咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 网络空间安全
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 3 篇 key-exposure
  • 2 篇 bilinear pairing...
  • 1 篇 identity-based s...
  • 1 篇 chameleon signat...
  • 1 篇 random oracle
  • 1 篇 parallel key-ins...
  • 1 篇 chameleon hash
  • 1 篇 signature
  • 1 篇 key-insulated
  • 1 篇 proxy signature

机构

  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 school of inform...
  • 1 篇 department of co...
  • 1 篇 department of ma...
  • 1 篇 school of mathem...
  • 1 篇 school of mathem...
  • 1 篇 department of co...

作者

  • 1 篇 王学理
  • 1 篇 liu shengli
  • 1 篇 weng jian
  • 1 篇 谢冬青
  • 1 篇 lai xuejia
  • 1 篇 陈克非
  • 1 篇 高伟
  • 1 篇 翁健
  • 1 篇 hong xuan
  • 1 篇 李祥学
  • 1 篇 邱卫东
  • 1 篇 wan zhongmei
  • 1 篇 刘胜利

语言

  • 3 篇 英文
检索条件"主题词=Key-exposure"
3 条 记 录,以下是1-10 订阅
排序:
Chameleon Hashes Without key exposure Based on Factoring
收藏 引用
Journal of Computer Science & Technology 2007年 第1期22卷 109-113页
作者: 高伟 王学理 谢冬青 School of Mathematics and Econometrics Hunan University Changsha 410082 China School of Mathematics Science South China Normal University Guangzhou 510631 China School of Computer and Communication Hunan University Changsha 410082 China
Chameleon hash is the main primitive to construct a chameleon signature scheme which provides nonrepudiation and non-transferability simultaneously. However, the initial chameleon hash schemes suffer from the key expo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Parallel key-insulated Signature: Framework and Construction
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2008年 第1期13卷 6-11页
作者: 翁健 陈克非 李祥学 刘胜利 邱卫东 Department of Computer Science and Engineering Shanghai Jiaotong University School of Information Security Engineering Shanghai Jiaotong University
To deal with the key-exposure problem in signature systems, a new framework named parallel key-insulated signature (PKIS) was introduced, and a concrete PKIS scheme was proposed. Compared with traditional key-insulate... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
IDENTITY-BASED key-INSULATED PROXY SIGNATURE
收藏 引用
Journal of Electronics(China) 2009年 第6期26卷 853-858页
作者: Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200240 China Department of Mathematics College of Science Hohai University Nanjing 210098 China Department of Computer Science Jinan University Guangzhou 510632 China
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论