期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Secure Provenance of Electronic Records Based on Blockchain
1
作者 Qirun Wang Fujian Zhu +1 位作者 Sai Ji Yongjun Ren 《Computers, Materials & Continua》 SCIE EI 2020年第11期1753-1769,共17页
At present,the provenance of electronic records is stored centrally.The centralized way of information storage has huge risks.Whether the database itself is destroyed or the communication between the central database ... At present,the provenance of electronic records is stored centrally.The centralized way of information storage has huge risks.Whether the database itself is destroyed or the communication between the central database and the external interruption occurs,the provenance information of the stored electronic records will not play its role.At the same time,uncertainties such as fires and earthquakes will also pose a potential threat to centralized databases.Moreover,the existing security provenance model is not specifically designed for electronic records.In this paper,a security provenance model of electronic records is constructed based on PREMIS and METS.Firstly,this paper analyses the security requirements of the provenance information of electronic records.Then,based on the characteristics of blockchain decentralization,and combined with coding theory,a distributed secure provenance guarantees technology of electronic records is constructed,which ensures the authenticity,integrity,confidentiality and reliability of the provenance information. 展开更多
关键词 Secure provenance electronic records blockchain
下载PDF
Identity-based signature scheme based on quadratic residues 被引量:7
2
作者 CHAI ZhenChuan CAO ZhenFu DONG XiaoLei 《Science in China(Series F)》 2007年第3期373-380,共8页
Identity-based (ID-based) cryptography has drawn great concerns in recent years, and most of ID-based schemes are constructed from bilinear parings. Therefore, ID-based scheme without pairing is of great interest in... Identity-based (ID-based) cryptography has drawn great concerns in recent years, and most of ID-based schemes are constructed from bilinear parings. Therefore, ID-based scheme without pairing is of great interest in the field of cryptography. Up to now, there still remains a challenge to construct ID-based signature scheme from quadratic residues. Thus, we aim to meet this challenge by proposing a concrete scheme. In this paper, we first introduce the technique of how to calculate a 2^lth root of a quadratic residue, and then give a concrete ID-based signature scheme using such technique. We also prove that our scheme is chosen message and ID secure in the random oracle model, assuming the hardness of factoring. 展开更多
关键词 ID-based signature quadratic residue FACTORING random oracle proven security
原文传递
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts 被引量:1
3
作者 柴震川 曹珍富 周渊 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第1期103-108,共6页
Multi-decrypter encryption is a typical application in multi-user cryptographic branches. In multi-decrypter encryption, a message is encrypted under multiple decrypters' public keys in the way that only when all the... Multi-decrypter encryption is a typical application in multi-user cryptographic branches. In multi-decrypter encryption, a message is encrypted under multiple decrypters' public keys in the way that only when all the decrypters cooperate, can the message be read. However, trivial implementation of multi-decrypter encryption using standard approaches leads to heavy computation costs and long ciphertext which grows as the receiver group expands. This consumes much precious bandwidth in wireless environment, such as mobile ad hoc network. In this paper, we propose an efficient identity based multi-decrypter encryption scheme, which needs only one or zero (if precomputed) pairing computation and the ciphertext contains only three group elements no matter how many the receivers are. Moreover, we give a formal security definition for the scheme, and prove the scheme to be chosen ciphertext secure in the random oracle model, and discuss how to modify the scheme to resist chosen ciphertext attack. 展开更多
关键词 ID-based cryptography multi-user cryptography proven security random oracle
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部