期刊文献+
共找到956篇文章
< 1 2 48 >
每页显示 20 50 100
Atomic Electronic Contract ProtocolBased on Convertible Signature
1
作者 LIUYi-chun WANGLi-na ZHANGHuan-guo 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期227-230,共4页
A new class of atomicity, namely contract atomicity is presented. A newtechnical strategy based on convertible signature and two-phase commitment is proposed forimplementing atomicity of electronic contract protocol. ... A new class of atomicity, namely contract atomicity is presented. A newtechnical strategy based on convertible signature and two-phase commitment is proposed forimplementing atomicity of electronic contract protocol. A new atomic contract signing protocol isgiven out by using ElGam-al-like convertible undeniable signature and commitment of conversion key,and another new atomic contract signing protocol is brought forward by using RSA-based convertibleundeniable signature scheme and commitment ofconversion key. These two new protocols are proved tobe of atomicity, fairness, prnacy- non-repudiation. 展开更多
关键词 electronic contract ATOMICITY convertible signature
下载PDF
A Protocol for Fair Electronic Purchase Based on Concurrent Signatures
2
作者 LI Xiangdong WANG Qingxian CHEN Li 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期609-614,共6页
E-commerce protocols for the electronic purchase of goods are difficult to design and implement due to their complexity and high security demands. Fairness of such protocols in literature highly depends on an addition... E-commerce protocols for the electronic purchase of goods are difficult to design and implement due to their complexity and high security demands. Fairness of such protocols in literature highly depends on an additional TTP(trusted third party). However, it is difficult to find such a TTP in some situations. In addition, fairness for customers has been neither fully considered nor well satisfied in existing electronic purchasing protocols. In this paper, a new protocol FEP (fair electronic purchase) without a special TTP but an online bank is presented based on a concurrent digital signature scheme. The FEP protocol guarantees fair electronic purchase of goods via electronic payment between consumers, merchants and their online banks. The protocol is practical and the analysis based on the game logics shows that it achieves the properties of viability, fairness, and timeliness. 展开更多
关键词 electronic purchasing protocol fair exchange concurrent signature game logic
下载PDF
An Efficient Restrictive Blind Signature Scheme with Applications to Electronic Cash
3
作者 谭运猛 Yang Zongkai Wu Shizhong 《High Technology Letters》 EI CAS 2002年第4期60-63,共4页
In this paper, a new restrictive blind signature scheme is proposed. Compared with Brands restrictive blind signature scheme, our scheme is even more restrictive and efficient. And our scheme is proved secure, too. ... In this paper, a new restrictive blind signature scheme is proposed. Compared with Brands restrictive blind signature scheme, our scheme is even more restrictive and efficient. And our scheme is proved secure, too. A new withdrawal protocol of electronic cash system is designed by using our restrictive blind signature scheme, which is more efficient than the withdrawal protocol and is more appropriate for adopting pre processing and post processing. 展开更多
关键词 RESTRICTIVE BLIND signature scheme applications to electronic
下载PDF
A Fair Electronic Cash System with Identity-Based Group Signature Scheme
4
作者 Khalid. O. Elaalim Shoubao Yang 《Journal of Information Security》 2012年第2期177-183,共7页
A fair electronic cash system is a system that allows customers to make payments anonymously. Furthermore the trusted third party can revoke the anonymity when the customers did illegal transactions. In this paper, a ... A fair electronic cash system is a system that allows customers to make payments anonymously. Furthermore the trusted third party can revoke the anonymity when the customers did illegal transactions. In this paper, a new fair electronic cash system based on group signature scheme by using elliptic curve cryptography is proposed, which satisfies properties of secure group signature scheme (correctness, unforgeability, etc). Moreover, our electronic cash contains group members (users, merchants and banks) and trusted third party which is acted by central bank as group manager. 展开更多
