您的位置: 专家智库 > >

国家自然科学基金(s60303026)

作品数:3 被引量:3H指数:1
发文基金:国家自然科学基金更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 3篇中文期刊文章

领域

  • 2篇自动化与计算...
  • 1篇电子电信

主题

  • 1篇SECURE
  • 1篇WITHOU...
  • 1篇AGAINS...
  • 1篇AGREEM...
  • 1篇ANALYS...
  • 1篇ID-BAS...
  • 1篇IDENTI...
  • 1篇INFORM...
  • 1篇CRYPTO...
  • 1篇ENCRYP...
  • 1篇PAIRIN...

传媒

  • 3篇Journa...

年份

  • 3篇2006
3 条 记 录,以下是 1-3
排序方式:
ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
2006年
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively.
龙宇陈克非刘胜利
Analysis of Information Leakage in Quantum Key Agreement
2006年
Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described: sitting in the middle, an adversary can play a “man-in-the-middle” attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.
刘胜利郑东陈克非
关键词:ANALYSIS
Verifiably Encrypted Signatures Without Random Oracles被引量:3
2006年
Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption.
李祥学陈克非刘胜利李世群
关键词:PAIRINGS
共1页<1>
聚类工具0