共查询到18条相似文献,搜索用时 31 毫秒
1.
王尚平 《信息安全与通信保密》1990,(4)
本文分析了概率加密体制的弱点,提出了一种新的公钥体制:RSA-概率公钥密码体制。新体制克服了概率加密体制可被系统内主动窃听者破译和不具备数字签名的弱点,使概率加密体制达到实用保密的目的。 相似文献
2.
公钥密码体制研究与进展 总被引:10,自引:2,他引:10
公钥密码体制的思想是密码史上一个重要的里程碑。本文详细的介绍了公钥密码体制的研究发展及实现应用,其中着重讨论了目前已有的几个比较重要的、有代表性的公钥密码体制如RSA、ECC、XTR的攻击现状,介绍了它们长期的安全性、标准化及其实现状况。最后我们简单的介绍了最近所提出的一些公钥密码体制如基于辫群的密码体制,量子公钥密码体制等。 相似文献
3.
4.
5.
6.
7.
王丽萍 《信息安全与通信保密》2000,(2):45-47
基于Lucas序列和文献[1]中三阶Fibonacci-Lucas序列提出了两种类似于Diffie-Hellman体制的公钥分配密码体制. 相似文献
8.
基于Fibonacci-Lucas序列的两种公钥分配密码体制 总被引:1,自引:0,他引:1
王丽萍 《信息安全与通信保密》2000,(2)
基于Lucas序列和文献[1]中三阶Fibonacci-Lucas序列提出了两种类似于Diffie-Hellman体制的公钥分配密码体制。 相似文献
9.
10.
11.
Jiang Zhengtao Hao Yanhua Wang Yumin 《电子科学学刊(英文版)》2005,22(5):490-497
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed. 相似文献
12.
This paper deals with the problem of generating RSA moduli having a predetermined set of bits. It would appear to be of practical interest if one could construct their modulus so that, for example, some of the bits are the ASCII representation of their identification information (i.e., name, address, etc.). This could lead to a savings in both bandwidth for data transmission and storage. A theoretical question which arises in connection with this is to determine the maximum number of bits which can be specified so that the modulus can be determined in polynomial time and, of course, security is maintained. 相似文献
13.
In this paper, we particularly deal with no Fp‐rational two‐torsion elliptic curves, where Fp is the prime field of the characteristic p. First we introduce a shift product‐based polynomial transform. Then, we show that the parities of (#E – 1)/2 and (#E’ – 1)/2 are reciprocal to each other, where #E and #E’ are the orders of the two candidate curves obtained at the last step of complex multiplication (CM)‐based algorithm. Based on this property, we propose a method to check the parity by using the shift product‐based polynomial transform. For a 160 bits prime number as the characteristic, the proposed method carries out the parity check 25 or more times faster than the conventional checking method when 4 divides the characteristic minus 1. Finally, this paper shows that the proposed method can make CM‐based algorithm that looks up a table of precomputed class polynomials more than 10 percent faster. 相似文献
14.
为增强安全性,基于双难题的签名方案相继被提出,如基于离散对数和素因子分解问题的签名方案,其安全目标是只要一个难题未被攻破,方案就是安全.分析表明:如果因子分解问题可解,杨刚和李艳俊提出的基于双难题的方案(YL)将被攻破;如果离散对数问题可解,LI和CHEN的方案(LC)不能抵抗伪造攻击.文中提出一种新的签名方案,该方案是真正同时基于双难题的,并能将消息恢复.通过分析,与其它方案相比,更加高效. 相似文献
15.
In view of the shortcomes of conventional ElectroCardioGram (ECG) compression algo- rithms,such as high complexity of operation and distortion of reconstructed signal,a new ECG compression encoding algorithm based on Set Partitioning In Hierarchical Trees (SPIHT) is brought out after studying the integer lifting scheme wavelet transform in detail.The proposed algorithm modifies zero-tree structure of SPIHT,establishes single dimensional wavelet coefficient tree of ECG signals and enhances the efficiency of SPIHT-encoding by distributing bits rationally,improving zero-tree set and ameliorating classifying method.For this improved algorithm,floating-point com- putation and storage are left out of consideration and it is easy to be implemented by hardware and software.Experimental results prove that the new algorithm has admirable features of low complexity, high speed and good performance in signal reconstruction.High compression ratio is obtained with high signal fidelity as well. 相似文献
16.
In this letter, we present a new speech hash function based on the non‐negative matrix factorization (NMF) of linear prediction coefficients (LPCs). First, linear prediction analysis is applied to the speech to obtain its LPCs, which represent the frequency shaping attributes of the vocal tract. Then, the NMF is performed on the LPCs to capture the speech's local feature, which is then used for hash vector generation. Experimental results demonstrate the effectiveness of the proposed hash function in terms of discrimination and robustness against various types of content preserving signal processing manipulations. 相似文献
17.