咨询与建议

限定检索结果

文献类型

  • 64 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 66 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 41 篇 网络空间安全
    • 34 篇 计算机科学与技术...
    • 5 篇 信息与通信工程
    • 4 篇 仪器科学与技术
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 17 篇 军事学
    • 17 篇 军队指挥学
  • 15 篇 理学
    • 11 篇 数学
    • 3 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 66 篇 provable securit...
  • 7 篇 bilinear pairing...
  • 5 篇 digital signatur...
  • 5 篇 key exchange
  • 5 篇 proxy signature
  • 3 篇 certificateless ...
  • 3 篇 group key exchan...
  • 3 篇 password
  • 3 篇 random oracle mo...
  • 3 篇 authenticated ke...
  • 3 篇 identity-based c...
  • 2 篇 security model
  • 2 篇 revocation
  • 2 篇 multi-proxy sign...
  • 2 篇 random oracle
  • 2 篇 key escrow
  • 2 篇 bilinear maps
  • 2 篇 broadcast encryp...
  • 2 篇 bilinear pairing
  • 2 篇 identity-based e...

机构

  • 4 篇 state key labora...
  • 3 篇 state key labora...
  • 3 篇 graduate univers...
  • 3 篇 state key labora...
  • 2 篇 department of co...
  • 2 篇 school of comput...
  • 2 篇 state key labora...
  • 2 篇 trusted computin...
  • 2 篇 institute of inf...
  • 2 篇 department of co...
  • 1 篇 hangzhou key lab...
  • 1 篇 school of comput...
  • 1 篇 college of infor...
  • 1 篇 department of ma...
  • 1 篇 information scie...
  • 1 篇 department of pr...
  • 1 篇 australian insti...
  • 1 篇 school of mechan...
  • 1 篇 department of ma...
  • 1 篇 department of cr...

作者

  • 3 篇 2 graduate unive...
  • 3 篇 jianfeng ma
  • 3 篇 debiao he
  • 2 篇 ma jianfeng
  • 2 篇 hu yupu
  • 2 篇 kefei chen
  • 2 篇 zhenfeng zhang
  • 2 篇 jiang zhang
  • 2 篇 张乐友
  • 2 篇 bo yang
  • 2 篇 胡予濮
  • 2 篇 wu chuankun
  • 1 篇 wang liming
  • 1 篇 yao wei
  • 1 篇 gu chun-xiang pa...
  • 1 篇 yongcheng song
  • 1 篇 jinyong chang
  • 1 篇 chen yan zhang f...
  • 1 篇 王立斌
  • 1 篇 陆荣幸

语言

  • 64 篇 英文
  • 2 篇 中文
检索条件"主题词=Provable Security"
66 条 记 录,以下是1-10 订阅
排序:
provable security of ID-Based Proxy Multi-Signature Schemes
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 87-90页
作者: GU Chunxiang ZHU Yuefei ZHAO Tao Institute of Information Engineering InformationEngineering University Zhengzhou 450002 Henan China
In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this pape... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
Science China(Information Sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
工程与科学中的计算机建模(英文) 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A leakage-resilient certificateless public key encryption scheme with CCA2 security
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2018年 第4期19卷 481-493页
作者: Yan-wei ZHOU Bo YANG Hao CHENG Qing-long WANG School of Computer Science Shaanxi Normal University School of Information Engineering Chang'an University
In recent years,much attention has been focused on designing provably secure cryptographic primitives in the presence of key *** constructions of leakage-resilient cryptographic primitives have been ***,for any polyno... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Modular approach to the design and analysis of password-based security protocols
收藏 引用
Science in China(Series F) 2007年 第3期50卷 381-398页
作者: FENG DengGuo CHEN WeiDong State Key Laboratory of Information security Institute of Software Chinese Academy of Sciences Beijing100080 China
In this paper, a general framework for designing and analyzing password-based security protocols is presented. First we introduce the concept of "weak computational indistinguishability" based on current progress of... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Formal Model for the security of Proxy Signature Schemes
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第1期10卷 275-278页
作者: GUChun-xiang ZHUYue-fei ZHANGYa-juan NetworkEngineeringDepartment InformationEngineeringUniversityZhengzhou450002HenanChina
This paper provides theoretical foundations for the secure proxy signatureprimitive. We pres-enta formal model for the security of proxy signature schemes, which defines thecapabilities of the adversary and the securi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
收藏 引用
Science China Mathematics 2013年 第7期56卷 1385-1401页
作者: CHEN Yu CHEN LiQun LIN DongDai State Key Laboratory of Information security (SKLOIS) Institute of Information Engineering Chinese Academy of Sciences Hewlett Packard Labs Long Down Avenue Stoke Gifford Bristol BS34 8QZ UK
In this paper, we first review the existing proofs of the Boneh-Franklin identity-based encryption scheme (BF-IBE for short), and show how to admit a new proof by slightly modifying the specifications of the hash func... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
security model and modular design of fair authentication key exchange protocols
收藏 引用
Science China(Information Sciences) 2010年 第2期53卷 278-287页
作者: FENG DengGuo & CHEN WeiDong State Key Laboratory of Information security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China State Key Laboratory of Information security Institute of Software Chinese Academy of Sciences Beijing China
It is traditionally assumed that the legal two parties in authentication key exchange (AKE) communications are both credible. However, in more and more network applications nowadays, it is often required that such pro... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Flaw in the security Proof of BDOP-PEKS and PEKS-STAT
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 25-28页
作者: ZHANG Yajuan ZHU Yuefei GU Chunxiang FU Changchun Institute of Information Engineering InformationEngineering University Zhengzhou 450002 Henan China Key Laboratory of Information Engineering GuangzhouUniversity Guangzhou 510006 Guangdong China School of Computer Wuhan University Wuhan 430072Hubei China
provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
EFFICIENT CERTIFICATELESS THRESHOLD SIGNATURES WITHOUT RANDOM ORACLES
收藏 引用
Journal of Systems Science & Complexity 2010年 第6期23卷 1167-1182页
作者: Piyi YANG Zhenfu CAO Xiaolei DONG Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200240 China.
This paper defines the security notion for Certificateless Threshold Signatures (CLTHS). Different from the adversarial model defined by Wang, et al. (2007), our definition considers Type I and Type II adversary s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论