首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
徐甜  宋强 《科技通报》2012,28(10):170-173
研究了适用于移动车载自组织网络的基于代理盲签名方案的移动节点认证技术.针对移动车载自组网在大规模节点组网和节点移动时,认证复杂且效率低下的问题,提出一种基于代理多重签名和盲签名的认证技术.该技术采用代理签名方案适应车载节点的移动性,代理多重签名解决节点间重复认证问题,采用盲签名方案适应了车载网分布式系统的复杂性和实现了车载节点间认证的交互性,最后采用基于DSA变形的代理盲签名方案避免伪造攻击,并给出认证系统体系结构和安全签名密钥发布模型.实验分析表明,该技术能够较好地适应车载节点的移动性和复杂性,在车载网安全性和认证效率上具有良好的性能.  相似文献   

2.
评一种高效的群签名   总被引:2,自引:0,他引:2  
群签名是对一般数字签名的一种扩展, 有很多重要应用. 最近提 出的一种高效的群签名, 被声称没有采用知识签名, 从而签名和验证的计算 量远远少于著名的ACJT 方案. 在本文中, 我们指出该方案其实采用了知识 签名, 但是由于使用上的不当, 使得该方案完全不安全, 即两个群成员合谋 就可以伪造出对任意消息的群签名, 且打开算法是无效的.  相似文献   

3.
基于离散对数问题给出了一类新型(tj,t,n)门限群签名方案,该类群签名方案与一般的群签名方案相比具有如下特点(1)各签名者可具有不同的权力;(2)可通过灵活设置参数得到满足不同应用需求的解决方案.同时还对这类方案的安全性进行了安全论证.  相似文献   

4.
提出了一种新型的数字签名方案,在此签名方案中只需要很小的在线工作量,具有较短的公钥与私钥,需要交换的信息量较小.此方案是基于分解大整数问题的困难性.  相似文献   

5.
基于离散对数问题给出了一类新型 (tj,t ,n)门限群签名方案 ,该类群签名方案与一般的群签名方案相比具有如下特点 :(1 )各签名者可具有不同的权力 ;(2 )可通过灵活设置参数得到满足不同应用需求的解决方案 .同时还对这类方案的安全性进行了安全论证  相似文献   

6.
在电子通讯中,签名私钥的安全性尤其重要,而解决这个问题的有效方法是把签名私钥分成若干部分并发放给多个私钥持有者.但是,通常来说在一般的门限签名中,要生成合法的签名,必然要有一定数量的私钥持有者参与签名.那么,这样的门限签名就不适用于服务器作为私钥持有者来参与门限签名.针对这个问题,本文提出一种高效的服务器协助门限签名方案.在该方案中,签名由用户提出,且用户持有的设备可以进行模指数运算.同时,只要新模集合能满足某些安全性质.方案中的模集合就能被新的模集合替换且不降低方案的安全性.  相似文献   

7.
一些特殊的数字签名因其本身具有特殊性,所以在把它们改造成为批量数字签名的时候往往就会出现问题.比如在把环签名改造成批量签名的时候,其原本具有的不可关联性往往就会丢失.基于澳大利亚学者C. J. Pavlovski与C. Boyd所提出的Bi-tree批量签名算法,本文给出了一个批量环签名方案,并对它的不可关联性进行了分析.  相似文献   

8.
给出了2种基于身份的类环签名方案,在该方案中签名者能够代表他属于的集合,但是,验证者却不能识别哪个成员的签名.对于一个攻击者而言,即使他拥有所有成员的密钥,他也不能决定是哪个成员签名,从而实现了无条件的匿名性.  相似文献   

9.
把Okamoto签名方案与多重签名方案结合起来,构造了一种Okamoto型广播多重签名方案。该方案有较高的安全性。  相似文献   

10.
一个有效且安全的群签名方案   总被引:4,自引:0,他引:4  
提出了一个有效的群签名方案 ,它的公开密钥与签名长度不随群成员数量的变化而变化 .该群签名方案在增加新成员时 ,无需修改群的公开密钥 .并且在RSA假设与决定性的Diffie Hellman假设下 ,群签名方案是安全的 ,且能够抵抗联合攻击 .  相似文献   

11.
介绍了电力调度数据网现状,分析了电力调度数据网第二平面总体网络结构,技术要求,主要业务,网络安全控制方案等,提出了电力调度数据网第二平面建设方案及业务系统的接入方式。  相似文献   

12.
标准模型下的抗选择密文攻击基于身份门限解密方案   总被引:1,自引:0,他引:1  
我们提出了两个有效的抗选择密文攻击的基于身份门限解密方案。在标准的决定性双线性Diffie-Hellman假设下,它们被证明可以抗选择密文攻击。第一个方案基于Boneh 和Boyen 提出的一个Selective IBE方案,另外一个方案基于Waters提出的Full IBE方案。与所基于的方案相同,前者的挑战身份要在公共参数选取之前确定,而后者的挑战身份可以由攻击者适应性地选取。据我们所知,以前的相关方案的安全性只能在随机预言机模型中得以证明。  相似文献   

