ID-BASED

作品数:115被引量:172H指数:7
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:于代荣熊曾刚陈月辉杨扬李盛阳更多>>
相关机构:东北师范大学北京科技大学中国科学院光电研究院济南大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金广东省自然科学基金国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Journal of Electronic Science and Technologyx
条 记 录,以下是1-3
视图:
排序:
Improvement of an ID-Based Deniable Authentication Protocol
《Journal of Electronic Science and Technology》2018年第2期139-144,共6页Tzu-Chun Lin 
The deniable authentication protocol is an important notion that allows a receiver to identify the source of a given message, but not to prove the identity of the sender to a third party. Such property is very useful ...
关键词:Bilinear pairing deniable authentication DIFFIE-HELLMAN elliptic curves 
Pairing-Free ID-Based Key-Insulated Signature Scheme
《Journal of Electronic Science and Technology》2015年第1期33-38,共6页Guo-Bin Zhu Hu Xiong Zhi-Guang Qin 
supported by the National Natural Science Foundation of China under Grant No.61003230,No.61370026,No.61103206,and No.61300191;Chongqing Key Lab of Computer Network and Communication Technology under Grant No.CY-CNCL-2012-02
Without the assumption that the private keys are kept secure perfectly, cryptographic primitives cannot be deployed in the insecure environments where the key leakage is inevitable. In order to reduce the damage cause...
关键词:Identity-based cryptography KEY-INSULATED random oracle mode SIGNATURE 
ID-Based User Authentication Scheme for Cloud Computing被引量:1
《Journal of Electronic Science and Technology》2013年第2期221-224,共4页Ping-Liang Chen Jen-Ho Yang Ching-I Lin 
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an i...
关键词:ANONYMITY cloud computing identity-based scheme user authentication user identity. 
检索报告 对象比较 聚类工具 使用帮助 返回顶部