期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
一类新型 (t_j,t,n)门限群签名方案的设计与分析(英文) 被引量:3
1
作者 石怡 《中国科学院研究生院学报》 CAS CSCD 2001年第2期110-113,共4页
基于离散对数问题给出了一类新型 (tj,t ,n)门限群签名方案 ,该类群签名方案与一般的群签名方案相比具有如下特点 :(1 )各签名者可具有不同的权力 ;(2 )可通过灵活设置参数得到满足不同应用需求的解决方案 .
关键词 数字签名 (tj t n)门限群签名 预签名 个人签名 离散对数 安全论证 密码学
下载PDF
OCSP协议的改进和实现 被引量:4
2
作者 张茜 朱艳琴 罗喜召 《计算机工程》 CAS CSCD 北大核心 2008年第23期167-169,共3页
对标准在线证书状态协议(OCSP)进行分析,发现该标准协议存在一定的局限性。在此基础上对其进行改进,改进型OCSP响应包括基本类型OCSP回复和A类型OCSP回复。改进型OCSP响应器采用预签名技术,能提高性能且有效抵御重传攻击。对该响应器进... 对标准在线证书状态协议(OCSP)进行分析,发现该标准协议存在一定的局限性。在此基础上对其进行改进,改进型OCSP响应包括基本类型OCSP回复和A类型OCSP回复。改进型OCSP响应器采用预签名技术,能提高性能且有效抵御重传攻击。对该响应器进行效率和安全性分析。实验结果表明,改进后的响应器的平均响应时间减少27%,提高了响应器的响应速度。 展开更多
关键词 公钥基础设施 在线证书状态协议 证书状态 预签名
下载PDF
高性能OCSP系统的设计与实现
3
作者 张茜 朱艳琴 罗喜召 《计算机工程与设计》 CSCD 北大核心 2009年第4期873-875,879,共4页
在对在线证书状态协议(OCSP)深入分析的基础上,针对目前OCSP协议并没有规定响应器用来检索证书状态的信息源以及大量请求到达OCSP响应器易造成其崩溃等问题,利用CA证书库作为OCSP响应器的信息源并采用Hash表缓存机制、预签名技术和多线... 在对在线证书状态协议(OCSP)深入分析的基础上,针对目前OCSP协议并没有规定响应器用来检索证书状态的信息源以及大量请求到达OCSP响应器易造成其崩溃等问题,利用CA证书库作为OCSP响应器的信息源并采用Hash表缓存机制、预签名技术和多线程机制,提出了一种高性能OCSP系统的实现方案。该方案极大提高了OCSP响应的正确性和及时性。 展开更多
关键词 公钥基础设施(PKI) 在线证书状态协议(OCSP) 证书状态 预签名 多线程
下载PDF
Identity-Based Proxy Verifiably Encrypted Signature Scheme 被引量:2
4
作者 Liu Jianhua Liu Jianwei Qiu Xiufeng 《China Communications》 SCIE CSCD 2012年第11期137-149,共13页
A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages o... A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages of a proxy signature and a VES in order to delegate the signing capability of the VES of an entity called the original signer to another entity, called the proxy signer. In this IPVES scheme, the original signer delegates his/her signing capability to the proxy signer. The proxy signer issues a signature by using a proxy signing key, encrypts the signature under a designated public key, and subsequently convinces a verifier that the resulting ciphertext contains such a signature. We prove that the proposed IPVES scheme is secure in a random oracle model under the computational Diffie-Hellman assumption. 展开更多
关键词 digital signature proxy signature random oracle model information security
下载PDF
Identity-based ring signature scheme based on quadratic residues 被引量:3
5
作者 熊虎 《High Technology Letters》 EI CAS 2009年第1期94-100,共7页
Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are const... Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are constructed from bilinear pairings, a powerful but computationally expensive primitive. Hence, ID-based ring signature without pairing is of great interest in the field of cryptography. In this paper, the authors firstly propose an ID-based ring signature scheme based on quadratic residues. The proposed scheme is proved to be existentially unforgeable against adaptive chosen message-and-identity attack under the random oracle model, assuming the hardness of factoring. The proposed scheme is more efficient than those which are constructed from bilinear pairings. 展开更多
关键词 identity-based signature ring signature quadratic residue random oracle provable security
下载PDF
Significance of stromal-1 and stromal-2 signatures and biologic prognostic model in diffuse large B-cell lymphoma
6
作者 Asmaa Gaber Abdou Nancy Asaad +2 位作者 Mona Kandil Mohammed Shabaan Asmaa Shams 《Cancer Biology & Medicine》 SCIE CAS CSCD 2017年第2期151-161,共11页
Objective:Diffuse Large B Cell Lymphoma(DLBCL)is a heterogeneous group of tumors with different biological and clinical characteristics that have diverse clinical outcomes and response to therapy.Stromal-1 signature o... Objective:Diffuse Large B Cell Lymphoma(DLBCL)is a heterogeneous group of tumors with different biological and clinical characteristics that have diverse clinical outcomes and response to therapy.Stromal-1 signature of tumor microenvironment of DLBCL represents extracellular matrix deposition and histiocytic infiltrate,whereas stromal-2 represents angiogenesis that could affect tumor progression.Methods:The aim of the present study is to assess the significance of stromal-1 signature using SPARC-1 and stromal-2 signature using CD31 expression and then finally to construct biologic prognostic model(BPM)in 60 cases of DLBCL via immunohistochemistry.Results:Microvessel density(P<0.05)and SPARC percentage of expression(P<0.001)were higher in DLBCL,including germinal and nongerminal cases,compared with reactive follicular hyperplasia.High microvessel density was significantly associated with splenic involvement(P=0.008),high mitotic count(P=0.045),and presence of capsular invasion(P=0.035).Percentage of SPARC expression was significantly associated with splenic involvement(P=0.03).Constructing BPM showed that 42 cases(70%)were of low biologic score(0–1)and 18 cases(30%)were of high biologic score(2–3).Low BPM cases showed less probability for splenic involvement(P=0.04)and a higher rate of complete response to therapy compared with high score cases(P=0.08).Conclusions:The DLBCL microenvironment could modulate tumor progression behavior since angiogenesis and SPARC positive stromal cells promote dissemination by association with spleen involvement and capsular invasion.Biologic prognostic models,including modified BPM,which considered cell origin of DLBCL and stromal signature pathways,could determine DLBCL progression and response to therapy. 展开更多
关键词 DLBCL stromal-1 stromal-2 SPARC ANGIOGENESIS BPM
下载PDF
Identity-based threshold key-insulated signature 被引量:3
7
作者 Chen Jianhong Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2012年第3期275-280,共6页
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ... Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now. 展开更多
关键词 threshold key-insulated SIGNATURE random oracle model
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部