期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Hash-based signature revisited 被引量:1
1
作者 Lingyun Li Xianhui Lu Kunpeng Wang 《Cybersecurity》 EI CSCD 2022年第4期71-96,共26页
The current development toward quantum attack has shocked our confidence on classical digital signature schemes.As one of the mainstreams of post quantum cryptography primitives,hash-based signature has attracted more... The current development toward quantum attack has shocked our confidence on classical digital signature schemes.As one of the mainstreams of post quantum cryptography primitives,hash-based signature has attracted more and more concern in both cryptographic research and application in recent years.The goal of this paper is to present,classify and discuss different solutions for hash-based signature.Firstly,this paper discusses the research progress in the component of hash-based signature,i.e.,one-time signature and few-time signature;then classifies the tree-based public key authentication schemes of hash-based signature into limited number and stateful schemes,unlimited number and stateful schemes and unlimited number and stateless schemes.The above discussion aims to analyze the overall design idea of different categories of hash-based signatures,as well as the construction,security reduction and performance efficiency of specific schemes.Finally,the perspectives and possible development directions of hash-based signature are briefly discussed. 展开更多
关键词 hash-based signature One-time signature Few-time signature Hash tree
原文传递
Hash-Based Signature for Flexibility Authentication of IoT Devices
2
作者 HAN Songshen XU Kaiyong +3 位作者 ZHU Zhiqiang GUO Songhui LIU Haidong LI Zuohui 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2022年第1期1-10,共10页
5G provides a unified authentication architecture and access management for IoT(Internet of Things)devices.But existing authentication services cannot cover massive IoT devices with various computing capabilities.In a... 5G provides a unified authentication architecture and access management for IoT(Internet of Things)devices.But existing authentication services cannot cover massive IoT devices with various computing capabilities.In addition,with the development of quantum computing,authentication schemes based on traditional digital signature technology may not be as secure as we expected.This paper studies the authentication mechanism from the user equipment to the external data network in 5G and proposed an authentication protocol prototype that conforms to the Third Generation Partnership Program(3GPP)standard.This prototype can accommodate various Hash-based signature technologies,applying their advantages in resource consumption to meet the authentication requirements of multiple types of IoT devices.The operation of the proposed authentication scheme is mainly based on the Hash function,which is more efficient than the traditional authentication scheme.It provides flexible and high-quality authentication services for IoT devices cluster in the 5G environment combining the advantages of Hash-based signature technology and 5G architecture. 展开更多
关键词 hash-based signature secondary authentication IoT device cluster 5G
原文传递
CRYPTANALYSIS OF AN EXTENDED MQ SIGNATURE SYSTEM HTTM
3
作者 Jing Zhengjun Yu Zhimin +2 位作者 Gu Chunsheng Wu Fangsheng Zhao Xiaorong 《Journal of Electronics(China)》 2013年第5期491-499,共9页
Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.pro... Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.proposed a novel multivariate signature scheme with Hash-based Tame Transformation and Minus(HTTM)in 2011.For this extended MQ-based signature,we can transform it into an SFLASH variant by splitting and merging HT transformation,and solve an equivalent private key corresponding to the public key of HTTM.Thus,the adversary can forge legitimate signature for any message by using this equivalent private key. 展开更多
关键词 Multivariate Quadratic(MQ) problem CRYPTANALYSIS Equivalent private key Forging signature hash-based Tame Transformation and Minus(HTTM
下载PDF
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage 被引量:1
4
作者 Qingqing GAN Joseph K.LIU +5 位作者 Xiaoming WANG Xingliang YUAN Shi-Feng SUN Daxin HUANG Cong ZUO Jianfeng WANG 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第6期103-121,共19页
Searchable symmetric encryption(SSE)has been introduced for secure outsourcing the encrypted database to cloud storage,while maintaining searchable features.Of various SSE schemes,most of them assume the server is hon... Searchable symmetric encryption(SSE)has been introduced for secure outsourcing the encrypted database to cloud storage,while maintaining searchable features.Of various SSE schemes,most of them assume the server is honest but curious,while the server may be trustless in the real world.Considering a malicious server not honestly performing the queries,verifiable SSE(VSSE)schemes are constructed to ensure the verifiability of the search results.However,existing VSSE constructions only focus on single-keyword search or incur heavy computational cost during verification.To address this challenge,we present an efficient VSSE scheme,built on OXT protocol(Cash et al.,CRYPTO 2013),for conjunctive keyword queries with sublinear search overhead.The proposed VSSE scheme is based on a privacy-preserving hash-based accumulator,by leveraging a well-established cryptographic primitive,Symmetric Hidden Vector Encryption(SHVE).Our VSSE scheme enables both correctness and completeness verifiability for the result without pairing operations,thus greatly reducing the computational cost in the verification process.Besides,the proposed VSSE scheme can still provide a proof when the search result is empty.Finally,the security analysis and experimental evaluation are given to demonstrate the security and practicality of the proposed scheme. 展开更多
关键词 searchable symmetric encryption verifiability conjunctive keyword queries hash-based accumulator cloud storage
原文传递
Dynamic load balancing algorithm for distributed system
5
作者 Cui Yansong Bai Chunyu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第5期91-101,共11页
In distributed systems, it is important to adjust load distribution dynamically based on server performance and load information. Meanwhile, gray release and rapid expansion are the basic requirements to ensure reliab... In distributed systems, it is important to adjust load distribution dynamically based on server performance and load information. Meanwhile, gray release and rapid expansion are the basic requirements to ensure reliability and stability for systems with short version iteration cycles. The traditional Hash algorithm performs poorly in gray release, rapid expansion, and load distribution. To solve these problems, a novel Hash-based dynamic mapping(HDM) load balancing algorithm was proposed. On the one hand, this algorithm can adjust the load distribution dynamically based on server performance and load information. On the other hand, it implements gray release by controlling the ratio of requests assigned to the changed nodes. Additionally, HDM has a higher expansion efficiency. Experiments show that the HDM distributes the load more reasonably, provides a more stable gray release ratio, and has a higher expansion efficiency. 展开更多
关键词 load balancing gray release rapid expansion dynamic mapping hash-based dynamic mapping(HDM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部