关键词 ELLIPTIC Curve BILINEAR PAIRINGS Group signature electronic CASH TRUSTED Third Party Tracing Protocol
下载PDF
Research of Data Encryption and Digital Signature on Electronic Paymetnt
5
作者 Xiaojun Tong Zhu Wang 《通讯和计算机(中英文版)》 2005年第9期58-61,共4页
下载PDF
Anonymous TollPass: A Blockchain-Based Privacy-Preserving Electronic Toll Payment Model
6
作者 Jane Kim Soojin Lee +1 位作者 Chan Yeob Yeun Seung-Hyun Seo 《Computers, Materials & Continua》 SCIE EI 2024年第6期3495-3518,共24页
As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation systems.Electronic T... As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation systems.Electronic Toll Collection(ETC),which is one of the services included in ITS systems,is an automated system that allows vehicles to pass through toll plazas without stopping for manual payment.The ETC system is widely deployed on highways due to its contribution to stabilizing the overall traffic system flow.To ensure secure and efficient toll payments,designing a distributed model for sharing toll payment information among untrusted toll service providers is necessary.However,the current ETC system operates under a centralized model.Additionally,both toll service providers and toll plazas know the toll usage history of vehicles.It raises concerns about revealing the entire driving routes and patterns of vehicles.To address these issues,blockchain technology,suitable for secure data management and data sharing in distributed systems,is being applied to the ETC system.Blockchain enables efficient and transparent management of ETC information.Nevertheless,the public nature of blockchain poses a challenge where users’usage records are exposed to all participants.To tackle this,we propose a blockchain-based toll ticket model named AnonymousTollPass that considers the privacy of vehicles.The proposed model utilizes traceable ring signatures to provide unlinkability between tickets used by a vehicle and prevent the identity of the vehicle using the ticket from being identified among the ring members for the ticket.Furthermore,malicious vehicles’identities can be traced when they attempt to reuse tickets.By conducting simulations,we show the effectiveness of the proposed model and demonstrate that gas fees required for executing the proposed smart contracts are only 10%(when the ring size is 50)of the fees required in previous studies. 展开更多
关键词 Blockchain electronic toll collection smart contract traceable ring signature
下载PDF
XML Signature技术的数据安全性研究与分析 被引量:1
7
作者 李秀娟 《网络与信息》 2008年第7期19-20,共2页
XML由于良好的扩展性、自描述性,在互联网上和电子商务中被广泛应用。文章着重探讨XML Signature数字签名技术,XML Signature提供完整性、签名确认和抗否认性。并给出在电子商务中用XML Signature技术对客户订单签名的具体实例。
关键词 XML signature 数据安全 XML 电子商务
下载PDF
A Proxy Blind Signature Scheme Based on DLP 被引量:2
8
作者 YU Baozheng XU Congwei 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期83-86,共4页
A proxy signature scheme allows an original signer to delegate his signing capability to a proxy signer who can sign on behalf of the original signer. A blind signature is the concept with a salient feature that the s... A proxy signature scheme allows an original signer to delegate his signing capability to a proxy signer who can sign on behalf of the original signer. A blind signature is the concept with a salient feature that the signer can not make a linkage between the blind signature and the identity of the requester. Proxy signature and blind signature are used widely in electronic commerce. With satisfying the security properties of both two signatures, a new proxy blind signature scheme based on discrete logarithm problem is proposed. 展开更多
关键词 discrete logarithm problem proxy signature blind signature electronic commerce
下载PDF
Electronic warfare in the optical band:Main features,examples and selected measurement data 被引量:3
9
作者 Roman Ostrowski Artur Cywinski Marek Strzelec 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第5期1636-1649,共14页
