KEY-INSULATED

作品数:16被引量:21H指数:3
导出分析报告
相关领域:自动化与计算机技术电子电信更多>>
相关作者:茹鹏彭代渊伍前红王育民王继林更多>>
相关机构:西南交通大学西安电子科技大学更多>>
相关期刊:《Journal of Electronics(China)》《信息安全与通信保密》《Computer Modeling in Engineering & Sciences》《Frontiers of Computer Science》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划中国博士后科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
《Computer Modeling in Engineering & Sciences》2024年第1期903-915,共13页Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao 
This work was supported in part by the National Natural Science Foundation of China(Nos.62072074,62076054,62027827,62002047);the Sichuan Science and Technology Innovation Platform and Talent Plan(Nos.2020JDJQ0020,2022JDJQ0039);the Sichuan Science and Technology Support Plan(Nos.2020YFSY0010,2022YFQ0045,2022YFS0220,2023YFG0148,2021YFG0131);the YIBIN Science and Technology Support Plan(No.2021CG003);the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar...
关键词:KEY-INSULATED SM2 algorithm digital signature Industrial Internet of Things(IIoT) provable security 
Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test
《Journal of Computer and Communications》2020年第12期197-213,共17页Seth Alornyo Mustapha Adamu Mohammed Bright Anibrika Selorm Kodzo Pious Akwasi Sarpong Michael Asante 
Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment...
关键词:Identity-Based Encryption Equality Test Parallel Key-Insulated 
Pairing-Free Certificateless Key-Insulated Encryption with Provable Security
《Journal of Electronic Science and Technology》2018年第1期50-56,共7页Li-Bo He Dong-Jie Yan Hu Xiong Zhi-Guang Qin 
in part by the National Natural Science Foundation of China under Grants No.61003230,No.61370026,No.61300191,and No.61202445
Certificateless encryption attracts a lot of attention so far by eliminating the key escrow problem in identity-based encryption and public key certificates in the traditional public key cryptography. By considering t...
关键词:Certificateless cryptography keyinsulated pairing-free random oracle 
Pairing-Free ID-Based Key-Insulated Signature Scheme
《Journal of Electronic Science and Technology》2015年第1期33-38,共6页Guo-Bin Zhu Hu Xiong Zhi-Guang Qin 
supported by the National Natural Science Foundation of China under Grant No.61003230,No.61370026,No.61103206,and No.61300191;Chongqing Key Lab of Computer Network and Communication Technology under Grant No.CY-CNCL-2012-02
Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage cause...
关键词:Identity-based cryptography KEY-INSULATED random oracle mode SIGNATURE 
Key-insulated aggregate signature被引量:1
《Frontiers of Computer Science》2014年第5期837-846,共10页Huiyan ZHAO Jia YU Shaoxia DUAN Xiangguo CHENG Rong HAO 
This research was supported by the National Natural Science Foundation of China (Grant Nos. 61272425, 61170021, 61202475), Qingdao Science and Technology Development Project (12-1-4-2-(16)-jch, 13-1-4-151-jch), Huawei Technology Fund (YB2013120027), the Founda- tion of China Scholarship Council, Shandong Provincial Key Laboratory of Computer Network (SDKLCN-2013-03), the Open Research Fund from the State Key Laboratory of Information Security, the Open Project Foun- dation of Shandong Provincial Key Laboratory of Software Engineering (2013SE01), and China Postdoctoral Science Foundation (2014M551870).
In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulate...
关键词:aggregate signature key-insulated aggregatesignature provable security bilinear pairings 
Key-insulated encryption based group key management for wireless sensor network被引量:2
《Journal of Central South University》2013年第5期1277-1284,共8页邱卫东 周耀伟 朱博 郑燕飞 龚征 
Project(61100201) supported by National Natural Science Foundation of China;Project(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China;Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,China;Project(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...
关键词:wireless sensor network data encryption group key management forward security key-insulated encryption 
Identity-based threshold key-insulated signature被引量:3
《High Technology Letters》2012年第3期275-280,共6页Chen Jianhong Chen Kefei Long Yu 
Supported by the National Natural Science Foundation of China (No. 60970111, 61133014, 60903189, 60903020).
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ...
关键词:threshold key-insulated SIGNATURE random oracle model 
An Efficient Threshold Key-Insulated Signature Scheme
《Journal of Shanghai Jiaotong university(Science)》2011年第6期658-662,共5页陈剑洪 龙宇 陈克非 王永涛 李祥学 
the National Natural Science Foundation of China (Nos.60970111,60903189 and 60903020);the National High Technology Research and Development Program (863) of China (No.2009AA01Z418);the National Basic Research Program (973) of China(No.2007CB311201)
To tackle the key-exposure problem in signature settings,this paper introduces a new cryptographic primitive named threshold key-insulated signature(TKIS) and proposes a concrete TKIS scheme.For a TKIS system,at least...
关键词:threshold key-insulation SIGNATURE random oracle model 
Identity-Based Key-Insulated Proxy Signature Without Random Oracles
《Journal of Shanghai Jiaotong university(Science)》2011年第5期557-566,共10页陈剑洪 龙宇 陈克非 王永涛 
the National Natural Science Foundation of China (Nos. 60970111, 60903189 and 60903020);the National High Technology Research and Development Program (863) of China (No. 2009AA01Z418);the National Basic Research Program (973) of China (No. 2007CB311201)
In an identity based proxy signature (IBPS) scheme, a designated proxy signer can generate the signature on behalf of an original signer. Traditional IBPS schemes normally rely on the assumption that private keys are ...
关键词:KEY-INSULATED proxy signature IDENTITY-BASED standard model 
Certificateless Strong Key-Insulated Signature Without Random Oracles被引量:1
《Journal of Shanghai Jiaotong university(Science)》2011年第5期571-576,共6页万中美 孟祥芹 洪璇 
the National Natural Science Foundation of China (Nos. 61003215, 61005049, 60903178 and 61103183);the Fundamental Research Funds for the Central Universities (No. 2010B09614);the Foundation of HoHai University (No. 2084/409265)
It is important to ensure the private key secure in cryptosystem. To reduce the underlying danger caused by the private key leakage, Dodis et al. (2003) introduced the notion of key-insulated security. To handle the p...
关键词:KEY-INSULATED key leakage CERTIFICATELESS bilinear pairings 
检索报告 对象比较 聚类工具 使用帮助 返回顶部