期刊文献+
共找到104篇文章
< 1 2 6 >
每页显示 20 50 100
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
1
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
下载PDF
Sensitive Information Security Based on Elliptic Curves
2
作者 Nadine Nibigira Vincent Havyarimana Zhu Xiao 《World Journal of Engineering and Technology》 2024年第2期274-285,共12页
The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ... The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication. 展开更多
关键词 CRYPTOGRAPHY elliptic curves Digital Security Data Sensitive Data IMPLEMENTATION
下载PDF
Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field GF(2^(n))
3
作者 Mohammad Mazyad Hazzazi Hafeez Ur Rehman +1 位作者 Tariq Shah Hajra Younas 《Computers, Materials & Continua》 SCIE EI 2023年第8期2033-2060,共28页
Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem.In this paper,we introduce an asymmetric key algorithm for specifically processing images with larger bit valu... Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem.In this paper,we introduce an asymmetric key algorithm for specifically processing images with larger bit values.To overcome the separate flaws of elliptic curve cryptography(ECC)and the Hill cipher(HC),we present an approach to picture encryption by combining these two encryption approaches.In addition,to strengthen our scheme,the group laws are defined over the rational points of a given elliptic curve(EC)over a Galois field(GF).The exclusive-or(XOR)function is used instead of matrix multiplication to encrypt and decrypt the data which also refutes the need for the inverse of the key matrix.By integrating the inverse function on the pixels of the image,we have improved system security and have a wider key space.Furthermore,through comprehensive analysis of the proposed scheme with different available analyses and standard attacks,it is confirmed that our proposed scheme provides improved speed,security,and efficiency. 展开更多
关键词 elliptic curve Galois field group law hill cipher
下载PDF
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm
4
作者 Mouna Bedoui Belgacem Bouallegue +4 位作者 Abdelmoty M.Ahmed Belgacem Hamdi Mohsen Machhout Mahmoud M.Khattab 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2177-2193,共17页
Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validat... Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validated against these two types of attacks,taking into account a well-defined attacker model.This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm(ECDSA)algorithm.The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks.More precisely,we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key.ECDSA can be implemented in different ways,in software or via dedicated hardware or a mix of both.Many different architectures are therefore possible to implement an ECDSA-based system.For this reason,this work focuses mainly on the hardware implementation of the digital signature ECDSA.In addition,the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinxfield programmable gate arrays(FPGA)platform(Virtex-5).Our implementation results have been compared and discussed.Our area,frequency,area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA. 展开更多
关键词 elliptic curve cryptography(ECC) Montgomery ladder fault detection method fault injection attack digital signature ECDSA FPGA
下载PDF
A Low-Cost and High-Performance Cryptosystem Using Tripling-Oriented Elliptic Curve
5
作者 Mohammad Alkhatib Wafa S.Aldalbahy 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1807-1831,共25页
Developing a high-performance public key cryptosystem is crucial for numerous modern security applications.The Elliptic Curve Cryptosystem(ECC)has performance and resource-saving advantages compared to other types of ... Developing a high-performance public key cryptosystem is crucial for numerous modern security applications.The Elliptic Curve Cryptosystem(ECC)has performance and resource-saving advantages compared to other types of asymmetric ciphers.However,the sequential design implementation for ECC does not satisfy the current applications’performance requirements.Therefore,several factors should be considered to boost the cryptosystem performance,including the coordinate system,the scalar multiplication algo-rithm,and the elliptic curve form.The tripling-oriented(3DIK)form is imple-mented in this work due to its minimal computational complexity compared to other elliptic curves forms.This experimental study explores the factors playing an important role in ECC performance to determine the best combi-nation that leads to developing high-speed ECC.The proposed cryptosystem uses parallel software implementation to speed up ECC performance.To our knowledge,previous studies have no similar software implementation for 3DIK ECC.Supported by using parallel design,projective coordinates,and a fast scalar multiplication algorithm,the proposed 3DIK ECC improved the speed of the encryption process compared with other counterparts and the usual sequential implementation.The highest performance level for 3DIK ECC was achieved when it was implemented using the Non-Adjacent Form algorithm and homogenous projection.Compared to the costly hardware implementations,the proposed software implementation is cost effective and can be easily adapted to other environments.In addition,the power con-sumption of the proposed ECC is analyzed and compared with other known cryptosystems.thus,the current study presents a detailed overview of the design and implementation of 3DIK ECC. 