The paper presents the possibilities of,and methods for,acquiring,analysing and processing optical signals in order to recognise,identify and counteract threats on the contemporary battleground.The main ways electroni... The paper presents the possibilities of,and methods for,acquiring,analysing and processing optical signals in order to recognise,identify and counteract threats on the contemporary battleground.The main ways electronic warfare is waged in the optical band of the electromagnetic wave spectrum have been formulated,including the acquisition of optical emitter signatures,as well as ultraviolet(UV)and thermal(IR)signatures.The physical parameters and values describing the emission of laser radiation are discussed,including their importance in terms of creating optical signatures.Moreover,it has been shown that in the transformation of optical signals into signatures,only their spectral and temporal parameters can be applied.This was confirmed in experimental part of the paper,which includes our own measurements of spectral and temporal emission characteristics for three types of binocular laser rangefinders.It has been further shown that through simple registration and quick analysis involving comparison of emission time parameters in the case of UV signatures in“solar-blind”band,various events can be identified quickly and faultlessly.The same is true for IR signatures,where the amplitudes of the recorded signal for several wavelengths are compared.This was confirmed experimentally for UV signatures by registering and then analyzing signals from several events during military exercises at a training ground,namely Rocket Propelled Grenade(RPG)launches and explosions after hitting targets,trinitrotoluene(TNT)explosions,firing armour-piercing,fin-stabilised,discarding sabots(APFSDS)or high explosive(HE)projectiles.The final section describes a proposed model database of emitters,created as a result of analysing and transforming the recorded signals into optical signatures. 展开更多
关键词 OPTOelectronicS electronic warfare Optical signature
下载PDF
Fair Electronic Payment Scheme Based on DSA 被引量:1
10
作者 WANGShao-bin HONGFan ZHUXian 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期203-206,共4页
We present a multi-signature scheme based on DSA and describes a faireleetronic payment scheme based on improved DSA signatures. The scheme, makes both sides in e-qualpositions during the course of electronic transact... We present a multi-signature scheme based on DSA and describes a faireleetronic payment scheme based on improved DSA signatures. The scheme, makes both sides in e-qualpositions during the course of electronic transaction A Trusted Third Party (TTP)is involved in thescheme to guarantee the fairness of the scheme for both sides. However, only during the course ofregistration and dispute resolution will TTP be needed TTP is not needed during the normal paymentstage. 展开更多
关键词 fair electronic payment multi-signatures DSA signatures E-COMMERCE
下载PDF
A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial 被引量:1
11
作者 CAO Feng CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1777-1780,共4页
In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not ne... In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet. 展开更多
关键词 electronic voting blind signature RSA(Rivest Sharrtir Adleman) polynomial function
下载PDF
Fair E-Payment Protocol Based on Simple Partially Blind Signature Scheme
12
作者 LIU Jingwei SUN Rong KOU Weidong 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期181-184,共4页
This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants ... This paper presents a simple partially blind signature scheme with low computation. By converse using the partially blind signature scheme, we build a simple fair e-payment protocol. In the protocol, two participants achieve the goals of exchanging their digital signatures from each other in a simple way. An ado vantage of this scheme is that this approach does not require the intervention of the third party in any case. The low-computation property makes our scheme very attractive for mobile client and smart-card implementation in many e-commerce applications. 展开更多
