期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Science as the Basis for Public Health Decisions in Nutrition and Food Safety in Asia
1
作者 KRAISID TONTISIRIN RENATA CLARKE 《Biomedical and Environmental Sciences》 SCIE CAS CSCD 2001年第1期1-13,共13页
关键词 Science as the Basis for public Health decisions in Nutrition and Food Safety in Asia
下载PDF
标准模型下一种实用的和可证明安全的IBE方案 被引量:4
2
作者 徐鹏 崔国华 +2 位作者 雷凤宇 汤学明 陈晶 《计算机学报》 EI CSCD 北大核心 2010年第2期335-344,共10页
组合公钥方案是一种用于基于身份密码体制中生成用户加密密钥和私钥的知名方案.针对组合公钥方案存在合谋攻击的问题,通过仅扩展该方案的私钥生成过程,实现了扩展方案的抗合谋攻击性.在此基础上构建标准模型下基于Decisional Bilinear D... 组合公钥方案是一种用于基于身份密码体制中生成用户加密密钥和私钥的知名方案.针对组合公钥方案存在合谋攻击的问题,通过仅扩展该方案的私钥生成过程,实现了扩展方案的抗合谋攻击性.在此基础上构建标准模型下基于Decisional Bilinear Diffie-Hell man假设可证明安全的一种新的基于身份加密方案.最后,为了说明所构新方案的实用性,分析了扩展组合公钥方案的用户加密密钥抗碰撞性;对比了新方案和同类的3个知名方案在安全性证明的归约程度方面、加解密的时间复杂度方面和密文的长度方面的性能,表明了新方案在以上3点上具有目前最优的指标.因此新方案是相对较实用的. 展开更多
关键词 组合公钥 合谋攻击 标准模型 decisional BILINEAR DIFFIE-HELLMAN假设 基于身份加密
下载PDF
一种新的不含随机预言模型的公钥加密方案
3
作者 周立 蒋天发 《信息网络安全》 2009年第4期55-57,65,共4页
2004年的欧密会上,Canetti,Halevi和Katz提出了将Selectivre-ID安全的基于身份加密方案转化为选择密文安全的公钥加密方案的方法。但由于该方法需要用到一次性签名,给所基于的方案增加了明显的通信和计算负载。为了提高加密过程的计算效... 2004年的欧密会上,Canetti,Halevi和Katz提出了将Selectivre-ID安全的基于身份加密方案转化为选择密文安全的公钥加密方案的方法。但由于该方法需要用到一次性签名,给所基于的方案增加了明显的通信和计算负载。为了提高加密过程的计算效率,作者在本文中介绍了一种从Boneh-Boyen提出的选择性的基于身份的加密方案到公钥加密方案的转换方法,该方法是公开可验证的,其效率也有了提高。该方案是基于决定性双线性Diffie-Hellman假设和抗碰撞哈希函数的。 展开更多
关键词 公钥加密 决定性双线性 DIFFIE-HELLMAN 随机预言 转换 基于身份
下载PDF
一种概率型非对称公钥密码体制的设计和实现
4
作者 郭伟青 陈丹 童华章 《计算机应用与软件》 CSCD 北大核心 2007年第6期170-172,共3页
在分析传统公钥密码体制的基础上,设计并实现了一种基于Diffie Hellman判定问题,辅以抗碰撞的Hash函数和公钥证书进行加密和解密,安全性可证明的概率型非对称密码系统。它比基本Cramer-Shoup体制具有更高的效率,且同样具有抵抗自适应选... 在分析传统公钥密码体制的基础上,设计并实现了一种基于Diffie Hellman判定问题,辅以抗碰撞的Hash函数和公钥证书进行加密和解密,安全性可证明的概率型非对称密码系统。它比基本Cramer-Shoup体制具有更高的效率,且同样具有抵抗自适应选择密文攻击的能力。 展开更多
关键词 加密和解密 Diffie Hellman判定问题 公钥 算法
下载PDF
一个基于CPK的高效签密方案 被引量:4
5
作者 陈永刚 贾春福 吕述望 《电子与信息学报》 EI CSCD 北大核心 2009年第7期1753-1757,共5页
基于组合公钥原理,该文提出一个新的签密方案CPK-SC,抛弃了传统基于身份签密方案中的配对运算,并通过使用对称密码算法解决了传统基于身份签密方案只能处理定长消息的限制。与已有的基于双线性对的签密方案相比,CPK-SC方案计算量小、生... 基于组合公钥原理,该文提出一个新的签密方案CPK-SC,抛弃了传统基于身份签密方案中的配对运算,并通过使用对称密码算法解决了传统基于身份签密方案只能处理定长消息的限制。与已有的基于双线性对的签密方案相比,CPK-SC方案计算量小、生成密文短,适用于计算和通信资源受限环境,具有广泛的应用前景。在判定性Diffie-Hellman(DDH)假设下,论文通过随机预言模型证明了CPK-SC的安全性。 展开更多
关键词 签密 组合公钥 随机预言模型 decisional Diffie-Hellman(DDH)
下载PDF
A leakage-resilient certificateless public key encryption scheme with CCA2 security 被引量:4
6
作者 Yan-wei ZHOU Bo YANG +1 位作者 Hao CHENG Qing-long WANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第4期481-493,共13页
In recent years,much attention has been focused on designing provably secure cryptographic primitives in the presence of key leakage.Many constructions of leakage-resilient cryptographic primitives have been proposed.... In recent years,much attention has been focused on designing provably secure cryptographic primitives in the presence of key leakage.Many constructions of leakage-resilient cryptographic primitives have been proposed.However,for any polynomial time adversary,most existing leakage-resilient cryptographic primitives cannot ensure that their outputs are random,and