIS
下载PDF
A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce 被引量:1
5
作者 XIN Xiang-jun WANG Mei-zhi XIAO Guo-zhen 《Journal of China University of Mining and Technology》 EI 2006年第4期470-474,共5页
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ... By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack. 展开更多
关键词 digital signature nominative signature proxy signature
下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
6
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
下载PDF
A kind of signature scheme based on class groups of quadratic fields 被引量:1
7
作者 董晓蕾 曹珍富 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第6期583-587,共5页
Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic ... Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds. 展开更多
关键词 quadratic-field cryptosystem digital signature ideal class groups discrete logarithm problem
下载PDF
A SECURE THRESHOLD GROUP SIGNATURE SCHEME
8
作者 WangXiaoming FuFangwei 《Journal of Electronics(China)》 2003年第4期274-278,共5页
The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a sec... The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack. 展开更多
关键词 CRYPTOGRAPHY Digital signature Threshold signature Conspiracy attack
下载PDF
“智能身份证内置的电子证书”
9
《中国科技画报》 2003年第4期60-60,共1页
关键词 智能身份证 电子证书 数码签名 网上交易
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部