the National Natural Science Foundation of China(Grant Nos.60673079,60773086 and 60572155)
This paper proposes a method to construct new kind of non-maximal imaginary quadratic order (NIQO*) by combining the technique of Diophantine equation and the characters of non-maximal imaginary quadratic order. It...
the National Natural Science Foundations of China (Nos. 60673079 and 60572155)
Commitment scheme is a basic component of many cryptographic protocols, such as coin-tossing, identification schemes, zero-knowledge and multi-party computation. In order to prevent man-in-middle attacks, non-malleabi...
the National Natural Science Foundation of China(Grant Nos.60373087,60673071and 60572155);the National High-Tech Development 863 Progranm of China(Grant No.2006AA01Z442)
The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive ...
Supported by the National Natural Science Founda-tion of China (60225007, 60572155) and the Science and Technology Research Project of Shanghai (04DZ07067)
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (C...
Supported by the National Natural Science Foun-dation of China (60572155) ;the National Natural Science Founda-tion of China for Distinguished Young Scholars (60225007)
The security issue is always the most important concern of networked client-server application. On the putpose to build the secure group communication among of a group of client users and one server, in this paper, we...
Supported by the National Natural Science Foun-dation of China (60572155) ;the National Nature Science Founda-tion of China for Distinguished Young Scholars (60225007)
In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not ne...