展开更多
关键词 Security CRYPTOGRAPHY elliptic curves software implement greatation MULTITHREADING
下载PDF
Smart Grid Communication Under Elliptic Curve Cryptography
6
作者 B.Prabakaran T.R.Sumithira V.Nagaraj 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2333-2347,共15页
Smart Grids(SGs)are introduced as a solution for standard power dis-tribution.The significant capabilities of smart grids help to monitor consumer behaviors and power systems.However,the delay-sensitive network faces n... Smart Grids(SGs)are introduced as a solution for standard power dis-tribution.The significant capabilities of smart grids help to monitor consumer behaviors and power systems.However,the delay-sensitive network faces numer-ous challenges in which security and privacy gain more attention.Threats to trans-mitted messages,control over smart grid information and user privacy are the major concerns in smart grid security.Providing secure communication between the service provider and the user is the only possible solution for these security issues.So,this research work presents an efficient mutual authentication and key agreement protocol for smart grid communication using elliptic curve crypto-graphy which is robust against security threats.A trust authority module is intro-duced in the security model apart from the user and service provider for authentication.The proposed approach performance is verified based on different security features,communication costs,and computation costs.The comparative analysis of experimental results demonstrates that the proposed authentication model attains better performance than existing state of art of techniques. 展开更多
关键词 Smart grid elliptic curve cryptography key management mutual authentication
下载PDF
Verifiable (t, n) Threshold Signature Scheme Based on Elliptic Curve 被引量:1
7
作者 WANGHua-qun ZHAOJun-xi ZHANGLi-jun 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期165-168,共4页
Based on tht difficulty of solving the ECDLP (elliptic curve discretelogarithm problem) on the finite field, we present a (t, n) threshold signature scheme and averifiable key agreement scheme without trusted party. A... Based on tht difficulty of solving the ECDLP (elliptic curve discretelogarithm problem) on the finite field, we present a (t, n) threshold signature scheme and averifiable key agreement scheme without trusted party. Applying a modified elliptic curve signatureequation, we gel a more efficient signature scheme than the existing ECDSA (elliptic curve digitalsignature algorithm) from the computability and security view. Our scheme has a shorter key, fastercomputation, and better security. 展开更多
关键词 threshold signature secret sharing elliptic curve elliptic curve discretelogarithm
下载PDF
Binary Sequences from a Pair of Elliptic Curves
8
作者 CHEN Zhixiong ZHANG Ning XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1511-1515,共5页
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long... A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography. 展开更多
关键词 pseudo-random sequences elliptic curves stream ciphers elliptic curve cryptography
下载PDF
A New Digital Multilevel Proxy Signature Scheme Based on Elliptic Curve Cryptography
9
作者 QIN Yanlin WU Xiaoping 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1704-1706,共3页
Based on the analysis of elliptic curve digital signature algorithm(ECDSA),aiming at multilevel proxy signature in which the original signer delegates the digital signature authority to several proxies and its secur... Based on the analysis of elliptic curve digital signature algorithm(ECDSA),aiming at multilevel proxy signature in which the original signer delegates the digital signature authority to several proxies and its security demands, a new multilevel proxy signature scheme based on elliptic curve discrete logarithm problem (ECDLP) is presented and its security are proved. 展开更多
关键词 elliptic curve digital signature multilevel proxy signature elliptic curve discrete logarithm
下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
10
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
