您的位置: 专家智库 > >

国家自然科学基金(60673079)

作品数:4 被引量:29H指数:3
相关作者:董晓蕾朱志馨王励成曹珍富更多>>
相关机构:上海交通大学更多>>
发文基金:国家自然科学基金国家教育部博士点基金国家高技术研究发展计划更多>>
相关领域:自动化与计算机技术理学更多>>

文献类型

  • 4篇中文期刊文章

领域

  • 3篇自动化与计算...
  • 1篇理学

主题

  • 1篇双线性
  • 1篇双线性配对
  • 1篇离散对数
  • 1篇离散对数问题
  • 1篇密码
  • 1篇密码系统
  • 1篇密钥协商
  • 1篇可证安全
  • 1篇可证安全性
  • 1篇类群
  • 1篇二次域
  • 1篇安全性
  • 1篇PROXY
  • 1篇SECURI...
  • 1篇SIGNAT...
  • 1篇BASED_...
  • 1篇DESIGN...
  • 1篇EFFICI...
  • 1篇EFFICI...
  • 1篇IDENTI...

机构

  • 2篇上海交通大学

作者

  • 2篇董晓蕾
  • 1篇曹珍富
  • 1篇王励成
  • 1篇朱志馨

传媒

  • 2篇Scienc...
  • 1篇计算机应用研...
  • 1篇中国科学:信...

年份

  • 2篇2009
  • 1篇2008
  • 1篇2007
4 条 记 录,以下是 1-4
排序方式:
Identity-based signature scheme based on quadratic residues被引量:8
2007年
Identity-based (ID-based) cryptography has drawn great concerns in recent years, and most of ID-based schemes are constructed from bilinear parings. Therefore, ID-based scheme without pairing is of great interest in the field of cryptography. Up to now, there still remains a challenge to construct ID-based signature scheme from quadratic residues. Thus, we aim to meet this challenge by proposing a concrete scheme. In this paper, we first introduce the technique of how to calculate a 2^lth root of a quadratic residue, and then give a concrete ID-based signature scheme using such technique. We also prove that our scheme is chosen message and ID secure in the random oracle model, assuming the hardness of factoring.
CHAI ZhenChuan CAO ZhenFu DONG XiaoLei
关键词:FACTORING
Designing efficient proxy signature schemes for mobile communication被引量:10
2008年
Proxy signature is an active cryptographic research area, and a wide range of literatures can be found nowadays suggesting improvement and generalization of existing protocols in various directions. However, from the efficiency view, many proposed proxy signature schemes in these literatures are not satisfying and cannot fit to the mobile communication. Therefore, there is a desire to design efficient proxy signature schemes. Based on Boneh et al's pairing-based short signature, this paper presents two proxy signature schemes. One is proxy-protected signature scheme, and the other is proxy aggregate signature scheme. Since both of them can achieve high efficiency, it is believed that they are specially suitable for mobile communication environment.
LU RongXing DONG XiaoLei CAO ZhenFu
高效安全的无证书密钥协商方案被引量:10
2009年
在网络信息安全领域,服务器与客户机之间的密钥协商显得非常必要。无证书公钥密码是为了克服基于身份密码的密钥托管性质提出来的,它结合了传统公钥证书密码体系和基于身份的公钥体系的优点。应用椭圆曲线的配对运算,提出了一个两方的无证书密钥协商协议,其中每一方只需计算一个配对,并证明了它在ECK模型下的安全性。与其他无证书密钥协商协议相比,安全性和效率都更好。
朱志馨董晓蕾
关键词:密钥协商双线性配对
基于二次域的密码系统的新设计被引量:1
2009年
文中结合丢番图方程和非最大虚二次阶的特点,构造了一类新型非最大虚二次阶NIQO~*,证明了在其理想类群中很容易设计可证安全的二次域密码体制.同时,通过具体构造的签名体制和加密体制,说明了这类虚二次域密码体制很容易实现,解决了此前虚二次域密码体制难以实现的问题.同时,在随机预言模型假设下证明:1)如果NIQO~*类群中离散对数问题(CL-DLP)是困难的,那么文中构造的新签名体制在适应性选择消息攻击下是不可伪造的,即达到了UF-CMA安全性;2)如果NIQO~*类群中决定性Diffie-Hellman问题(CL-DDH)是困难的,那么新加密体制在适应性选择密文攻击下是明文不可区分的,即达到了IND-CCA2安全性.
董晓蕾曹珍富王励成
关键词:可证安全性
共1页<1>
聚类工具0