There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop...
详细信息
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper proposes a forward secure proxy blind signature scheme which employs the key evolution mechanism in a newly proposed proxy blind signature scheme. The security of proxy blind signature and the forward security are both analyzed in the proposed scheme. Even if the current signature key is compromised, the attacker cannot forge signatures as if they had been generated before the key leakage. That is to say, signatures signed before the leakage are still valid.
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ...
详细信息
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in electronic payment. An abuse-freeness electronic payment protocol for real goods is proposed in this paper. The protocol has the abuse-freeness by introducing a trusted third party and using the concurrent signature and it has prevented both sides in payment to originate and terminate protocol maliciously. At the same time fairness and security are also achieved in the proposed protocol.
The proposing of concurrent signatures makes it the truly fairness to both participants. Compared with the finite field, conic curves have advantages of embedding plaintext 'conveniently, easy points operating, an...
详细信息
The proposing of concurrent signatures makes it the truly fairness to both participants. Compared with the finite field, conic curves have advantages of embedding plaintext 'conveniently, easy points operating, and fast in speed etc. Based on these superiorities of the conic curves, a new concurrent signature protocol on conic curve over ring Z n is proposed in this paper. It has higher efficiency than the one proposed by Chen L. Furthermore, the scheme is also based on the large number factorization and discrete logarithm in conic curves, so it has the same security.
Diversity techniques are very effective tools to increase signal reception quality in Rayleigh fading channels. A novel space-time block coding method for cooperative relay networks is proposed which guarantees full d...
详细信息
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When...
详细信息
In order to respond to algebraic attacks, it is important to construct Boolean functions with high algebraic immunity of the graphs. In this paper, the complicated problem of algebraic immunity of the graph is convert...
详细信息
ISBN:
(纸本)9789881701282
In order to respond to algebraic attacks, it is important to construct Boolean functions with high algebraic immunity of the graphs. In this paper, the complicated problem of algebraic immunity of the graph is converted to the simpler problem of annihilators of the single-output assistant function. Based on this, we propose a new method for constructing single-and multi-output Boolean functions with high algebraic immunity of the graphs. This method can also give many more general single-output Boolean functions with maximum algebraic immunity.
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt...
详细信息
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us...
详细信息
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quant...
详细信息
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quantum secret sharing can be divided into QSS of classical messages and QSS of quantum information, QSS of classical messages can be divided into QSS of classical messages based on entanglement and QSS of classical messages without entanglement, the representative protocols in three main branches of the quantum secret sharing schemes and its latest development were introduced, also prospect analysis of the schemes' future development was given.
Insider attacks is a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who take advantage of familiarity with the computational environment and abuse their pri...
详细信息
暂无评论