咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 5 篇 计算机科学与技术...
    • 4 篇 网络空间安全
    • 2 篇 软件工程
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 7 篇 id-based cryptog...
  • 2 篇 restrictive part...
  • 2 篇 electronic cash
  • 2 篇 proxy signature
  • 1 篇 sdvs
  • 1 篇 multi-user crypt...
  • 1 篇 gaussian sample
  • 1 篇 blind signature
  • 1 篇 random oracle
  • 1 篇 software registr...
  • 1 篇 lwe problem
  • 1 篇 bilinear pairing...
  • 1 篇 unforgeability
  • 1 篇 ring signature
  • 1 篇 lattice-based cr...
  • 1 篇 privacy enhanced...
  • 1 篇 sis problem
  • 1 篇 ring proxy signa...
  • 1 篇 proven security
  • 1 篇 information secu...

机构

  • 1 篇 department of co...
  • 1 篇 state key labora...
  • 1 篇 department of co...
  • 1 篇 dept.of computer...
  • 1 篇 school of scienc...
  • 1 篇 national compute...
  • 1 篇 department of co...
  • 1 篇 department of th...
  • 1 篇 department of el...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 guangdong.key la...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 department of co...

作者

  • 2 篇 曹珍富
  • 2 篇 柴震川
  • 1 篇 陆荣幸
  • 1 篇 wang chun-xiao
  • 1 篇 qin bo
  • 1 篇 wu qianhong
  • 1 篇 zhang fangguo
  • 1 篇 陈晓峰
  • 1 篇 李琴
  • 1 篇 张方国
  • 1 篇 汤庸
  • 1 篇 zhang huanguo
  • 1 篇 周渊
  • 1 篇 chen wuping
  • 1 篇 hu yu-pu
  • 1 篇 wang feng-he
  • 1 篇 刘胜利
  • 1 篇 chen xiaofeng
  • 1 篇 wei baodian
  • 1 篇 王常吉

语言

  • 7 篇 英文
检索条件"主题词=id-based cryptography"
7 条 记 录,以下是1-10 订阅
排序:
Efficient id-based Multi-Decrypter Encryption with Short Ciphertexts
收藏 引用
Journal of Computer Science & Technology 2007年 第1期22卷 103-108页
作者: 柴震川 曹珍富 周渊 Department of Computer Science and Engineering Shanghai diao Tong University Shanghai 200240 China National Computer Networks and Information Security Center Beijing 100031 China
Multi-decrypter encryption is a typical application in multi-user cryptographic branches. In multi-decrypter encryption, a message is encrypted under multiple decrypters' public keys in the way that only when all the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
id-based Fair Off-Line Electronic Cash System with Multiple Banks
收藏 引用
Journal of Computer Science & Technology 2007年 第3期22卷 487-493页
作者: 王常吉 汤庸 李琴 Department of Computer Science Sun Yat-Sen University
id-based public key cryptographyid-PKC) has many advantages over certificate-based public key cryptography (CA-PKC), and has drawn researchers' extensive attention in recent years. However, the existing electro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
identity-based strong designate verifier signature over lattices
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2014年 第6期21卷 52-60页
作者: WANG Feng-he HU Yu-pu WANG Chun-xiao Department of the Mathematics and Physics Shandong Jianzhu University State Key Laboratory of Integrate Services Networks Xidian University
The notion of the identity-basedid-based) strong designate verifier signature(SDVS) was extent to the lattice-based cryptography. The authors proposed an id-based SDVS scheme over lattices by using the basis dele... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Forgeability of Wang-Tang-Li's id-based Restrictive Partially Blind Signature Scheme
收藏 引用
Journal of Computer Science & Technology 2008年 第2期23卷 265-269页
作者: 刘胜利 陈晓峰 张方国 Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory of Information SecurityInstitute of SoftwareChinese Academy of Sciences Beijing 100080China Department of Computer Science School of Information Science and TechnologySun Yat-Sen University Guangzhou 510275China Department of Electronics and Communication Engineering School of Information Science and Technology Sun Yat-Sen UniversityGuangzhou 510275China
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW id-based restrictive partially blind signature (id-RPB... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient Provable Secure id-based Proxy Signature Scheme based on CDH Assumption
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2006年 第3期11卷 271-278页
作者: 柴震川 曹珍富 陆荣幸 Dept.of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030China
identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient Privacy Enhanced Software Registration with id-based Blind Signatures
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第6期13卷 733-738页
作者: CHEN Wuping QIN Bo WU Qianhong ZHANG Huanguo School of Computer Wuhan University Wuhan 430072 Hubei China School of Science Xi'an University of Technology Xi'an 710043 Shaanxi China Department of Computer Engineering and Mathematics Rovira i Virgili University Tarragona E-43007 Catalonia Spain
In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce una... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
RING PROXY SIGNATURES
收藏 引用
Journal of Electronics(China) 2008年 第1期25卷 108-114页
作者: Wei Baodian Zhang Fangguo Chen Xiaofeng Department of Electronics and Communication Engineering Sun Yat-Sen University Guangzhou 510275 China Department of Computer Science Sun Yat-Sen University Guangzhou 510275 China Guangdong.Key Laboratory of Information Security Technology Guangzhou 510275 China
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论