国家自然科学基金(60903210)

作品数:4被引量:12H指数:2
导出分析报告
相关作者:刘峰李鹏苏小红马培军更多>>
相关机构:中科院信息工程研究所哈尔滨工业大学更多>>
相关期刊:《Science China(Information Sciences)》《电子学报》更多>>
相关主题:信息隐藏秘密共享方案图像视觉密码GROUP更多>>
相关领域:自动化与计算机技术电子电信更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-4
视图:
排序:
IK-CPA security implies IE-CCA security in the random oracle model
《Science China(Information Sciences)》2013年第3期175-185,共11页XUE Rui 
supported by the Fund of the China Scholarship Council,National Natural Science Foundation of China(Grants Nos.60873260,60903210);National High Technology Research and Development Program of China(Grant No.2009AA01Z414);National Basic Research Program of China(Grant No. 2007CB311202)
Key-privacy is a notion of security that is concerned with the key anonymity in public-key en- cryption. Some popular schemes keep key-privacy, while others do not. Key-privacy has been shown to be orthogonal to data-...
关键词:injective trapdoor functions IK-CPA security random oracle model IE-CCA security 
CMQV+:An authenticated key exchange protocol from CMQV被引量:2
《Science China(Information Sciences)》2012年第7期1666-1674,共9页LI Hui WU ChuanKun 
supported by National Basic Research Program of China (Grant No. 2007CB807902);Knowledge Innovation Project of the Chinese Academy of Sciences (Grant No. YYYJ-1013);National Nature Science Foundation of China (Grant No. 60903210)
Ustaoglu presents a secure and efficient key exchange protocol named CMQV, based on the design rationales of HMQV and NAXOS. Compared with the latter two protocols, on one hand, CMQV achieves high performance of HMQV,...
关键词:key exchange eCK model trapdoor-test technique provable security CDH assumption 
多重门限的图像秘密共享方案被引量:8
《电子学报》2012年第3期518-524,共7页李鹏 马培军 苏小红 刘峰 
国家自然科学基金(No.60903210)
针对传统的基于视觉密码的图像秘密共享方案存在像素扩张导致其只能共享小尺寸的秘密图像、信息隐藏效率较低的问题,提出一种能够提高信息隐藏容量的(t,k,n)多重门限图像秘密共享方案.该方案利用秘密图像信息控制视觉密码方案中共享矩...
关键词:信息隐藏 图像秘密共享 视觉密码 多重门限方案 
Dynamic tree-based authenticated group key exchange protocol被引量:2
《Science China(Information Sciences)》2010年第8期1591-1602,共12页LI Hui WU ChuanKun TENG JiKai 
supported by the National Basic Research Program of China (Grant No. 2007CB807902);the Knowledge Innovation Project of the Chinese Academy of Sciences (Grant No. YYYJ-1013);the National Natural Science Foundation of China (Grant No. 60903210)
Authenticated group key exchange protocols allow a group of users over a public network to establish a shared secret key for the subsequent cryptographic goals. In this paper, we extend BD-II scheme into a dynamic set...
关键词:tree-based group key exchange dynamic provable security 
检索报告 对象比较 聚类工具 使用帮助 返回顶部