首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
2.
周福才  林龙  王金营  徐剑 《通信学报》2006,27(10):69-73
利用椭圆曲线离散问题对数问题的难解性,给出了基于椭圆曲线密码体制的(t,n)门限秘密共享方案。基于门限秘密共享方案一般分为需要SDC和不需要SDC两类,在分布式环境下,一个被所有成员信任的SDC并不存在,不需要SDC的门限秘密共享方案的安全性得到很大的提高,该方案中由组成员共同生成群公钥和私有密钥。并给出了当新成员加入时,无SDC下的周期密钥分片的更新方案。还给出了一个本方案数据实例,最后对本方案的安全性进行了分析。  相似文献   

3.
Based on Shamir's threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant's secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other participants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each participant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir's threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.  相似文献   

4.
基于RSA密码体制(t,n)门限秘密共享方案   总被引:10,自引:2,他引:10  
基于RSA密码体制,提出了一个新的(t,n)门限秘密共享方案.在该方案中,秘密份额由各参与者自己选择,秘密分发者不知道每个参与者所持有的份额,而且秘密份额长度与秘密长度相同.在秘密恢复过程中,每个参与者能够验证其他参与者是否进行了欺骗.每个参与者只需维护一个秘密份额,就可以实现对多个秘密的共享.方案的安全性是基于RSA密码体制和Shamir的(t,n)门限秘密共享方案的安全性.  相似文献   

5.
基于RSA密码体制(t,n)门限秘密共享方案   总被引:5,自引:0,他引:5  
基于RSA密码体制,提出了一个新的(t,n)门限秘密共享方案。在该方案中,秘密份额由各参与者自己选择,秘密分发者不知道每个参与者所持有的份额,而且秘密份额长度与秘密长度相同。在秘密恢复过程中,每个参与者能够验证其他参与者是否进行了欺骗。每个参与者只需维护一个秘密份额,就可以实现对多个秘密的共享。方案的安全性是基于RSA密码体制和Shamir的(t,n)门限秘密共享方案的安全性。  相似文献   

6.
7.
8.
基于离散对数的动态(k,n)-门限方案   总被引:4,自引:0,他引:4  
该文给出了一个基于离散对数的动态(k,n)一门限方案,它具有下述特点:(1)每个成员的子密钥可无限制地多次使用;(2)能够确认欺骗者;(3)当某个成员的子密钥泄密时,系统只须为该成员重新分配子密钥而不必更改其它成员的子密钥;(4)系统可以很方便地增加或删除一个成员;(5)恢复系统密钥时,采用并行过程。  相似文献   

9.
李大伟  杨庚 《通信学报》2010,31(7):128-135
为了提高可更新秘密共享方案中影子秘密的更新效率,基于单向散列链的特性,提出了一种新型可更新秘密共享方案.该方案使用单向散列链构造更新多项式,避免了生成随机多项式带来的计算开销.秘密共享实现过程基于IBE公钥体制,具有良好的安全性能.影子秘密验证基于有限域上离散对数难解问题,能有效避免参与者欺骗.理论分析和仿真结果显示该方案能在保证安全性的前提下显著提高影子秘密更新的效率.  相似文献   

10.
11.
提出了两种彩色图像的(n,n).分存方案,解密过程仅需要执行XOR运算。这两种方案重构密图的复杂度与可视分存方案等价,更为重要的是该方案没有像素膨胀,并且重构密图的质量优于彩色可视分存方案。  相似文献   

12.
Scaling is an important operation because of the iterative nature of arithmetic processes in digital signal processors (DSPs). In residue number system (RNS)–based DSPs, scaling represents a performance bottleneck based on the complexity of inter‐modulo operations. To design an efficient RNS scaler for special moduli sets, a body of literature has been dedicated to the study of the well‐known moduli sets {2n ? 1, 2n, 2n + 1} and {2n, 2n ? 1, 2n+1 ? 1}, and their extension in vertical or horizontal forms. In this study, we propose an efficient programmable RNS scaler for the arithmetic‐friendly moduli set {2n+p, 2n ? 1, 2n+1 ? 1}. The proposed algorithm yields high speed and energy‐efficient realization of an RNS programmable scaler based on the effective exploitation of the mixed‐radix representation, parallelism, and a hardware sharing technique. Experimental results obtained for a 130 nm CMOS ASIC technology demonstrate the superiority of the proposed programmable scaler compared to the only available and highly effective hybrid programmable scaler for an identical moduli set. The proposed scaler provides 43.28% less power consumption, 33.27% faster execution, and 28.55% more area saving on average compared to the hybrid programmable scaler.  相似文献   

13.
Visual cryptography scheme (VCS) shares a binary secret image into multiple shadows, only qualified set of shadows can reveal the secret image by stacking operation. However, VCS suffers the problems of low visual quality of the revealed image and large shadow size. A (t, k, n) XOR-based visual cryptography scheme (XVCS) shares the secret image into n shadows including t essentials and n-t non-essentials. A qualified set of shadows contains any k shadows including t essentials. The revealing process is implemented by XOR operation on the involved shadows. In this paper, we propose a construction method for (t, k, n)-XVCS with essential shadows. The secret image can be revealed perfectly, and the shadow size is small compared with VCS. Theoretical analysis and experimental results show the security and effectiveness of the proposed scheme.  相似文献   

