期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
匿名技术的抗攻击性研究 被引量:5
1
作者 吴振强 《陕西师范大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第1期29-32,共4页
研究了匿名技术的抗攻击性问题,定义了基于重路由的匿名通信系统模型,对匿名技术可能受到的攻击进行了分类和定义,分为消息码攻击、消息长度攻击、重放攻击、合伙攻击、泛洪攻击、消息量攻击、时间攻击、侧面攻击等8种,并对现有的主要... 研究了匿名技术的抗攻击性问题,定义了基于重路由的匿名通信系统模型,对匿名技术可能受到的攻击进行了分类和定义,分为消息码攻击、消息长度攻击、重放攻击、合伙攻击、泛洪攻击、消息量攻击、时间攻击、侧面攻击等8种,并对现有的主要匿名技术在抵抗攻击性方面进行了研究,为匿名技术的研究和设计新的匿名系统提供了依据. 展开更多
关键词 抗攻击性 重路由 网络安全 匿名通信
下载PDF
TWO-OPERATION HOMOMORPHIC PERFECT SHARING SCHEMES OVER RINGS
2
作者 Ma Chuangui\ Liu Weijun 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 1999年第2期233-238,共6页
Two operation homomorphic sharing schemes were introduced by Frankel and Desmedt. They have proved that if the set of keys is a Boolean algebra or a finite field, then there does not exist a two operation homomorphic ... Two operation homomorphic sharing schemes were introduced by Frankel and Desmedt. They have proved that if the set of keys is a Boolean algebra or a finite field, then there does not exist a two operation homomorphic sharing scheme. In this paper it is proved that there do not exist perfect two operation homomorphic sharing schemes over finite rings with identities. A necessary condition for the existence of perfect two operation sharing schemes over finite rings without identities is given. 展开更多
关键词 1991 MR Subject Classification 94a60
下载PDF
A novel threshold changeable secret sharing scheme 被引量:1
3
作者 Lein HARN Chingfang HSU Zhe XIA 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第1期127-133,共7页
A(t,n)threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty computing.In conventional threshold secret sharing schemes,like Shamir’s scheme based o... A(t,n)threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty computing.In conventional threshold secret sharing schemes,like Shamir’s scheme based on a univariate polynomial,additional communication key share scheme is needed for shareholders to protect the secrecy of their shares if secret reconstruction is performed over a network.In the secret reconstruction,the threshold changeable secret sharing(TCSS)allows the threshold to be a dynamic value so that if some shares have been compromised in a given time,it needs more shares to reconstruct the secret.Recently,a new secret sharing scheme based on a bivariate polynomial is proposed in which shares generated initially by a dealer can be used not only to reconstruct the secret but also to protect the secrecy of shares when the secret reconstruction is performed over a network.In this paper,we further extend this scheme to enable it to be a TCSS without any modification.Our proposed TCSS is dealer-free and non-interactive.Shares generated by a dealer in our scheme can serve for three purposes,(a)to reconstruct a secret;(b)to protect the secrecy of shares if secret reconstruction is performed over a network;and(c)to enable the threshold changeable property. 展开更多
关键词 cryptography 94a60 authentication and secret sharing 94A62
原文传递
The analysis of the number of fixed points in the key extending algorithm of RC4
4
作者 XU KeJian HE Liang +1 位作者 DAI ZhaoPeng FAN XiuBin 《Science China Mathematics》 SCIE 2008年第3期407-415,共9页
The probabilities of the state transitions of the initial value S 0 in the S table of RC4 are described by a kind of bistochastic matrices, and then a computational formula for such bistochastic matrices is given, by ... The probabilities of the state transitions of the initial value S 0 in the S table of RC4 are described by a kind of bistochastic matrices, and then a computational formula for such bistochastic matrices is given, by which the mathematical expectation of the number of fixed points in the key extending algorithm of RC4 is obtained. As a result, a statistical weakness of the key extending algorithm of RC4 is presented. 展开更多
关键词 bistochastic matrix fixed point key extending algorithm RC4 state transition probability matrix 94a60 37C25 60J10 11A05
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部