关键词 electronic commerce E-PAYMENT Schnorr signature partial blind signature
下载PDF
A Fair Off-Line E-Cash System with Group Signature
13
作者 SUYun-Xue ZHUYue-fei 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期745-748,共4页
This paper describes the research results and development of fair off-line e-cash systems so far, and points out that in these systems, the bank can compute the double-spender’s account secret key, thus the bank can ... This paper describes the research results and development of fair off-line e-cash systems so far, and points out that in these systems, the bank can compute the double-spender’s account secret key, thus the bank can impersonate the double-spender to withdraw from the double-spender’s account. This article utilizes anonymity control and group signature to address this shortcoming. Key words electronic cash - anonymity control - group signature CLC number TP 309 Foundation item: Supported by the National Natural Science Fundation of China (90204015)Biography: SU Yun-xue (1975-), male, Ph. D. research direction: the software and theory of computer and information security. 展开更多
关键词 electronic cash anonymity control group signature
下载PDF
Methyl orbital signatures in 2-amino-1-propanol
14
作者 王克栋 段坤杰 刘玉芳 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第7期235-240,共6页
Electron density distributions of 2-aminoethanol (2AE) and 2-amino-l-propanol (2AP) are calculated in both the coordinate and the momentum spaces using the B3LYP/TZVP method. Using the dual space analysis, molecul... Electron density distributions of 2-aminoethanol (2AE) and 2-amino-l-propanol (2AP) are calculated in both the coordinate and the momentum spaces using the B3LYP/TZVP method. Using the dual space analysis, molecular orbital signatures of the methyl substituent in 2AP are identified with respect to 2AE. Relaxations of the geometry and the valence orbital in 2AP are found to be due to the insertion of the methyl group. Five orbitals, not four orbitals, are identified as the methyl signatures. They are orbital 5a in the core shell, orbitals 9a and 10a in the inner valence shell, and orbitals 15a and 16a in the outer valence. In the inner valence shell, the attachment of methyl to 2AE causes a splitting of its orbital 8a into orbitals 9a and 10a of 2AP, whereas in the outer valence shell, the methyl group results in the insertion of an additional orbital pair of 15a and 16a. The frontier molecular orbitals 21a, 20a, and 19a are found to have no significant role in the methylation of 2AE. 展开更多
关键词 electron density distribution orbital signature of methyl molecular orbital
下载PDF
Anonymity control in electronic check systems
15
作者 马春光 Yang Yixian Hu Zhengming 《High Technology Letters》 EI CAS 2005年第4期355-358,共4页
Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single cheek is used to pay any price that is not more than the face value. ... Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single cheek is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refired cheeks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairmess is also an important issue in check systelns. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonylnity revocation is introduced to electronic check system for the fitst thne, and a model of fair electronic check system is proposed. An effieient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is elnployed to revoke the anonymity of unhonest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements. 展开更多
关键词 electronic check anonymity revocation RSA-based partially blind signature
下载PDF
A Proxy Blind Signature Scheme and an Off-Line Electronic Cash Scheme 被引量:4
16
作者 LIU Jianwei LIU Jianhua QIU Xiufeng 《Wuhan University Journal of Natural Sciences》 CAS 2013年第2期117-125,共9页