下载PDF
Addition Sequence Method of Scalar Multiplication of Elliptic Curve over OEF 被引量:2
11
作者 LIUDuo DAIYi-qi 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期174-178,共5页
A new elliptic curve scalar multiplication algorithm is proposed. Thealgorithm uses the Frobenius map on optimal extension field (OEF) and addition sequence We introducea new algorithm on generating addition sequence ... A new elliptic curve scalar multiplication algorithm is proposed. Thealgorithm uses the Frobenius map on optimal extension field (OEF) and addition sequence We introducea new algorithm on generating addition sequence efficiently and also give some analysis about it.Based on this algorithm, a new method of computing scalar multiplication of elliptic curve over anOEF is presented. The new method is more efficient than the traditional scalar multiplicationalgorithms of elliptic curve over OEF. Thecomparisons of traditional method and the new method arealso given. 展开更多
关键词 CRYPTOLOGY elliptic curve optimal extension field FROBENIUS additionsequence
下载PDF
Integral Points on a Class of Elliptic Curve 被引量:2
12
作者 ZHU Huilin CHEN Jianhua 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第3期477-480,共4页
We prove all integral points of the elliptic curve y^2=x^2-30x+133 are (x,y) = (-7,0),(-3,±14),(2, ±9),(6,±13), (5143326,±11664498677), by using the method of algebraic number theory a... We prove all integral points of the elliptic curve y^2=x^2-30x+133 are (x,y) = (-7,0),(-3,±14),(2, ±9),(6,±13), (5143326,±11664498677), by using the method of algebraic number theory and p-adic analysis. Furthermore, we develop a computation method to find all integral points on a class of elliptic curve y^2= (x+α)(x^2-α)(x^2-αx+b) ,α ,b∈Z,α^2〈4b and find all integer solutions of hyperelliptic Diophantine equation Dy^2=Ax^4 + Bx^2 +C,B^2〈4AC. 展开更多
关键词 Diophantine equation elliptic curve fundamental unit algebraic number factorization p-adic analysis method
下载PDF
RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography 被引量:1
13
作者 K.Shankar P.Eswaran 《China Communications》 SCIE CSCD 2017年第2期118-130,共13页
In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual ... In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual secret sharing scheme is to encrypt a secret image into n illogical share images. It is unable to reveal any data on the original image if at least one of the shares is not achieved. The original image, in fact, is realized by overlapping the entire shares directly, in order that the human visual system is competent to identify the collective secret image without employing any complicated computational tools. Therefore, they are communicated steadily as number of shares. The elliptic curve cryptography approach, in turn, is employed to augment the privacy and safety of the image. The new.fangled technique is utilized to generate the multiple shares which are subjected to encryption and decryption by means of the elliptic curve cryptography technique. The test outcomes have revealed the fact that the peak signal to noise ratio is 58.0025, Mean square error value is 0.1164 and the correlation coefficient is 1 for the decrypted image without any sort of distortion of the original image. 展开更多
关键词 visual cryptography PIXEL SHARES elliptic curve cryptography ENCRYPTION PSNR mean square error
下载PDF
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
14
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
下载PDF
Elliptic Curve Point Multiplication by Generalized Mersenne Numbers 被引量:2
15
作者 Tao Wu Li-Tian Liu 《Journal of Electronic Science and Technology》 CAS 2012年第3期199-208,共10页
Montgomery modular multiplication in the residue number system (RNS) can be applied for elliptic curve cryptography. In this work, unified modular multipliers over generalized Mersenne numbers are proposed for RNS M... Montgomery modular multiplication in the residue number system (RNS) can be applied for elliptic curve cryptography. In this work, unified modular multipliers over generalized Mersenne numbers are proposed for RNS Montgomery modular multiplication, which enables efficient elliptic curve point multiplication (ECPM). Meanwhile, the elliptic curve arithmetic with ECPM is performed by mixed coordinates and adjusted for hardware implementation. In addition, the conversion between RNS and the binary number system is also discussed. Compared with the results in the literature, our hardware architecture for ECPM demonstrates high performance. A 256-bit ECPM in Xilinx XC2VP100 field programmable gate array device (FPGA) can be performed in 1.44 ms, costing 22147 slices, 45 dedicated multipliers, and 8.25K bits of random access memories (RAMs). 展开更多
关键词 elliptic curve cryptography generalized Mersenne numbers modular multiplier residue number system.
