排序方式: 共有157条查询结果,搜索用时 15 毫秒
1.
LI Hui YANG Yi-xianInformation Security Center Beijing University of Posts Telecommunications Beijing P.R. China National Key Lab Beijing University of Posts Telecommunications Beijing P.R. China 《中国邮电高校学报(英文版)》2005,12(3)
1 Introduction TETRAsystemis a unified standard-based open sys-tem designed by European Telecommunications Stan-dards Institute(ETSI) in association with user organiza-tions, manufacturers ,testing and government authori-ties to satisfythe mobile communicationrequirements ofthe specialized institutions in all the European coun-tries .[1 ~4]A TETRAsystem supports many functionsonthe security field, which include authentication,airinterface encryption and end-to-end encryption.The au-then… 相似文献
2.
3.
4.
Based on the computational Diffie-Hellman problem, this paper proposes an identity-based authenticated key agreement protocol which removes bilinear pairings. Compared with previous protocols, the new protocol minimizes message exchange time with no extra cost. The protocol provides strong security guarantees including key compromise impersonation resilience, perfect forward secrecy, and master key forward secrecy. A security proof with the modular approach in the modified Bellare-Rogaway model is also provided. 相似文献
5.
Yu Long Author Vitae Kefei Chen Author Vitae Shengli Liu Author Vitae 《Computers & Electrical Engineering》2007,33(3):166-176
This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie-Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems. 相似文献
6.
Xiaofeng ChenWilly Susilo Fangguo ZhangHaibo Tian Jin Li 《Theoretical computer science》2011,412(39):5498-5512
In this paper, we first introduce the notion of identity-based trapdoor mercurial commitment which enjoys the advantages of both the identity-based trapdoor commitment and trapdoor mercurial commitment, while using the idea of “Customized Identity”. Inherently, an identity-based trapdoor mercurial commitment is an underlying building block for constructing identity-based (non-interactive) zero-knowledge sets. That is, a prover can commit to a set S in a way that reveals nothing about S and prove to a verifier, in zero-knowledge, statements of the form x∈S and x∉S. Besides, although the (non-interactive) proof is publicly verifiable, it is also bound to the identity of the prover in a way which is recognizable to any verifier. 相似文献
7.
Mihir Bellare Adriana Palacio 《Applicable Algebra in Engineering, Communication and Computing》2006,16(6):379-396
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing
schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large.
This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme
is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based
encryption (IBE) scheme [9], and exploits algebraic properties of the latter.
Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing
random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means
that the connection between key-insulated encryption and IBE is not accidental.
Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award.
Supported in part by an NSF graduate fellowship. 相似文献
8.
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem 总被引:1,自引:0,他引:1
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic curve cryptography for the users of mobile devices. We have analyzed the security aspects of the Yang and Chang's scheme and identified some security flaws. Also two improvements of the Yang and Chang's scheme have been proposed recently, however, it has been found that the schemes have similar security flaws as in the Yang and Chang's scheme. In order to remove the security pitfalls of the Yang and Chang and the subsequent schemes, we proposed an enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique. It supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability. In addition, the proposed scheme possesses low power consumption, low computation cost and better security attributes. As a result, the proposed scheme seems to be more practical and suitable for mobile users for secure Internet banking, online shopping, online voting, etc. 相似文献
9.
10.
针对随机预言模型下的签密密钥封装机制依赖现实世界无法实现的随机预言假设的问题,提出在标准模型下可证明安全的基于身份签密密钥封装机制(IBSC-KEM)。新提出的IBSC-KEM方案基于一种受到广泛研究的身份加密机制,在标准模型下被规约为求解q-ABDHE问题和判定性q-ABDHE问题,具有机密性和不可伪造性。新方案主要计算开销为5次群G上的指数运算、3次群GT上的指数运算和3次双线性对运算,与类似的签密方案比较,计算开销较低。此外,新方案还具有公开可验证性,适用于构建安全的端到端传输。 相似文献