我们介绍了一个密码协议的计算模型。
We present a model of computation for cryptographic protocols.
最后,提出了设计密码协议时应注意的两点策略。
Finally, two strategies to be paid attention to are put forward when cryptographic protocol is designed.
密码协议分析与设计的基础是对其进行形式化建模。
The formal modeling for cryptographic protocols, namely security protocols, is the basis of their analysis and design.
分布式乘法计算协议是应用很广泛的基础密码协议。
Distributed multiplication computation protocols are widely used as basic cryptographic protocols.
类BA N逻辑是一种用于分析密码协议安全性的逻辑。
BAN family of logic is used to analyze the security of cryptographic protocols.
串空间理论是一种新兴的用于密码协议形式化分析的方法。
Strand space theory is a method for stating and proving correctness properties for cryptographic protocols.
此算法对基于多重取幂密码协议的快速运作是很有效用的。
The algorithm is useful to speed up the operation for some cryptographic protocols based on multiple exponentiation.
第三部分,应用推广的构造攻击方法指导密码协议的设计。
The third part is to apply generalized constructing attack method to guide design of cryptographic protocols.
因此密码协议设计和密码协议分析是信息安全领域的难题。
The design and analysis of cryptographic protocols are notoriously complex and error prone.
盲签名体制是保证参与者匿名性的基本的、重要的密码协议。
Blind signature schemes, an important cryptographic primitive, are useful in protocols that guarantee the anonymity of the participants.
众所周知,设计正确而安全的密码协议是一项容易出错的任务。
It is well known that designing correct and secure cryptographic protocols is an error-prone task.
本文主要研究双线性配对函数在构造新的密码协议方面的应用。
This paper mainly does some research in applications of constructing new cryptographic protocols with bilinear pairings.
其次,分析方法与密码协议和攻击者能力的具体形式化描述无关;
The formalism is independent of the concrete formalization of a protocol or attackers' possible behaviors.
利用RS码和两锁密码协议构造了一种非对称的公钥叛逆者追踪方案。
By applying RS code and two-locks cipher protocol, this paper constructs an asymmetric public key traitor tracing scheme.
人们提出了多种密码协议的分析方法,BAN类逻辑是其中重要的一种。
There are many ways proposed to analyze the security protocol, the BAN-like logic is one of the important ways.
工作表明基于博弈的ATL逻辑比传统的CTL更适合于描述和分析密码协议。
These works indicate that the ATL logic based on game is more suitable to describe and analyze cryptographic protocols than traditional CTL.
这个协议解决了可信第三方的性能瓶颈问题,是一个更为有效的、安全的密码协议。
It is a more efficient and secure protocol, which solves the bottleneck problem of trusted third party.
密码协议必须满足安全属性的需求,对密码协议进行形式化规范需要证明其满足该属性。
The cryptographic protocol should always satisfy security properties, so the formal specification should give the corresponding proof method.
形式化分析由于其精炼、简洁和无二义性逐步成为分析密码协议的一条可靠和准确的途径。
Because of its compactness, fineness and unambiguity, formal analysis of cryptographic protocol has been an efficient and correct method step by step.
本文对这三种密码协议的执行时间、结构特性以及实现分析的软件复杂度给出了客观的评估。
The thesis also objectively evaluates the performance of time delay, structure properties and software complexity of the above three cryptographic protocols.
这一结果表明基于身份的数字签名方案可以作为安全的密码原语用于构建更复杂的密码协议。
This result shows that an identity-based signature scheme can be used as a primitive block to design more complicated cryptographic protocols.
结果表明,利用符号模型检测方法分析并发现密码协议重放攻击的漏洞是一种行之有效的方法。
Results show that the method using symbol model checker can discover replay attacks upon some cryptographic protocols and is effective.
目前,密码系统中大量地使用基于公钥的密码协议,这些协议的安全性直接影响着网络系统的安全。
Today we have seen more and more public key protocols use in networked and distributed systems, so we must select an secure public key protocol otherwise it will jeopardy the secrecy of networks.
采用近世代数和时序逻辑的方法定义了形式化描述语言,并形式化地描述了密码协议的分层安全需求。
Using temporal logic and algebra, a formal requirement language was presented and used to describe the formal hierarchy requirements for cryptographic protocols.
利用形式化分析密码协议的方法来检测密码协议中潜在的安全漏洞,已成为密码学中一个新的研究方向。
It is a new study direction of cryptograph that detecting potential flaws in cryptographic protocols using formal analysis of cryptographic protocol.
本文提出了接收签字的概念,同时给出了一种具体实现接收签字的密码协议,并对其安全性进行了讨论。
First, the paper proposes the idea of received signature. Then, a practical realization of received signature protocol is given.
椭圆曲线密码体制最主要的运算就是椭圆曲线上的标量乘和多标量乘,在各种密码协议中起到了核心作用。
The main operations of elliptic curve cryptosystem are scalar multiplication and multi-scalar multiplication for a pair of integers.
在两方密码协议运行模式分析法的基础上,利用模型检测的理论结果,提出了三方密码协议运行模式分析法。
Based on the model checking theory, we derive the running mode analysis method of three party cryptographic protocols from the running mode analysis method of two party cryptographic protocols.
TransportLayerSecurity (TLS)是一种密码协议,可以在客户机和服务器之间提供安全的通信。
Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication between clients and servers.
设计了一种基于ECDH协议的数字签名方案,使其不仅具有基于椭圆曲线密码协议的优点,而且提高了签名与验证的速度。
A digital signature scheme is designed based on ECDH protocol. It has some excellences about elliptic curve crypto-protocol and it improves speed of signature and validate.
应用推荐