any polynomial time adversary can obtain a certain amount of leakage on the secret key from the corresponding output of a cryptographic primitive.In this study,to achieve better performance,a new construction of a chosen ciphertext attack 2(CCA2)secure,leakage-resilient,and certificateless public-key encryption scheme is proposed,whose security is proved based on the hardness of the classic decisional Diffie-Hellman assumption.According to our analysis,our method can tolerate leakage attacks on the private key.This method also achieves better performance because polynomial time adversaries cannot achieve leakage on the private key from the corresponding ciphertext,and a key leakage ratio of 1/2 can be achieved.Because of these good features,our method may be significant in practical applications. 展开更多
关键词 Certificateless public-key encryption Leakage-resilience Provable security CCA2 security decisional Diffie-Hellman
原文传递
A Certificateless Threshold Public Key Encryption Scheme
7
作者 ZOU Xiubin ZOU Ran 《Wuhan University Journal of Natural Sciences》 CAS 2012年第3期223-228,共6页
The decryption participant's private key share for decryption is delegated by key generation center in the threshold IBE scheme.However,a key generation center which is absolutely trustworthy does not exist.So the au... The decryption participant's private key share for decryption is delegated by key generation center in the threshold IBE scheme.However,a key generation center which is absolutely trustworthy does not exist.So the author presents a certificateless threshold public key encryption scheme.Collaborating with an administrator,the decryption participant generates his whole private key share for decryption in the scheme.The administrator does not know the decryption participant's private key share for decryption.Making use of q-SDH assumption,the author constructs a certificateless threshold public key encryption scheme.The security of the scheme is eventually reduced to the solving of Decisional Bilinear Diffie-Hellman problem.Moreover,the scheme is secure under the chosen ciphertext attack in the standard model. 展开更多
关键词 certificateless public key cryptosystem identity-based encryption threshold public key encryption decisional bilinear Diffie-Hellman assumption bilinear pairings
原文传递
Secure Proxy Re-Encryption from CBE to IBE
8
作者 CHEN Yan ZHANG Futai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期657-661,共5页
In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. Th... In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. The scheme is non-interactive, unidirectional and collude "safe". Furthermore, it is compatible with current IBE (identity-based encryption) deployments. The scheme has chosen ciphertext security in the random oracle model assuming the hardness of the Decisional Bilinear Diffie-Hellman problem. 展开更多
关键词 proxy re-encryption traditional public key encryption identity-based public key encryption decisional Bilinear Diffie-Hellman problem random oracle model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部