下载PDF
Elliptic Curve Scalar Multiplication with x-Coordinate 被引量:1
16
作者 ZHANG Ning PEI Qingqi XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期163-166,共4页
This paper gives a comprehensive method to do Elliptic Curve Scalar Multiplication with only x-coordinate. Explicit point operation formulae for all types of defining equations of the curves are derived. For each type... This paper gives a comprehensive method to do Elliptic Curve Scalar Multiplication with only x-coordinate. Explicit point operation formulae for all types of defining equations of the curves are derived. For each type of curve, the performance is analyzed. The formulae are applied in Montgomery Ladder to get scalar multiplication algorithm operated with only x-coordinate. The new scalar multiplication has the same security level and computation amount with protected binary scalar multiplication (PBSM) against side channel attack, and has the advantages of higher security and little memory needed. 展开更多
关键词 elliptic curve scalar multiplication Montgomery ladder x-coordinate
下载PDF
An FPGA Implementation of GF(p) Elliptic Curve Cryptographic Coprocessor 被引量:1
17
作者 LIUYu-zhen QINZhong-ping ZHANGHuan-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期31-34,共4页
A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multipli... A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multiplications. The technique of coordinates conversion and fast multiplication algorithm of two large integers are utilized to avoid frequent inversions and to accelerate the field multiplications used in point multiplications. The characteristic of hardware parallelism is considered in the implementation of point multiplications. The coprocessor implemented on XILINX XC2V3000 computes a point multiplication for an arbitrary point on a curve defined over GF(2192?264?1) with the frequency of 10 MHz in 4.40 ms in the average case and 5.74 ms in the worst case. At the same circumstance, the coprocessor implemented on XILINX XC2V4000 takes 2.2 ms in the average case and 2.88 ms in the worst case. 展开更多
关键词 elliptic curve cryptosystems cryptographic coprocessor CRYPTOGRAPHY information security
下载PDF
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem 被引量:1
18
作者 刘泽宇 夏铁成 王金波 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期161-176,共16页
We propose a new fractional two-dimensional triangle function combination discrete chaotic map (2D-TFCDM) with the discrete fractional difference. Moreover, the chaos behaviors of the proposed map are observed and t... We propose a new fractional two-dimensional triangle function combination discrete chaotic map (2D-TFCDM) with the discrete fractional difference. Moreover, the chaos behaviors of the proposed map are observed and the bifurcation diagrams, the largest Lyapunov exponent plot, and the phase portraits are derived, respectively. Finally, with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem, we apply the discrete fractional map into color image encryption. After that, the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. 展开更多
关键词 CHAOS fractional two-dimensional triangle function combination discrete chaotic map image en- cryption Menezes-Vanstone elliptic curve cryptosystem
下载PDF
Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography 被引量:1
19
作者 N.Niyaz Ahamed N.Duraipandian 《Computer Systems Science & Engineering》 SCIE EI 2022年第4期83-94,共12页
The tremendous development of cloud computing with related technol-ogies is an unexpected one.However,centralized cloud storage faces few chal-lenges such as latency,storage,and packet drop in the network.Cloud storag... The tremendous development of cloud computing with related technol-ogies is an unexpected one.However,centralized cloud storage faces few chal-lenges such as latency,storage,and packet drop in the network.Cloud storage gets more attention due to its huge data storage and ensures the security of secret information.Most of the developments in cloud storage have been positive except better cost model and effectiveness,but still data leakage in security are billion-dollar questions to consumers.Traditional data security techniques are usually based on cryptographic methods,but these approaches may not be able to with-stand an attack from the cloud server's interior.So,we suggest a model called multi-layer storage(MLS)based on security using elliptical curve cryptography(ECC).The suggested model focuses on the significance of cloud storage along with data protection and removing duplicates at the initial level.Based on divide and combine methodologies,the data are divided into three parts.Here,thefirst two portions of data are stored in the local system and fog nodes to secure the data using the encoding and decoding technique.The other part of the encrypted data is saved in the cloud.The viability of our model has been tested by research in terms of safety measures and test evaluation,and it is truly a powerful comple-ment to existing methods in cloud storage. 展开更多
关键词 Cloud storage DEDUPLICATION fog computing and elliptic curve cryptography
下载PDF
New Collective Signatures Based on the Elliptic Curve Discrete Logarithm Problem
20
作者 Tuan Nguyen Kim Duy Ho Ngoc Nikolay A.Moldovyan 《Computers, Materials & Continua》 SCIE EI 2022年第10期595-610,共16页
There have been many digital signature schemes were developed based on the discrete logarithm problem on a finite field.In this study,we use the elliptic curve discrete logarithm problem to build new collective signat... There have been many digital signature schemes were developed based on the discrete logarithm problem on a finite field.In this study,we use the elliptic curve discrete logarithm problem to build new collective signature schemes.The cryptosystem on elliptic curve allows to generate digital signatures with the same level of security as other cryptosystems but with smaller keys.To extend practical applicability and enhance the security level of the group signature protocols,we propose two new types of collective digital signature schemes based on the discrete logarithm problem on the elliptic curve:i)the collective digital signature scheme shared by several signing groups and ii)the collective digital signature scheme shared by several signing groups and several individual signers.These two new types of collective signatures have combined the advantages of group digital signatures and collective digital signatures.These signatures have a fixed size and do not depend on the number of members participating in the creation of the final collective signature.One of the advantages of the proposed collective signature protocols is that they can be deployed on top of the available public key infrastructures. 展开更多
关键词 elliptic curve signing group individual signer collective signature group signature
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部