咨询与建议

限定检索结果

文献类型

  • 10 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 8 篇 网络空间安全
    • 5 篇 计算机科学与技术...
    • 3 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 理学
    • 1 篇 数学

主题

  • 12 篇 verifiable secre...
  • 2 篇 mobile agent
  • 2 篇 anonymous paymen...
  • 1 篇 participating me...
  • 1 篇 multi-authority
  • 1 篇 commitment schem...
  • 1 篇 information-theo...
  • 1 篇 unconditional se...
  • 1 篇 privacy-preservi...
  • 1 篇 threshold scheme
  • 1 篇 partial broadcas...
  • 1 篇 secure function ...
  • 1 篇 information-theo...
  • 1 篇 modified proacti...
  • 1 篇 the theory of cr...
  • 1 篇 misbehaviour det...
  • 1 篇 resilient equili...
  • 1 篇 bilinear group
  • 1 篇 blockchain
  • 1 篇 game theory

机构

  • 1 篇 school of comput...
  • 1 篇 nationalkeylabor...
  • 1 篇 school of mathem...
  • 1 篇 department of el...
  • 1 篇 shanghai key lab...
  • 1 篇 department of el...
  • 1 篇 national key lab...
  • 1 篇 state key labora...
  • 1 篇 school of contin...
  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 security researc...
  • 1 篇 college of compu...
  • 1 篇 school of softwa...
  • 1 篇 cyberspace secur...
  • 1 篇 school of electr...
  • 1 篇 college of compu...

作者

  • 1 篇 xiao guozhen
  • 1 篇 luo shou-shan
  • 1 篇 xiaopeng zhao
  • 1 篇 jia xiao-yun
  • 1 篇 wang shuhong qi ...
  • 1 篇 zhang jie
  • 1 篇 yuan chao-wei
  • 1 篇 liuyi xiangming-...
  • 1 篇 k. krishnamoorth...
  • 1 篇 haiyong bao
  • 1 篇 qiu gang
  • 1 篇 wang hong
  • 1 篇 wei shimin
  • 1 篇 r. mohandas reng...
  • 1 篇 cai yongquan
  • 1 篇 liu yi xiang min...
  • 1 篇 zhang en
  • 1 篇 jiachen shen
  • 1 篇 zhang futai
  • 1 篇 xiaolei dong

语言

  • 12 篇 英文
检索条件"主题词=Verifiable Secret Sharing"
12 条 记 录,以下是1-10 订阅
排序:
Efficient and Information-Theoretical Secure verifiable secret sharing over Bilinear Groups
收藏 引用
Chinese Journal of Electronics 2014年 第1期23卷 13-17页
作者: ZHANG Futai ZHANG Jie School of Computer Science and Technology Nanjing Normal University
verifiable secret sharing(VSS) is an important technique which has been used as a basic tool in distributed cryptosystems, secure multi-party computations,as well as safe guarding some confidential information such as... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
verifiable secret sharing Scheme Based on the Plane Parametric Curve
收藏 引用
Applied Mathematics 2021年 第11期12卷 1021-1030页
作者: Bin Li School of Mathematics Chengdu Normal University Chengdu China
verifiable secret sharing is a special kind of secret sharing. In this paper, A secure and efficient threshold secret sharing scheme is proposed by using the plane parametric curve on the basis of the principle of sec... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Information-Theoretic Secure verifiable secret sharing over RSA Modulus
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1849-1852页
作者: QIU Gang WANG Hong WEI Shimin XIAO Guozhen State Key Laboratory of Integrated Sevice Network Xidian University Xi'an 710071 Shaanxi China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China Department of Computer Science and Technology Huaibei Coal Normal College Huaibei 235000 Anhui China
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoret... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
BDAE: A Blockchain-Based and Decentralized Attribute-Based Encryption Scheme for Secure Data sharing
收藏 引用
Wuhan University Journal of Natural Sciences 2024年 第3期29卷 228-238页
作者: YANG Shuangxi School of Electronic Information Wuhan UniversityWuhan 430072HubeiChina
Ciphertext-policy attribute-based encryption(CP-ABE) is widely employed for secure data sharing and access control. However, its dependence on a single authority introduces security and performance challenges. Despite... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New Rational secret sharing Scheme
收藏 引用
China Communications 2010年 第4期7卷 18-22页
作者: ZHANG En CAI Yongquan College of Computer Science and Technology Beijing University of Technology Beijing 100124 China College of Computer and Information Technology Henan Normal University Xinxiang 453007 China
In this paper,we propose a new approach for rational secret sharing in game theoretic *** trusted center is eliminated in the secret reconstruction *** player doesn’t know current round is real round or fake *** gain... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid
收藏 引用
Frontiers of Computer Science 2022年 第1期16卷 143-153页
作者: Zhusen LIU Zhenfu CAO Xiaolei DONG Xiaopeng ZHAO Haiyong BAO Jiachen SHEN Shanghai Key Laboratory of Trustworthy Computing East China Normal UniversityShanghai200062China Cyberspace Security Research Center Peng Cheng LaboratoryShenzhen518055China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China
Incorporation of fog computing with low latency,preprocession(e.g.,data aggregation)and location awareness,can facilitate fine-grained collection of smart metering data in smart grid and promotes the sustainability an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New Signature Scheme with Shared Verification
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2006年 第2期13卷 66-69页
作者: JIA Xiao-yun LUO Shou-shan YUAN Chao-wei School of Continuing Education Beijing University of Posts and Telecommunications Beijing 100876 P.R. China School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 P.R. China National Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 P.R. China
With expanding user demands, digital signature techniques are also being expanded greatly, from single signature and single verification techniques to techniques supporting multi-users. This paper presents a new digit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Anonymous Payment Protocol withMobile Agents in Hostile Environments
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第1期10卷 271-274页
作者: LIUYi XIANGMing-sen WANGYu-min NationalKeyLaboratoryonIntegratedServerNetworks XidianUniversityXi'an710071ShaanxiChina
By using Pedersen's verifiable secret sharing scheme and the theory of crossvalidation, we propose an a-nonymous payment protocol which have following features: protecting theconfidentiality of sensitive payment infor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient Data Integrity Using Enhanced secret sharing Scheme for MANET
收藏 引用
Circuits and Systems 2016年 第10期7卷 3174-3182页
作者: R. Mohandas Rengaraju K. Krishnamoorthi Department of Electronics and Communication Engineering Jayaram College of Engineering Trichy India Department of Electrical Engineering Sona College of Technology Salem India
Mobile Ad Hoc Networks consist of nodes which are wireless and get organized based on the transmission requirement. These nodes are mobile nodes, so they communicate with each other without any fixed access point. Thi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Multireceiver Commitment Schemes
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第6期13卷 759-764页
作者: WANG Shuhong QI Zhifeng Security Research Center Sumavision Technologies CO. LTD. Beijing 100085 China
Existing commitment schemes were addressed under the classic two-party scenario, However, popularity of the secure multi-party computation in today's lush network communication is motivating us to adopt more sophisti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论