共查询到17条相似文献,搜索用时 78 毫秒
1.
2.
在分析了以太网无源光网络(EPON)网络中存在的安全隐患基础上,针对EPON网络中存在的安全问题,根据双向认证加密方案及技术路线,提出了一个抗MAC帧窃听和重放攻击的混合加密双向认证方案。该方案在不增加成本的基础上,全面地保障了EPON系统数据的安全,同时也满足了不同用户的需求,系统有一定的实用意义。 相似文献
3.
在已有研究的基础之上,实现了一种基于有限域上的离散对数问题(DLP)的自认证多接收者签密方案.方案避免了公钥系统中的证书存在问题和密钥托管问题,为具有多名合法接收者的签密问题提供了有效的解决途径,算法简单,安全性高,适合于在实际中应用. 相似文献
4.
5.
结合代理签密和自认证签密的理论,构造了一个基于pairings的自认证多接收者代理签密方案.由于用户公钥具有自认证性,无需权威机构签发证书,同时用户私钥也只有自己知道,因此,与已有文献相比,此方案具有很好的安全性和实用性. 相似文献
6.
7.
8.
9.
有机集成广义指定验证者签名和自认证签密的思想,提出了一个基于DLP的自认证广义指定验证者签密方案,方案的困难性基于有限域上的离散对数问题.所提方案不仅能够保护签密持有者的隐私,而且消除了证书存在问题和密钥托管问题.由于新方案具有通信代价低、计算量少和安全性强等优点,在电子商务和电子政务活动中将具有重要应用. 相似文献
10.
11.
基于扩展OAM认证规程,总结了逻辑标识认证与静默功能的实现方式.通过比较标准定义与实际应用,分析了ONU对应不同认证状态的点灯情况,并结合工程应用实例进行了探讨总结. 相似文献
12.
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive chosen cipher text attack (IND-CCA2) security and strongly existential unforgeability against chosen message attack (SUF-CMA) security respectively in terms of confidentiality and authentication based on the problem of learning with errors on ring.The size of the public and private keys was optimized by the construction on the ring.The complex trapdoor generation and preimage sample calculation was avoided by the structure without trapdoor.Efficiency analysis and experiment shows that RLWE-SC has better computational and communication performance than other similar lattice-based signcryption schemes with the same security strength. 相似文献
13.
14.
Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes, it is found that the improved scheme can effectively resist conspiracy attack and forgery attack, but does not have semantic security and public verification function, and sends threshold signcryption by the secret secure channel, which increases the communication costs and potential safety hazards of the system. A new group-oriented publicly verifiable threshold signcryption scheme is proposed on the basis of the improved scheme, the new scheme overcomes the drawbacks of the improved scheme, which not only provides with semantic security and public verification function, but also can send threshold signcryption by the public channel. 相似文献
15.
针对现有基于椭圆曲线密码(elliptic curve cryptography,ECC)体制的 RFID(radio frequency identification device)安全认证方案不能满足相互认证、隐私保护和前向安全性等要求,提出一种基于Montgomery型椭圆曲线密码的认证方案。利用Montgomery型椭圆曲线来降低计算量,并提供标签和服务器之间的相互认证,具有匿名性和前向安全性。通过分析表明,该方案能够抵抗重放攻击、标签伪装攻击、服务器欺骗攻击、DoS攻击、位置跟踪攻击和克隆攻击。与现有方案相比,该方案在保证较低的内存、计算和通信需求的情况下,提供了较高的安全性能,能够满足RFID系统的安全性要求。 相似文献
16.
NGUYEN L H在博弈论思想的指导下来对身份认证协议进行了修改,协议参与方在进行协议交互之前以一定的概率α来发送无用数据,使得攻击者攻击协议所获得的收益比不攻击协议所获得的收益还要小,以此保证了协议的安全性。但该方案存在2个缺陷:考虑的攻击者过于强大,且仅仅考虑了其收益,忽略了其发起攻击所要消耗的代价;没有考虑诚实节点在什么条件下才会选择发送无用数据。针对这2个缺陷对NGUYEN L H方案进行改进,给出了更具有一般意义的α值。同时引入了攻击概率β,给出了诚实节点发送无用数据的前提条件以及在不同的β值下α的取值范围。相对于原方案,改进方案的结论更具有一般性,且更全面。同时,通过 P2P下面的一个具体案例分析证明了所提结论的正确性。 相似文献
17.
In order to solve the problem of secure transmission of messages with multiple receivers,a code-based generalized signcryption scheme with multi-receiver was designed.Firstly,a multi-encrypted McEliece scheme that can meet the security of IND-CCA2 was designed.Combined with the CFS signature scheme,the multi-receiver signcryption and generalized signcryption scheme based on code were designed.The security analysis shows that the multi-receiver generalized signcryption scheme can meet the security of IND-CCA2 in terms of confidentiality and can meet EUF-CMA security in terms of unforgeability.Compared with other similar multi-receiver signcryption schemes,the proposed scheme does not include exponential,bilinear pairing operations,etc.,and has high computational efficiency and the advantage of anti-quantum computing.Compared with the method of signing-then-encrypting method,the proposed scheme has the smaller private key and higher efficiency. 相似文献