To support withdrawing and storing money from all levels of the bank for the customers in the real world, in this paper, we propose a proxy blind signature scheme and an off-line e-cash scheme based on the new proxy b... To support withdrawing and storing money from all levels of the bank for the customers in the real world, in this paper, we propose a proxy blind signature scheme and an off-line e-cash scheme based on the new proxy blind signature scheme. The pro- posed proxy blind signature is proven secure in the random oracle model under chosen-target computational Diffie-Hellman assump- tions, and the e-cash scheme can satisfy the security requirements of unforgeability, anonymity, and traceability. 展开更多
关键词 off-line electronic cash proxy blind signature ran-dom oracle model electronic commerce
原文传递
A Fair Off-Line Electronic Cash Scheme Based on Restrictive Partially Blind Signature
17
作者 王常吉 吴建平 段海新 《Tsinghua Science and Technology》 SCIE EI CAS 2004年第4期441-443,481,共4页
A fair off-line electronic cash scheme was presented based on a provable secure restrictive par-tially blind signature. The scheme is more efficient than those of previous works as the expiry date and de-nomination in... A fair off-line electronic cash scheme was presented based on a provable secure restrictive par-tially blind signature. The scheme is more efficient than those of previous works as the expiry date and de-nomination information are embedded in the electronic cash, which alleviates the storage pressure for the bank to check double spending, and the bank need not use different public keys for different coin values, shops and users need not carry a list of bank抯 public keys to verify in their electronic wallet. The modular exponentiations are reduced for both the user and the bank by letting the trustee publish the public values with different structure as those of previous electronic cash schemes. The scheme security is based on the random oracle model and the decision Diffie-Hellman assumption. The scheme can be easily extended to multi-trustees and multi-banks using threshold cryptography. 展开更多
关键词 partially blind signature restrictive blind signature fair electronic cash scheme
原文传递
Self-identification of electronically scanned signatures(ESS)and digitally constructed signatures(DCS)
18
作者 Zuzanna Kazmierczyk Ian J.Turner 《Forensic Sciences Research》 CSCD 2022年第2期261-264,共4页
The use of electronic signatures as a form of identification is increasingly common,yet they have been shown to lack the dynamic features found in online signatures.In this study,handwritten signatures were scanned to... The use of electronic signatures as a form of identification is increasingly common,yet they have been shown to lack the dynamic features found in online signatures.In this study,handwritten signatures were scanned to produce electronically scanned signatures(ESS)which were then digitally altered to produce digitally constructed signatures(DCS).The ESS and DCS were presented back to participants to identify which were genuine.Only 1%of participants correctly identified all signatures,with a mean score of 57.6%identifications.The lack of self-recognition of ESS raises questions on their reliability and usefulness as means of personal identification. 展开更多
关键词 Forensic sciences signature HANDWRITING questioned document analysis electronic signature digital signature simulation
原文传递
高校采购合同线上全流程管理体系构建与实践
19
作者 李朝明 李康 +1 位作者 陈昌友 卢坤 《实验室研究与探索》 CAS 北大核心 2024年第9期241-246,共6页
采购合同线上全流程管理是实现新政府会计制度背景下“权责发生制”相关要求的有效途径,也是高校加强内部控制和规范经济行为的重要手段。基于对高校采购合同管理现状及问题分析的基础上,通过部门协同、信息化系统建设及电子签名等技术... 采购合同线上全流程管理是实现新政府会计制度背景下“权责发生制”相关要求的有效途径,也是高校加强内部控制和规范经济行为的重要手段。基于对高校采购合同管理现状及问题分析的基础上,通过部门协同、信息化系统建设及电子签名等技术构建了本校采购合同线上全流程信息化管理平台。实现了采购人、供应商及合同归口管理部门的有效协同,实现了合规、安全、高效的电子合同签约全流程系统建设,实现了采购合同的可溯源及可跟踪,进一步规范了高校合同管理。此外,该体系也加强了合同履约信息的反馈与监督,是高校采购合同管理“放管服”的有效尝试。 展开更多
关键词 新政府会计制度 内部控制 放管服改革 电子签名 电子合同
下载PDF
基于身份的可验证定时格签名方案
20
作者 陈辉焱 王庆楠 +2 位作者 谭舜聪 谢惠琴 姚云飞 《信息网络安全》 CSCD 北大核心 2024年第9期1317-1327,共11页
针对现有的可验证定时签名方案无法有效抵抗量子攻击的威胁和无法批处理时间锁谜题的缺陷,文章结合非交互门限秘密共享、批处理时间锁谜题和简洁非交互零知识证明等抗量子组件,基于环上小整数解问题构造了一种基于身份的可验证定时格签... 针对现有的可验证定时签名方案无法有效抵抗量子攻击的威胁和无法批处理时间锁谜题的缺陷,文章结合非交互门限秘密共享、批处理时间锁谜题和简洁非交互零知识证明等抗量子组件,基于环上小整数解问题构造了一种基于身份的可验证定时格签名方案。该方案能够实现选择身份攻击下存在性不可伪造性和隐私性,同时避免了传统数字签名繁琐的证书颁发流程,且具备后量子安全和抵抗流氓谜题攻击的能力。文章还基于该方案设计了一个电子拍卖协议,提出一种链上隐私保护惩罚机制,拓展了方案的实用性。文章通过功能性分析和仿真实验展示了方案的实际性能。 展开更多
关键词 可验证定时签名 基于身份的密码体制 电子拍卖
下载PDF
上一页 1 2 48 下一页 到第
使用帮助 返回顶部