14.
组合星图的最优生成树   总被引:1,自引:0,他引:1  
文章解决了组合星图生成树的构造问题。首先给出了组合星图的定义及其重要的拓扑性质.然后采用构造方法获得了组合星图的一棵高度为D(Sn,k)的生成树,并给出了相应的算法,其中D(Sn,k)为组合星图的直径。该生成树具有最优的高度,且是一棵贪婪树。  相似文献   

15.
The magnetic anisotropy of a 40-nm-thick (Ga,Mn)As film with 5% Mn grown on GaAs(1 1 3)A is studied by means of magnetotransport and ferromagnetic resonance (FMR) spectroscopy. In addition to the cubic and a weak uniaxial in-plane anisotropy, two uniaxial out-of-plane contributions along [1 1 3] and [0 0 1] are found. Using the anisotropy parameters determined from FMR, the longitudinal and transverse resistivities measured as a function of magnetic field orientation and strength are well modelled within the framework of a single ferromagnetic domain. In particular, the low-field data which are strongly affected by sudden jumps of the magnetization are well reproduced.  相似文献   

16.
《Organic Electronics》2008,9(1):111-118
The electronic structure at the interfaces of 3,4,9,10-perylene tetracarboxylic dianhydride (PTCDA) and the metal surfaces Au(1 1 1), Ag(1 1 1) and Cu(1 1 1) was investigated using ultraviolet photoelectron spectroscopy (UPS). By combining these results with recent X-ray standing wave data from PTCDA on the same substrates clear correlation between the electronic properties and the interface geometry is found. The charge transfer between the molecule and the metal increases with decreasing average bonding distance along the sequence Au–Ag–Cu. Clear signatures of charge-transfer-induced occupied molecular states were found for PTCDA on Ag(1 1 1) and Cu(1 1 1). As reported previously by Zou et al. [Y. Zou et al., Surf. Sci. 600 (2006) 1240] a new hybrid state was found at the Fermi-level (EF) for PTCDA/Ag(1 1 1), rendering the monolayer metallic. In contrast, the hybrid state for PTCDA/Cu(1 1 1) was observed well below EF, indicating even stronger charge transfer and thus a semiconducting chemisorbed molecular monolayer. The hybridisation of molecular and Au electronic states could not be evidenced by UPS.  相似文献   

17.
A new type of (Ga,Mn)As microstructures with laterally confined electronic and magnetic properties has been realized by growing (Ga,Mn)As films on -oriented ridge structures with (1 1 3)A sidewalls and (0 0 1) top layers prepared on GaAs(0 0 1) substrates. The temperature- and field-dependent magnetotransport data of the overgrown structures are compared with those obtained from planar reference samples revealing the coexistence of electronic and magnetic properties specific for (0 0 1) and (1 1 3)A (Ga,Mn)As on a single sample.  相似文献   

18.
GF(2n)域上的一种Ⅱ型优化正规基乘法器及其FPGA实现   总被引:1,自引:0,他引:1       下载免费PDF全文
方冰  樊海宁  戴一奇 《电子学报》2002,30(Z1):2045-2048
有限域GF(2n)上的椭圆曲线密码体制以其密钥短,安全强度高的优点正在获得广泛的重视和应用.该密码体制最主要的运算是有限域上的乘法运算.本文提出了一种基于Ⅱ型优化正规基的乘法器,该乘法器具有Massey-Omura乘法器的优点,又避免了其不足,易于编程,适合FPGA实现.实验表明,该算法简单,快速.  相似文献   

19.
We report on the pulsed-laser deposition of high-K praseodymium oxide films onto Si(1 0 0) surfaces by laser-ablating a sintered Pr6O11 target. Optical microscope, SEM, and AFM investigations reveal two kinds of PrxOy-surface structures, which are identified as: (a) large-scaled particles, and (b) ordered structures (rods) of different size with different orientations. The size of the particles increases with laser wavelength. The size of the ordered surface structures strongly depends on the substrate temperature. For the first time, we show characteristic Pr-Raman signals which confirm the crystalline quality of the grown layer. They also indicate that the silicon layer at the Si–PrxOy interface is under compressive stress.  相似文献   

20.
Copper(I) halides are emerging as attractive alternatives to lead halide perovskites for optical and electronic applications. However, blue-emitting all-inorganic copper(I) halides suffer from poor stability and lack of tunability of their photoluminescence (PL) properties. Here, the preparation of silver(I) halides A2AgX3 (A = Rb, Cs; X = Cl, Br, I) through solid-state synthesis is reported. In contrast to the Cu(I) analogs, A2AgX3 are broad-band emitters sensitive to A and X site substitutions. First-principle calculations show that defect-bound excitons are responsible for the observed main PL peaks in Rb2AgX3 and that self-trapped excitons (STEs) contribute to a minor PL peak in Rb2AgBr3. This is in sharp contrast to Rb2CuX3, in which the PL is dominated by the emission by STEs. Moreover, the replacement of Cu(I) with Ag(I) in A2AgX3 significantly improves photostability and stability in the air under ambient conditions, which enables their consideration for practical applications. Thus, luminescent inks based on A2AgX3 are prepared and successfully used in anti-counterfeiting applications. The excellent light emission properties, significantly improved stability, simple preparation method, and tunable light emission properties demonstrated by A2AgX3 suggest that silver(I) halides may be attractive alternatives to toxic lead halide perovskites and unstable copper(I) halides for optical applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号