您的位置: 专家智库 > >

国家自然科学基金(60803149)

作品数:18 被引量:33H指数:4
相关作者:王保仓胡予濮张应辉马华巨春飞更多>>
相关机构:西安电子科技大学西京学院周口师范学院更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划浙江省自然科学基金更多>>
相关领域:自动化与计算机技术电子电信自然科学总论理学更多>>

文献类型

  • 18篇中文期刊文章

领域

  • 12篇自动化与计算...
  • 7篇电子电信
  • 1篇自然科学总论
  • 1篇理学

主题

  • 6篇密码
  • 5篇签名
  • 4篇信道
  • 3篇信息隐藏
  • 3篇数字签名
  • 3篇阈下信道
  • 3篇密码学
  • 3篇公钥
  • 3篇公钥密码
  • 2篇可证明安全
  • 2篇SECURE
  • 2篇CRYPTA...
  • 2篇IDENTI...
  • 2篇CRYPTO...
  • 1篇丢番图
  • 1篇丢番图逼近
  • 1篇信道模型
  • 1篇映射
  • 1篇有序多重签名
  • 1篇整数

机构

  • 8篇西安电子科技...
  • 4篇西京学院
  • 2篇周口师范学院
  • 1篇北京交通大学
  • 1篇长安大学
  • 1篇西安邮电学院
  • 1篇浙江万里学院
  • 1篇中国人民解放...

作者

  • 6篇王保仓
  • 3篇胡予濮
  • 3篇马华
  • 3篇张应辉
  • 2篇刘辉
  • 2篇巨春飞
  • 1篇田绪安
  • 1篇陈占伟
  • 1篇张襄松
  • 1篇王青龙
  • 1篇李晖
  • 1篇李骞
  • 1篇陈志罡
  • 1篇朱婷鸽
  • 1篇刘振华

传媒

  • 5篇The Jo...
  • 2篇计算机科学
  • 1篇哈尔滨理工大...
  • 1篇北京工业大学...
  • 1篇武汉大学学报...
  • 1篇计算机工程
  • 1篇电子科技大学...
  • 1篇计算机应用研...
  • 1篇通信技术
  • 1篇西安电子科技...
  • 1篇Journa...
  • 1篇Wuhan ...
  • 1篇Journa...

