ID-BASED

作品数:115被引量:172H指数:7
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:于代荣熊曾刚陈月辉杨扬李盛阳更多>>
相关机构:东北师范大学北京科技大学中国科学院光电研究院济南大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金广东省自然科学基金国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Chinese Journal of Electronicsx
条 记 录,以下是1-6
视图:
排序:
RYY^(++): A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol被引量:1
《Chinese Journal of Electronics》2015年第2期332-337,共6页LI Yang ZHU Jianming ZHANG Ning WANG Xiuli ZHANG Yaoqi 
supported by the National Natural Science Foundation of China(No.61272398);National Social Science Foundation of China(No.13AXW010);Foundation of Science and Technology on Information Assurance Laboratory(No.KJ-14-008);Discipline Construction Foundation of Central University of Finance and Economics
Based on revisiting the RYY+Identitybased(ID-Based) key agreement protocol, we find it's vulnerable to Intermediate results leakage(IRL) and Keycompromise impersonation(KCI) attack. A novel protocol called RYY++is pro...
关键词:Authenticated KEY AGREEMENT ID-BASED Provable security Se CK model 
A New ID-based Multi-Recipient Public-key Encryption Scheme被引量:1
《Chinese Journal of Electronics》2013年第1期89-92,共4页PANG Liaojun GAO Lu PEI Qingqi GUI Jingjing WANG Yumin 
This work is supported by the National Natural Science Foundation of China (No.60803151, No.61103178).
Multi-recipient public-key encryption can be used to solve the security issue of One-To-Many com-munications such as secure broadcast. In a multi-recipient public-key encryption scheme, a ciphertext generated by the s...
关键词:Multi-recipient public-key encryption Secure broadcasts ID-based public-key cryptosystem. 
nID-based Internet of Things and .Its Application in Airport Aviation Risk Management被引量:7
《Chinese Journal of Electronics》2012年第2期209-214,共6页NING Huansheng HU Sha HE Wei XU Qunyu LIU Hong CHEN Weishi 
Manuscript Received Mar. 2011; Accepted Apr. 2011. This work is jointly supported by the National Natural Science Foundation of China (NSFC) and Civil Aviation Administration of China (CAAC) (No.61079019).
Internet of Things (IoT) is attracting in- tensive attention. Currently, most existing IoT systems heavily rely on the identification (ID) number of each ob- ject/thing referred as ID-based IoTs. However, in many ...
关键词:Internet of Things (IoT) hiD things hiD-based IoT Radar sensing Aviation security~ Riskmanagement 
Attack on Libert et al.'s ID-Based Undeniable Signature Scheme被引量:7
《Chinese Journal of Electronics》2008年第4期748-750,共3页LI Zichen YAN Yunsheng ZHANG Juanmei 
In 2004, Libert and Quisquater proposed an identity based undeniable signature scheme using pairings over elliptic curves. In this paper, we show that the scheme is not secure. In other words, if a signer reveal a pai...
关键词:ID-based cryptography Undeniable signature Attck Bilinear pairings. 
ID-Based Group-Oriented Proxy Signature and Blind Signature from Pairings
《Chinese Journal of Electronics》2006年第1期12-16,共5页CHEN Xiaofeng ZHANG Fangguo 
This work is supported by the National Natural Science Foundation of China(No.60403007 and No.60503006) and Natural Science Foundation of Guangdong Province, China (No.04205407).
Multi-proxy signature and blind multisignature are two important group-oriented signatures. Multi-proxy signature allows the original signer delegate his signing power to a group of proxy signers. Blind multisignature...
关键词:Multi-proxy signature Blind multisignature Bilinear pairings Identiy (ID)-based cryptography 
Identity Based Threshold Proxy Signature被引量:6
《Chinese Journal of Electronics》2006年第1期183-186,共4页XU Jing ZHANG Zhenfeng FENG Dengguo 
This work is supported by the National Grand Fundamental Research 973 Program of China (No.G1999035802), the National Natural Science Foundation of China (No.60373039), the National Science Fund of China for Distinguished Young Scholars (No.60025205).
Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting' especially when efficient key management and moderate security are required, in a (t, n) thres...
关键词:Identity-based (ID-based) signatures Threshold proxy signatures Bilinear pairings 
检索报告 对象比较 聚类工具 使用帮助 返回顶部