期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Improvement of publicly verifiable authenticated encryption scheme
1
作者 雷飞宇 陈雯 +1 位作者 马昌社 陈克非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第1期26-28,共3页
A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of tw... A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of two mechanisms including quadratic residue and composite discrete logarithm is proposed, which can defeat the forgery attacks in Ma and Chen scheme. The new scheme remains good confidentiality, public verifiability and efficiency. 展开更多
关键词 CRYPTOGRAPHY SIGNCRYPTION public verifiability
下载PDF
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
2
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
下载PDF
How to Play E-Lottery Games via Voting
3
作者 韩玮 张龙军 +1 位作者 郑东 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期248-252,258,共6页
E-lottery is a popular game for its convenience provided by the lnternet. An e-lottery scheme based on voting is proposed. The scheme is publicly verifiable and the fairness can be guaranteed. Lottery players not only... E-lottery is a popular game for its convenience provided by the lnternet. An e-lottery scheme based on voting is proposed. The scheme is publicly verifiable and the fairness can be guaranteed. Lottery players not only provide seed numbers to create the initial value of the lucky number, but also have an opportunity to change the intermediate value of the lucky number by means of voting. The new property of the scheme makes the lottery game more interactive and attractive to players. The anonymity of submitting the lottery ticket and casting the vote is achieved. Comparison with other existing elottery schemes is given. 展开更多
关键词 e-lottery homomorphic encryption threshold cryptosystem cryptographic counter
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部