oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

时间不限

2019 ( 1 )

2018 ( 21 )

2017 ( 13 )

2016 ( 36 )

自定义范围…

匹配条件: “基于认证加密” ,找到相关结果约5495条。
列表显示的所有文章,均可免费获取
第1页/共5495条
每页显示
利用双线性映射构建高效身份认证方案
屈步云,刘连浩
计算机应用 , 2009,
Abstract: ?基于双线性映射以及椭圆曲线上的离散对数难题,提出了一种认证过程中不需要密钥生成中心介入的用户间身份认证方案,并扩展到有多个密钥生成中心的情形。该方案与已有方案相比具有更少的计算量与通信次数,且实现了双向认证;最后证明所提出的方案在椭圆曲线离散对数难解假设下能有效抵抗伪造用户攻击,冒充攻击和重放攻击,具有较好的安全性。
基于认证的高效公钥加密算法
康立,唐小虎,范佳
电子学报 , 2008,
Abstract: 2003年,Gentry提出基于认证的公钥加密方案.在基于认证的公钥加密方案中,第三方对认证申请者的公钥和/或身份进行签名,并将签名作为认证发送给申请者,申请者保存该认证作为解密时的部分私钥.接收方对密文解密需要同时拥有第三方对其公钥和/或身份的认证和接收方公钥对应的私钥,因此基于认证的加密方案同时具备基于身份加密方案的公钥可认证性和传统公钥方案中的私钥免撤销性.本文提出一种高效、紧凑的基于认证的公钥混合加密算法,新算法能在非随机预言机模型下被证明满足选择密文攻击安全.
Study of identity-based encryption and origin authentication for grid
网格中基于身份的源可认证加密系统研究

WANG Bin,CHENG Ying,
王滨
,程英

计算机应用研究 , 2009,
Abstract: By analyzing the security of an existent system-identity-based encryption system for grid,the system was pointed out that it had some secure leak.To solve the problems of authenticating the user's identity,this paper proposed a new scheme was based on identity-based encryption.This system not only can protect data's confidentiality and integrality but also can authenticate the origin's identity.
基于IBE和指纹认证的FIBE方案
江为强,杨义先,李亮
北京邮电大学学报 , 2006, DOI: 10.13190/jbupt.2006s2.19.315
Abstract: 为了解决基于身份加密的IBE(Identity-BasedEncryption)方案中用户向可信第三方TA(TrustedAutho-rity)证明身份及私钥安全传送等问题,提出了基于IBE与指纹认证技术的FIBE(FingerprintIdentity-BasedEncryption)方案,首次将指纹匹配算法运用于网络身份认证体系中,解决了IBE存在的四个问题,且指纹特征值得到了保护。用户双方在认证过程中TA不需在线,适合于垂直认证环境。
一种基于身份的可否认认证协议的改进
北京工业大学学报 , 2011,
Abstract: 为了满足非交互式的可否认认证协议的安全评估,将密钥泄漏(key-compromiseimpersonation,KCI)安全属性重新定义为发送方密钥泄漏(senderkey-compromiseimpersonation,SKCI)安全属性,并针对Cao方案存在的发送方密钥泄漏攻击问题,提出一种改进,该方案同原方案相比减少了6次对运算且通信双方的交互次数减少了2次.另外,与同类Liao的改进方案相比,本文方案不需要增加签名机制即可实现身份认证且同时满足可认证性、否认性和发送方密钥泄漏安全性.
Efficient identification scheme with bilinear map
利用双线性映射构建高效身份认证方案

LIU Lian-hao,QU Bu-yun,
刘连浩
,屈步云

计算机应用 , 2009,
Abstract: Concerning the discrete logarithm problem of elliptic curve and bilinear mapping,an identification scheme was proposed,and then it was extended to multi-KGC situation.The proposed scheme required less computation and communication than the existing ones and realized mutual authentication.Given the condition of the intractability of the elliptic curve discrete logarithm problem,the proposed scheme was proved secure against forged user attack,impersonation attack and replay attack.
网格中基于分层的身份加密系统研究
黄胜,蒋外文
计算机应用 , 2008,
Abstract: ?研究了当前网格安全发展的现状,分析了身份加密(ibe)和公钥加密(pke)算法的优缺点,从网格计算的特点和发展出发,提出了一个分层的基于身份的网格加密系统方案,并对其安全性和效率进行了分析。
Study of Secure E-mail System Realizing Two way Authentication
实现双向认证的安全电子邮件系统的研究

ZHOU Jian-guo,YAN Pu-liu,LI Kai,
周建国
,晏蒲柳,李凯

计算机应用研究 , 2004,
Abstract: This paper analyzes the disadvantages, especially the disadvantages in communication mechanism about some secure E-mail protocols, and puts forward an on line authentication secure E-mail system framework based on certificate authority, and expatiates the realization of the two-way not denying or disavowing authentication mechanism while sending or receiving E-mail.
Identity-based end-to-end authentication and key agreement protocol in mobile communication
一种移动环境下的基于身份的端到端认证和密钥协商协议

SHAO Lin,LI Hui,YANG Yi-xian,
邵琳
,李晖,杨义先

计算机应用研究 , 2008,
Abstract: This paper provided a new authentication mechanism used identity in virtue of the concept of ECC,based on the existing authentication and key agreement mechanism of mobile communication.This scheme not only provided the function of bidirectional authentication and key agreement between users,but also suited the computational requirement of mobile terminals and reduced the complexity of security system.Thus,this mechanism lays a foundation for extensive practical application of end-oend encryption in mobile communication.
IPSec网络安全构架
徐竹冰
计算机系统应用 , 2000,
Abstract: IPSec是网络层的安全协议标准,它提供了IP层上的多种安全服务。本文对IPSec的工作原理、工作模式,及其主要的两个安全协议进行了分析。
第1页/共5495条
每页显示


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.