13.
This paper proposes four resource (subcarriers-and-bits) allocation methods for OFDMA-based multiuser MIMO system. We employ adaptive modulation according to the channel state information (CSI) of each user to meet the symbol error rate (SER) requirement. The first scheme is based on transmit spatial diversity (TSD), in which the vector channel with the highest gain between the base station and specific antenna at remote terminal is chosen for transmission. The second scheme assigns subcarrier to the best user and employs spatial multiplexing on the MIMO system to further enhance the throughput. The space-division multiple-access (SDMA) scheme assigns single subcarrier simultaneously to the remote terminals with pairwise “nearly orthogonal” spatial signatures. In the fourth scheme, we propose to design the transmit beamformers based on the zero-forcing (ZF) criterion such that the multi-user interference (MUI) is completely removed. Moreover, spatial multiplexing technique is jointly exploited to achieve throughput multiplication. Numerical results demonstrate that all the proposed algorithms are simple and reliable and the fourth scheme is the best since all users are allowed to share single subcarrier.  相似文献   

14.
15.
In this paper, we propose a numerically robust blind equalization scheme to mitigate cochannel and intersymbol interferences and separate signals from a convolutive mixture in multiple-input multiple-output (MIMO) communication systems. The robustness of the proposed scheme is achieved through a particular dual-mode operation applied to a constant-modulus-based space-time algorithm that corrects phase rotations. In the first mode of operation, the consistency in the nonlinear estimates of the transmitted signals is ensured. In the second mode, the Euclidean norms of the equalizer coefficient vectors decrease along the iterations, which allows the algorithm to return to the first mode of operation, where the estimation of the transmitted signals really occurs. In particular, we apply this scheme to a multimodulus version of the multiuser Shalvi-Weinstein algorithm (MU-SWA). By means of a deterministic stability analysis assuming the persistence of excitation condition, we show that the dual-mode MU-SWA does not diverge.  相似文献   

16.
基于目前高师生培养的现状,采用把中学作为第二校园、中学教师进高校上课以及高校师生走进中学实践等方式,利用高校和中学力量联合培养高师生,提高高师生的培养质量。  相似文献   

17.
虞菊英 《科技广场》2005,(8):117-120
本文基于软开关PWM技术和并联均流技术,研究并设计了变电站电气二次系统中直流电源模块单元,提出了电源模块总体设计方案,采用移相控制器UC3875设计了移相控制电路,实现了变换器主功率管的软开关工作状态;研究设计了大功率MOSFET的驱动电路,能够满足100kHz开关频率的要求;运用均流控制芯片UC3907设计了电源模块的均流控制电路,使模块单元具有可并联功能,可以实现多模块并联组成更大功率的电源系统。  相似文献   

18.
This paper investigates finite-time formation control problems of heterogeneous multi-agent systems subject to mismatched and matched disturbances. The studied agents are modelled with both different orders and dimensions. To achieve the desired finite-time formation control goal, a novel signal generator based finite-time formation control scheme is proposed, which is composed of two parts. In the first part, a distributed finite-time signal generator is established to produce formation references for the agents in finite time. In the second part, based on finite-time observer technique and homogeneous systems theory, a kind of composite anti-disturbance controllers are constructed for the agents to track the formation references in finite time. In this way, the studied multi-agent system completes the desired finite-time formation control task. Compared with the existing results, the proposed control scheme solves the disturbed finite-time formation control problems with both different agents’ orders and dimensions, simplifies the formation controller design by using a modular design philosophy, and makes the agents have a plug and play feature. A simulation example is shown to validate the effectiveness of the proposed control scheme.  相似文献   

19.
Privacy-preserving collaborative filtering is an emerging web-adaptation tool to cope with information overload problem without jeopardizing individuals’ privacy. However, collaborative filtering with privacy schemes commonly suffer from scalability and sparseness as the content in the domain proliferates. Moreover, applying privacy measures causes a distortion in collected data, which in turn defects accuracy of such systems. In this work, we propose a novel privacy-preserving collaborative filtering scheme based on bisecting k-means clustering in which we apply two preprocessing methods. The first preprocessing scheme deals with scalability problem by constructing a binary decision tree through a bisecting k-means clustering approach while the second produces clones of users by inserting pseudo-self-predictions into original user profiles to boost accuracy of scalability-enhanced structure. Sparse nature of collections are handled by transforming ratings into item features-based profiles. After analyzing our scheme with respect to privacy and supplementary costs, we perform experiments on benchmark data sets to evaluate it in terms of accuracy and online performance. Our empirical outcomes verify that combined effects of the proposed preprocessing schemes relieve scalability and augment accuracy significantly.  相似文献   

20.
This paper considers the adaptive iterative learning control (ILC) for continuous-time parametric nonlinear systems with partial structure information under iteration-varying trial length environments. In particular, two types of partial structure information are taken into account. The first type is that the parametric system uncertainty can be separated as a combination of time-invariant and time-varying part. The second type is that the parametric system uncertainty mainly contains time-invariant part, whereas the designed algorithm is expected to deal with certain unknown time-varying uncertainties. A mixing-type adaptive learning scheme and a hybrid-type differential-difference learning scheme are proposed for the two types of partial structure information cases, respectively. The convergence analysis under iteration-varying trial length environments is strictly derived based on a novel composite energy function. Illustrative simulations are provided to verify the effectiveness of the proposed schemes.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号