国家自然科学基金(60573030)

作品数:12被引量:21H指数:3
导出分析报告
相关作者:陈克非郭鑫洪璇龙宇蔡英更多>>
相关机构:上海交通大学北京信息工程学院更多>>
相关期刊:《计算机学报》《Wuhan University Journal of Natural Sciences》《Chinese Journal of Electronics》《计算机工程》更多>>
相关主题:BASEDSCHEMEKEY本原元本原多项式更多>>
相关领域:自动化与计算机技术电子电信化学工程更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
A Fully Collusion Resistant Public Key Trace and Revoke Scheme with Dynamic Registration and Revocation
《Chinese Journal of Electronics》2009年第2期347-354,共8页LIU Shengli WENG Jian CHEN Kefei LI Xiangxue 
This work is supported by the National Natural Science Foundation of China (No.60873229, No.60673077, No.60673076, No.60573030, No.60703031), the National 863 High-Technology Project (No.2006AA01Z422) and 973 Program (No.2007CB311201).
We present a new public key trace and revoke scheme, which is suitable for scenarios where users need to join or leave the system frequently. The proposed scheme supports public traceability and dynamic registration a...
关键词:Broadcast encryption Traitor tracing Fully collusion resistant. 
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
《Journal of Shanghai Jiaotong university(Science)》2009年第1期81-85,共5页韩玮 郑东 陈克非 
the National Laboratory for Modern Communications(No.51436050304JW0317);the National Natural Science Foundation of China(No.60573030)
Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity co...
关键词:wireless local area network (WLAN) temporal key integrity protocol (TKIP) substitution box (S- box) 
求解本原多项式的快速算法被引量:7
《计算机工程》2008年第15期146-147,189,共3页郭鑫 陈克非 
国家自然科学基金资助项目(60573030)
本原元和本原多项式是有限域理论中的2个重要的概念。本原元的求解问题是解决实际密码序列问题的前提条件,而本原元的求解问题又可以归结为本原多项式的求解问题。该文结合求解最小多项式的方法给出一个在二元有限域上本原多项式的求解...
关键词:有限域 本原元 本原多项式 最小多项式 陪集 
Parallel Key-insulated Signature: Framework and Construction被引量:2
《Journal of Shanghai Jiaotong university(Science)》2008年第1期6-11,共6页翁健 陈克非 李祥学 刘胜利 邱卫东 
The National Natural Science Foundation of China (No. 90704003, 60573030, 60673077, 60703030)
To deal with the key-exposure problem in signature systems, a new framework named parallel key-insulated signature (PKIS) was introduced, and a concrete PKIS scheme was proposed. Compared with traditional key-insulate...
关键词:key-exposure parallel key-insulation SIGNATURE bilinear pairings random oracle 
Pirate decoder for the broadcast encryption schemes from Crypto 2005被引量:2
《Science in China(Series F)》2007年第3期318-323,共6页WENG Jian LIU ShengLi CHEN KeFei 
the National Natural Science Foundation of China (Grant Nos. 60303026, 60573030, and 60673077)
In Crypto'05, Boneh et al. presented two broadcast encryption schemes. Their work has exciting achievements: the header (also called ciphertexts) and the private keys are of constant size. In their paper, they giv...
关键词:broadcast encryption pirate decoder traitor tracing 
基于.NET的程序自动测试系统的设计与实现
《计算机应用》2007年第B06期283-285,共3页蔡英 
国家自然科学基金资助项目(60573030);北京市教委科技发展计划项目(KM200610772005);北京市属市管高校人才强教计划资助项目(PXM2007_014224_044676);教改资助项目(校教改05B008)
首先介绍程序自动测试系统的实现背景,提出了一种使用进程的输入输出重定向来实现程序自动测试的方案。详尽描述了系统模型、详细设计,重点介绍了实现的关键技术,并使用Visual C++.NET实现了Windows平台上的自动测试程序。
关键词:程序自动测试系统 NET平台 进程输入输出重定向 
LFSR-based Ring Signature Scheme被引量:3
《Chinese Journal of Electronics》2007年第3期397-400,共4页ZHENG Dong LI Xiangxue CHEN Kefei 
This work is partially supported by the National Natural Science Foundation of China (No.60473020, No.60573030) and by NLMCSFC (No.9140C1103010602).
To reduce the key sizes and bandwidth, public-key cryptographic systems have been proposed using d-th order characteristic sequences generated by a Linear feedback shift register (LFSR). The paper proposes an LFSR-b...
关键词:Characteristic sequence Linear feedback shift register Ring signature State based discrete logarithm problem 
Trust Based Pervasive Computing被引量:2
《Wuhan University Journal of Natural Sciences》2006年第6期1477-1480,共4页LI Shiqun Shane Balfe ZHOU Jianying CHEN Kefei 
Supported by the National Natural Science Foun-dation of China (60573030 ,60303026 ,60473020) ;the Institutefor Infocomm Research 21 Heng Mui Keng Terrace ,Singapore .
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC...
关键词:trusted computing pervasive computing pervasive computing security 
一种新的基于身份选择密文安全的门限解密方案(英文)被引量:2
《计算机学报》2006年第9期1679-1687,共9页龙宇 陈克非 洪璇 
国家自然科学基金(60303026,60473020,60573030);NLMC基金(51436040405JW0304)资助.
该文提出了一种具有完备安全性的、基于身份的门限解密方案IB-ThDec.方案的安全性可以规约到四元双线性Diffie-Hellman判定问题上.我们在随机预言模型下给出了方案的安全性证明.此外,我们指出IB-ThDec方案可以应用到无证书体制和基于身...
关键词:门限解密 基于身份的密码学 自适应选择密文攻击 基于配对的密码学 
ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
《Journal of Shanghai Jiaotong university(Science)》2006年第2期127-133,共7页龙宇 陈克非 刘胜利 
NationalNaturalScienceFoundationofChina(Nos.60303026,60573030,90104005and60303026)andtheFoundationofNLMC(No.51436040405JW0304)
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext...
关键词:threshold decryption identity-based cryptology publicly checkable encryption 
检索报告 对象比较 聚类工具 使用帮助 返回顶部