Tô et al. presented a bilinear-map-based traitor tracing scheme with revocation, but it is a symmetric scheme because it does not provide non-repudiation. An improved Tô scheme was proposed using oblivious p...
详细信息
Tô et al. presented a bilinear-map-based traitor tracing scheme with revocation, but it is a symmetric scheme because it does not provide non-repudiation. An improved Tô scheme was proposed using oblivious polynomial evaluation (OPE) protocol and service parameters. Under the precondition of general sameness capabilities of both Tô's and improved Tô's scheme, the new scheme adds some advantages such as providing multi-service capability, user's non-repudiation and data provider's no framing innocent users. Furthermore, it is also proved to be semantically secure under the decisional bilinear Diffie-Hellman problem (DBDH) assumption.
Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was prese...
详细信息
Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described:sitting in the middle, an adversary can play a "man-in-the-middle" attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.
A chaotic pseudorandom bit generator (PRBG) using n-dimensional NDF is proposed. To overcome the effects of finite wordlength to NDF and to hide its dynamic behavior, a coupling method followed by a quantization funct...
详细信息
A chaotic pseudorandom bit generator (PRBG) using n-dimensional NDF is proposed. To overcome the effects of finite wordlength to NDF and to hide its dynamic behavior, a coupling method followed by a quantization function is adopted. Detailed theoretical analyses show that the proposed PRBG has perfect cryptographic properties, and can be used to construct stream ciphers with higher security than other chaotic ciphers. Moreover, it is much faster than other chaotic pseudo random number generators due to the inherent parallel structure of NDF. Finally, some experiments are made for confirmation.
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr...
详细信息
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it.
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr...
详细信息
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it.
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failures and moreover we cannot prevent all...
详细信息
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failures and moreover we cannot prevent all faults and attacks. In this paper, we analyze a cluster system's ability to maintain the critical services even in face of faulty and intrusions with 4th Generation security Mechanism: Regeneration. The experiments have been demonstrated that the proposed mechanism can be used to analyze and proactively manage the effects of cluster network faults and attacks, and restore accordingly. The survivability level is greatly enhanced by the addition of functionality to targeted systems while maintaining the critical service and avoiding large incremental costs.
A new ID-based threshold signature scheme is proposed from bilinear pairings, based on our improved ID-based signature scheme. In our ID-based threshold signature scheme, the dishonest Private key Generator (PKG) can ...
详细信息
A new ID-based threshold signature scheme is proposed from bilinear pairings, based on our improved ID-based signature scheme. In our ID-based threshold signature scheme, the dishonest Private key Generator (PKG) can not impersonate any user at any time. We show that it is secure against existential forgeable on adaptively chosen message and ID attack under the random oracle. Compared with the previous scheme, it is shorter and more efficient with the same security.
E-lottery is a popular game for its convenience provided by the Internet. An e-lottery scheme based on voting is proposed. The scheme is publicly verifiable and the fairness can be guaranteed. Lottery players not only...
详细信息
E-lottery is a popular game for its convenience provided by the Internet. An e-lottery scheme based on voting is proposed. The scheme is publicly verifiable and the fairness can be guaranteed. Lottery players not only provide seed numbers to create the initial value of the lucky number, but also have an opportunity to change the intermediate value of the lucky number by means of voting. The new property of the scheme makes the lottery game more interactive and attractive to players. The anonymity of submitting the lottery ticket and casting the vote is achieved. Comparison with other existing e-lottery schemes is given.
A new traitor tracing scheme is proposed, whose essential idea is the session key S is divided into a sum of S1 and S2. Based on DL (discrete logarithm) problem, S1 is decrypted by introducing a multi-channel service ...
详细信息
A new traitor tracing scheme is proposed, whose essential idea is the session key S is divided into a sum of S1 and S2. Based on DL (discrete logarithm) problem, S1 is decrypted by introducing a multi-channel service parameter and a special polynomial function, S2 is decrypted by Chinese Remainder Theorem. The new scheme has many advantages such as multi-service, collusion-resistance, asymmetry, long-lived subscriber's key and black-box tracing. It is proved to be semantically secure under the DDH (Diffie-Hellman Problem) assumption and its whole capabilities are much better than that of the existing ones.
In order to improve attack detection rate and processing capability of intrusion detection system on high-speed environment, NP-NIDS: a high-speed intrusion detection system based on IXP2400 network processor is studi...
详细信息
In order to improve attack detection rate and processing capability of intrusion detection system on high-speed environment, NP-NIDS: a high-speed intrusion detection system based on IXP2400 network processor is studied, designed and implemented. Multi-processor, multi-process and RM communication mechanism are used and new decoded data structure, core functional modules and process schedule policies are designed to resolve bottleneck of seizing packet and speed detection and analysis. Performance is tested using Smartbit and real network traffic from network center of south China, availability and feasibility are validated.
暂无评论