This paper proposes a signer-traceable ring signcryption scheme.
提出一种可追踪签名者的环签密方案。
And the signcryption scheme has been applied to our developed CNC system.
其中签密方案已在所设计数控系统上实现。
This paper proposes an identity-based proxy signcryption scheme from bilinear pairings.
该文应用双线性对提出一个基于身份的代理签密方案。
Based on the signcryption scheme, this paper proposed a new secret transferring protocol.
基于新签密方案,提出一种一对多的秘密传输协议。
Analysis shows that this proposal meets the safety and high efficiency requirement of Signcryption.
分析表明,该方案满足签密的安全性要求并具有更高的效率。
Therefore, the proposition could be more applicable especially when used in long-message signcryption.
故,尤其在长消息签密中,方案能够更好的满足应用需求。
Based on identity and bilinear pairing on the Elliptic Curve, a new multi-signcryption scheme is proposed.
基于身份和椭圆曲线上双线性对,提出了一种新的多重签密方案。
To overcome this weakness, the threshold technology was used to devise a secure ID-based signcryption scheme.
为了克服这一缺陷,本文使用门限技术设计了一个安全的身份基签密方案。
But signcryption schemes cannot provide forward secrecy and public verifiability as the traditional method does.
然而签密方案不能像传统方法那样同时提供前向安全性和可公开验证性。
Several convertible signcryption schemes with semantic security based on elliptic curve cryptosystem are proposed.
基于椭圆曲线密码体制建立了几个具有语义安全的可转换签密方案。
Several convertible signcryption schemes with semantic security based on elliptic curve cryptosystem were proposed.
基于椭圆曲线密码体制建立了几个具有语义安全的可转换签密方案。
So we propose an analogous protocol based on semi-anonymous XTR signcryption algorithm, which is evaluated at last.
最后对该协议的安全性、计算量和通信量进行了评估。
Three attacks on Yu Gang et al's scheme to show that their forward secure proxy-signcryption scheme based on identity is insecure.
给出了三种攻击并指出于刚等人提出的前向安全的基于身份的代理签密方案是不安全的。
To meet this demand, based on bilinear pairing and attribute-based cryptosystem, we build up an attribute-based signcryption scheme.
为满足这样的需求,我们利用双线性配对的特性结构以及基于属性的密码体制结构,定义了基于属性的签密方案。
We proposed a series of signcryption, proxy signature, proxy signcryption, multi-proxy signature scheme etc. from bilinear pairings.
由于双线性对在密码学中的广泛应用,已提出了许多基于双线性对密码体制。
A secure multi-party multiplication protocol using the techniques of signcryption and oblivious transfer has been proposed and analyzed.
将签密技术和不经意传递技术结合起来提出了一个基于签密的安全多方乘积协议,并对其进行了分析。
Digital signcryption is a new kind of digital signature which integrates public key encryption and signature simultaneously in a logic step.
数字签密是一种带加密功能的数字签名,它是公钥加密算法和数字签名在更高层次上的结合。
A secure and efficient multi-round electronic auction scheme is presented using a new secret sharing scheme and the technique of signcryption.
利用一个新的秘密分享方案和签密技术,提出了一个安全、高效的多轮电子拍卖方案。
An ID-based multi-message and multi-receiver signcryption algorithm was proposed, which could simultaneously signcrypt lots of messages for lots of receivers.
提出了一个基于身份的多消息多接收者的签密算法,新算法可同时为多个接收者对多个消息进行签密。
Aiming at an identity-based signcryption scheme for multi-receiver beginning with the security attribute, this paper studies the security property of this scheme.
针对一个多接收者基于身份签密方案,从签密方案的安全属性入手,分析其安全性。
Finally, a Signcryption Scheme based on Bilinear Pairings is designed according to the Bilinear Pairings of elliptic curve, and put into use in security Email system.
最后,在上述研究基础上,结合椭圆曲线的双线性对,设计了一个基于身份的签密方案,并将其应用于安全电子邮件系统中。
By integrating the concepts of self-certified public key and signcryption, a secure and efficient self-certified signcryption scheme from bilinear pairings is proposed.
综合自认证公钥体制和签密思想,使用双线性对提出一个安全高效的自认证签密方案。
The new protocol satisfies all the requirements of the confidentiality and unforgeability by signcryption protocol, and it can defend against all those current attacks.
该协议满足数字签密协议的机密性、不可伪造性等要求,并能抵抗目前情况下的各种攻击。
We modify existing W-B signcryption scheme so that it can be used by certified email protocols, and based on the modified scheme we propose a new certified email protocol.
基于修改过的W - B签密方案,该文设计出一种带有离线的、透明可信的第三方认证邮件协议。
In this model, the forwarding nodes could identify the integrity of the received information and the validity of the forwarding path according to the signcryption of previous nodes.
该模型中,中间节点根据前驱节点的签密信息鉴别转发数据的完整性,验证转发链路的真实性。
Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.
安全分析结果表明,与L - L - C - Z门限代理签密协议相比,该改进门限代理签密协议能够承受接收方公钥替换攻击。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
应用推荐