年份

  • 4篇2011
  • 11篇2010
  • 2篇2009
  • 1篇2008
18 条 记 录,以下是 1-10
排序方式:
Adaptively secure hierarchical identity-based signature in the standard model被引量:2
2010年
Hierarchical identity-based signature (HIBS) has wide applications in the large network. However,the existing works cannot solve the trade-off between the security and efficiency. The main challenge at present is to construct a high efficient and strong secure HIBS with a low computation cost. In this paper,a new construction of HIBS scheme is proposed. The new scheme achieves the adaptive security which is a strong security in the identity-based cryptography. But our scheme has short public parameters and the private keys size shrinks as the hierarchy depth increases. The signature size is a constant and the cost of verification only requires four bilinear pairings,which are independent of hierarchy depth. Furthermore,under the q-strong computational diffie-Hellman problem (q-SDH) assumption,the scheme is provably secure against existential forgery for adaptive chosen message and identity attack in the standard model.
ZHANG Le-youHU Yu-puWU Qing
对一个公钥密码体制的连分式攻击算法被引量:3
2010年
公钥密码是实现网络安全和信息安全的重要技术之一,而传统的公钥密码算法速度较慢。为克服这一缺点,一些快速公钥密码算法被提出。对其中一个快速公钥密码算法的安全性进行分析,指出该算法的解密无须通过整数分解,使用连分数算法就可以在多项式时间内求解出该方案的一个等价密钥,使用该等价密钥就能对任意密文进行解密。因此,该公钥密码算法是不安全的,从而提出一种新的连分式攻击算法,实验结果证明了该算法的有效性。
王保仓刘辉胡予濮
关键词:公钥密码体制密码分析
Correlation power analysis of DECIM~v2被引量:3
2011年
Power analysis has been a powerful and thoroughly studied threat for implementations of block ciphers and public key algorithms but not yet for stream ciphers. Based on the consumed power differences between two neighboring clock cycles, this paper presents a correlation power analysis (CPA) attack on the synchronous stream cipher DECIM^v2 (the tweaked version of the original submission DECIM). This attack resynchronizes the cryptographic device ceaselessly with many different initialization values (IVs) to obtain enough power traces. Then by modeling the statistical properties of the differential power traces with the correlation coefficients, the proposed attack algorithm can completely reveal the secret key of DECIM^v2. Furthermore, a simulation attack is mounted to confirm the validity of the algorithm. The results show that the entire secret key of DECIM^v2 can be restored within several minutes by performing 12 CPA attacks. It seems that there are still some defects in the design of DECIM^v2 and thus some further improvements should be made to resist the proposed attack.
JIA Yan-yanHU Yu-puZHAO Yong-binGAO Jun-tao
关键词:CRYPTOGRAPHYCRYPTANALYSISCPA
Identity-based Broadcast Encryption with Shorter Transmissions被引量:2
2008年
This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model.
张乐友胡予濮牟宁波
一种新的信息理论安全信道模型被引量:1
2010年
卫星信道模型是实现无条件安全的实用的模型之一,然而该模型却存在接收同步、通信成本高等缺点。为克服这些缺点,提出了虚拟卫星信道模型。该模型使用虚拟二元对称信道来实现对卫星信道的模拟,并仅使用比特异或运算来完成密钥协商的初始化过程,因此具有易实现、易同步、花费小、效率高等优点。证明了在虚拟卫星信道模型中,窃听者具有更大的接收信道误比特率。
王保仓刘辉胡予濮
关键词:密码学密钥协商初始化
基于RSA的广播加密方案被引量:6
2010年
提出一种基于RSA算法实现的广播加密方案,方案采用的是树形结构,密钥生成和分配过程简介,并且传输开销和存储开销与用户数量以及授权用户数量都没有关系,为常量级。与其它使用计算量较大的双线性映射构造的性能相同的方案相比较,本方案计算量较小。同时非授权用户不能通过共谋构造出一个不同的解密钥,即方案具有抗共谋性。方案能够实现对恶意共享解密钥的叛逆者的追踪。
王青龙朱婷鸽
关键词:广播加密叛逆者追踪双线性映射
Linear complexity of sequences produced by single cycle T-function
2011年
Four kinds of sequences generated by single cycle triangular function (T-function) are investigated to check the possibility for a single cycle T-function to be a cryptographic component in stream ciphers. Based on the special properties of single cycle T-function and an algorithm due to Wei, linear complexities of these four kinds of sequence are all acquired. The results show that single cycle T-function sequences have high linear complexity. Therefore, T-function satisfies the essential requirements being a basic component of stream cipher.
WANG YanHU Yu-puLI Shun-boYANG Yang
CCA2 secure biometric identity based encryption with constant-size ciphertext被引量:1
2011年
We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir's threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman proposed scheme has better efficiency and stronger security (DBDH) assumption. The comparison shows that the compared with the available Bio-IBE schemes.
Yang YANGYu-pu HULe-you ZHANGChun-hui SUN
关键词:IDENTITY-BASEDBIOMETRICENCRYPTION
Cryptanalysis of dragon scheme
2010年
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an algebraic method to attack the candidate dragon signature algorithm. The attack borrows the basic idea of the attack due to Kipnis and Shamir, and utilizes the underlying algebraic structure of the candidate dragon signature algorithm over the extension field to derive a way to enable the variable Y be viewed as a fixed value. The attack recovers the private keys efficiently when the parameters are n≤2s and D=[logq^d]≤3.
YUAN FengHU Yu-puWANG YanOU Hai-wen
关键词:CRYPTOGRAPHYPOLYNOMIALSCRYPTANALYSIS
Schnorr签名中的阈下信道及其封闭方法被引量:1
2010年
分析了阈下信道产生的原因及其在数字签名中的应用,对Schnorr签名中存在的宽带和窄带阈下信道进行了具体分析。设计了一个新的阈下信道封闭协议,新协议要求看守参与会话密钥的生成,确保会话密钥的随机性和隐私性。证明了新协议在保证签名者签名权力的前提下,完全封闭了Schnorr签名中由随机会话密钥所引入的阈下信道。新协议的安全性基于求解离散对数问题的困难性和哈希函数的安全性,在复杂度方面,签名者和看守各执行1次模指数运算。
张应辉马华王保仓
关键词:密码学数字签名信息隐藏公钥密码学阈下信道
共2页<12>
聚类工具0