期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Leakage-Resilient Signature Scheme Based on BLS Signature
1
作者 王志伟 《China Communications》 SCIE CSCD 2011年第3期212-215,共4页
Digital signature,one of the most important cryptographic primitives,has been commonly used in information systems,and thus enhancing the security of a signature scheme can benefit such an application.Currently,leakag... Digital signature,one of the most important cryptographic primitives,has been commonly used in information systems,and thus enhancing the security of a signature scheme can benefit such an application.Currently,leakage-resilient cryptography is a very hot topic in cryptographic research.A leakage-resilient cryptographic primitive is said to be secure if arbitrary but bounded information about the signer's secret key(involving other states) is leaked to an adversary.Obviously,the leakage-resilient signature is more secure than the common signature.We construct an efficient leakage-resilient signature scheme based on BLS signature in the bounded retrieval model.We also prove that our scheme is provably secure under BLS signature. 展开更多
关键词 leakage-resilient signature bounded retrieval model BLS signature system key leakage attacks information systems
下载PDF
Position based key exchange:definitions and implementations
2
作者 ZHANG Junwei DU Fangqiong +1 位作者 MA Jianfeng YANG Chao 《Journal of Communications and Information Networks》 2016年第4期33-43,共11页
Chandran,et al.introduce the direction of position based cryptography at CRYPTO 2009.In position based cryptography,the position of a party is used to be its unique“credential”in order to realize the cryptographic t... Chandran,et al.introduce the direction of position based cryptography at CRYPTO 2009.In position based cryptography,the position of a party is used to be its unique“credential”in order to realize the cryptographic tasks,such as position based encryption,position based signature,position based key exchange and so on.Position based key exchange,as a basic primitive in position based cryptography,can be used to establish a shared key based on the position of the participant.To begin with,this paper presents the notions of the prover-to-verifier mode and the prover-to-prover mode for position based key exchange.In the prover-to-verifier mode,a secret key can be shared between a prover and the verifiers according to the position of the prover.While in the prover-to-prover mode,two provers located at the valid positions can negotiate a shared key with the help of the verifiers and any other party whose position is illegal cannot obtain the shared key.At the same time,this paper formalizes two security definitions against colluding adversaries:position based prover-to-verifier key exchange and position based prover-to-prover key exchange.Then,this paper introduces the bounded retrieval model and the implementations of position based key exchange in two modes based on the bounded retrieval model.Finally,this paper discusses the position based key exchange protocols in two modes from both security and performance perspectives. 展开更多
关键词 position based key exchange position based cryptography prover-to-verifier prover-to-prover bounded retrieval model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部