咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 6 篇 计算机科学与技术...
    • 6 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 8 篇 key-insulated
  • 2 篇 bilinear pairing...
  • 2 篇 key leakage
  • 2 篇 certificateless
  • 2 篇 proxy signature
  • 1 篇 standard model
  • 1 篇 industrial inter...
  • 1 篇 identity-based s...
  • 1 篇 key-exposure
  • 1 篇 exposure
  • 1 篇 key
  • 1 篇 sm2 algorithm
  • 1 篇 random oracle mo...
  • 1 篇 key agreement
  • 1 篇 id-based
  • 1 篇 bilinear
  • 1 篇 identity-based
  • 1 篇 model
  • 1 篇 identity-based c...
  • 1 篇 bilinear map

机构

  • 2 篇 college of scien...
  • 2 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 department of pr...
  • 1 篇 department of co...
  • 1 篇 school of mechan...
  • 1 篇 department of ma...
  • 1 篇 school of inform...
  • 1 篇 college of scien...
  • 1 篇 national compute...
  • 1 篇 shanghai key lab...
  • 1 篇 dept.of computer...
  • 1 篇 department of co...
  • 1 篇 school of lnform...
  • 1 篇 department of co...
  • 1 篇 department of co...

作者

  • 2 篇 洪璇
  • 2 篇 龙宇
  • 2 篇 万中美
  • 1 篇 hong xuan
  • 1 篇 xue-jia lai
  • 1 篇 王永涛
  • 1 篇 zhong-mei wan
  • 1 篇 xuan hong
  • 1 篇 liu shengli
  • 1 篇 程晓明
  • 1 篇 guo-bin zhu
  • 1 篇 yang zhao
  • 1 篇 jian weng
  • 1 篇 yu long
  • 1 篇 xiang liu
  • 1 篇 weng jian
  • 1 篇 周渊
  • 1 篇 来学嘉
  • 1 篇 孟祥芹
  • 1 篇 陈剑洪

语言

  • 8 篇 英文
检索条件"主题词=Key-insulated"
8 条 记 录,以下是1-10 订阅
排序:
Certificateless key-insulated signature without random oracles
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & Engineering) 2009年 第12期10卷 1790-1800页
作者: Zhong-mei WAN Xue-jia LAI Jian WENG Sheng-li LIU Yu LONG Xuan HONG Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China College of Science Hohai University Nanjing 210098 China Department of Computer Science Jinan University Guangzhou 510630 China School of lnformation Systems Singapore Management University Singapore 178902 Singapore
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Pairing-Free ID-Based key-insulated Signature Scheme
收藏 引用
Journal of Electronic Science and Technology 2015年 第1期13卷 33-38页
作者: Guo-Bin Zhu Hu Xiong Zhi-Guang Qin School of Computer Science and Engineering University of Electronic Science and Technology of China
Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage cause... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Certificateless Strong key-insulated Signature Without Random Oracles
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第5期16卷 571-576页
作者: 万中美 孟祥芹 洪璇 College of Science Hohai University Department of Computer Science Shanghai Normal University
It is important to ensure the private key secure in cryptosystem. To reduce the underlying danger caused by the private key leakage, Dodis et al. (2003) introduced the notion of key-insulated security. To handle the p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Identity-Based key-insulated Proxy Signature Without Random Oracles
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第5期16卷 557-566页
作者: 陈剑洪 龙宇 陈克非 王永涛 Department of Computer Science and Engineering Shanghai Jiaotong University School of Computer Engineering Huaiyin Institute of Technology Shanghai key Laboratory of Scalable Computing and System Shanghai Jiaotong University
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
ID-based key-insulated Authenticated key Agreement Protocol
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2007年 第2期12卷 247-249页
作者: 周渊 程晓明 柴震川 National Computer Network Emergency Response Technical Team/Coordination Center of China Dept.of Computer Science and Eng. Shanghai Jiaotong Univ.
The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity *** with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Strong key-insulated Signature in the Standard Model
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2010年 第6期15卷 657-661页
作者: 万中美 来学嘉 翁健 刘胜利 龙宇 洪璇 Department of Computer Science and Engineering Shanghai Jiaotong University College of Science Hohai University Department of Computer Science Jinan University
The only known construction of key-insulated signature(KIS) that can be proven secure in the standard model is based on the approach of using double signing. That is,the scheme requires two signatures:a signature with... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient and Provably Secure SM2 key-insulated Signature Scheme for Industrial Internet of Things
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
IDENTITY-BASED key-insulated PROXY SIGNATURE
收藏 引用
Journal of Electronics(China) 2009年 第6期26卷 853-858页
作者: Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200240 China Department of Mathematics College of Science Hohai University Nanjing 210098 China Department of Computer Science Jinan University Guangzhou 510632 China
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论