期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Verifiable threshold signature schemes against conspiracy attack 被引量:21
1
作者 甘元驹 《Journal of Zhejiang University Science》 EI CSCD 2004年第1期50-54,共5页
In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by th... In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced. 展开更多
关键词 CRYPTOGRAPHY Threshold group signature conspiracy attack Forgery attack
下载PDF
A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack 被引量:13
2
作者 XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China 2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China 3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期107-110,共4页
A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the cons... A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys. 展开更多
关键词 CRYPTOGRAPHY threshold signature conspiracy attack identifier tracing
下载PDF
A New Watermarking Protocol against Conspiracy
3
作者 ZHANG Jun KOU Weidong FAN Kai CAO Xuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1671-1674,共4页
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP)... A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided. 展开更多
关键词 watermarking protocol electronic commerce security digital copyright protection conspiracy problem
下载PDF
Beware the Demon of Love Jihad! The Gendered and Sexual Abjectification of Muslim Masculinities by Hindu Nationalists on Twitter
4
作者 Zeinab Farokhi 《Sociology Study》 2024年第3期157-170,共14页
In this paper,I examine the Twitter accounts of right-wing extremist groups(RWEGs)in India,arguing that the abjectification of Muslim masculinities is central to the narratives of Hindu supremacist groups.The abjectif... In this paper,I examine the Twitter accounts of right-wing extremist groups(RWEGs)in India,arguing that the abjectification of Muslim masculinities is central to the narratives of Hindu supremacist groups.The abjectification process on Twitter serves as a rhetorical device to:a)criticize and problematize Muslim masculinities;b)idealize and glorify Hindu and white masculinities;c)promote Hindu and white masculine nationalist projects;and d)unify Hindu supremacists against Muslim others.By analyzing the gender ideologies expressed implicitly or explicitly on the Twitter accounts of RWEGs,and using the“Love Jihad”conspiracy case as a focal point,I demonstrate how the abjectification of Muslim masculinities is constructed in opposition to the idealized Hindu masculinities.This study highlights the intersection of gender and nationalism in the digital discourse of Hindu supremacist groups,offering insights into the mechanisms through which social media platforms are used to reinforce and propagate Islamophobic ideologies. 展开更多
关键词 Muslim masculinities Hindu supremacy conspiracy theory social media right-wing extremism
下载PDF
An Anonymous Authentication Scheme Withstanding the Conspiracy Attack
5
作者 YIN Fengmei PU Guangning 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第5期415-420,共6页
A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the thr... A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf(LRSW) and Diffie-Hellman(DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on. 展开更多
关键词 anonymous authentication anonymous tracking threshold conspiracy attack
原文传递
Exposure to conspiracy theories in the lab
6
作者 Loukas Balafoutas Alexander Libman +1 位作者 Vasileios Selamis Bjöorn Vollan 《Economic and Political Studies》 2021年第1期90-112,共23页
Conspiracy theories are widespread in the modern information era.Being exposed to conspiracy theories may affect behaviour,for example,by spreading mistrust among people and within organisations,even if it does not ne... Conspiracy theories are widespread in the modern information era.Being exposed to conspiracy theories may affect behaviour,for example,by spreading mistrust among people and within organisations,even if it does not necessarily generate widespread beliefs in the conspiracy narrative.Our paper investigates the effect of exposure to conspiracy theories on strategic sophistication.We present evidence from a laboratory experiment,in which we prime half of our participants with exposure to a conspiracy theory.We find that such exposure leads to increased strategic sophistication.Using a causal mediation analysis we confirm that the effect on sophistication arises independently of whether people believe in the content or not. 展开更多
关键词 conspiracy theory k-level reasoning TRUST PRIMING
原文传递
A SECURE THRESHOLD GROUP SIGNATURE SCHEME
7
作者 WangXiaoming FuFangwei 《Journal of Electronics(China)》 2003年第4期274-278,共5页
The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a sec... The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack. 展开更多
关键词 CRYPTOGRAPHY Digital signature Threshold signature conspiracy attack
下载PDF
Castro’s Assassination Plot a Fiasco: A Study With Special Reference to Don DeLillo’s Libra
8
作者 J. Kastrokumar V. Gnanaprakasam 《Sino-US English Teaching》 2019年第3期130-133,共4页
DeLillo's treatments of Lee Harvey Oswald in Libra take place this rhetoric of image, and the place of image within historical, imagistic, and textual context. DeLillo's fiction is very much concerned with the... DeLillo's treatments of Lee Harvey Oswald in Libra take place this rhetoric of image, and the place of image within historical, imagistic, and textual context. DeLillo's fiction is very much concerned with the ideological subtext of history that has exploited the resources of intertextuality. It has a long finding of meta-fiction to reveal there is no history without a full-blown meta-history to make plain Hayden White's contention. The general field of intertextuality was presented by Gerard Genette. Miami was a city of open wounds of explosive politics and feelings. Of all the cities, attempt made the conspiracy on the Cuban head. This city was very inflammable. Cuban heat and light were made him determined to keep the plan a secret from anti-Castro leaders. Four months earlier Kennedy had been accepted the brigade flag from survivors of the invasion, and many just have ransomed from Cuban prisons. 展开更多
关键词 INTERTEXTUALITY conspiracy Fidel Castro John F. KENNEDY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部