首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17篇
  免费   0篇
  国内免费   2篇
教育   13篇
科学研究   5篇
信息传播   1篇
  2020年   1篇
  2019年   1篇
  2013年   2篇
  2011年   1篇
  2009年   1篇
  2008年   1篇
  2007年   2篇
  2006年   1篇
  2005年   1篇
  2004年   5篇
  2003年   1篇
  2002年   2篇
排序方式: 共有19条查询结果,搜索用时 31 毫秒
1.
Verifiable threshold signature schemes against conspiracy attack   总被引:3,自引:0,他引:3  
INTRODUCTIONDigitalsignaturesplayanimportantroleinourmodernelectronicsocietyduetotheirprop ertiesofintegrityandauthentication .Theinteg ritypropertyensuresthatthereceivedmessageisnotmodified ,andtheauthenticationpropertyensuresthatthesenderisnotimpersonated .Inwell knownthatinconventionaldigitalsigna tures,suchasRSAandDSA ,asinglesignerissufficienttoproduceavalidsignature;andthatanyonecanverifythevalidityofanygivensigna ture.However,onmanyoccasions,weneedtosharetheresponsibilityofsignin…  相似文献   
2.
Using the Wavelet as the Private Key for Encrypting the Watermark   总被引:1,自引:0,他引:1  
Watermarking is an effective approach to the copyright protection of digital media such as audio,image,and video.By inspriation from cryptography and considering the immensity of the set of all possible wvaelets,it is presented that in wavelet domain watermarking,the associated wavelet can be considered as the private key for encrypting the wavtermark so as to enhance the security of the embedded mark.This idea is partly supported by the fact that from computational complexity viewpoint.It is very time-consuming to search over the immense set of all candidate wavelets for the right one if no a priori knowledge is known about it .To verify our proposal,the standard image“Lena”is first watermarked in a specific wavelet domain,the watermark recovery experiments are then conducted in the wavelet domain for a set of wavelets with the one used for mark embedded in it ,separately.It follows from the experimetal results that the mark can be recovered only in the right wavelet domain,which jusstifies the suggestion.  相似文献   
3.
根据相关的国际标准归纳出一个解决电子商务交易中争议所必需的证据管理依据,提出证据管理的概念架构;同时,依据所应用的密码学方法环境和可信赖第三方参与的模式构建证据管理的基本流程和一般化参考模型。此架构能够在交易事件发生时产生、记录、传递、储存和检验证据,并在争议发生时,取出证据作为争议解决的依据。  相似文献   
4.
A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen's scheme.  相似文献   
5.
In this study, the author has designed new verifiable (t,n) threshold untraceable signature schemes. The proposed schemes have the following properties:(1) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants;(2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters ,such as the group secret key, and forge other member's individual signature;(3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.  相似文献   
6.
《密码学》是信息安全专业的一门重要的专业基础课,《密码学实验》是针对《密码学》课程里的主要密码算法和密码技术设置的一门独立实践课程。本文对该课程中实验内容的设计和实验类型的设置进行了总结分析,并从学时设定、实验类型、实验内容及实验方式等方面给出了几点改进的措施。  相似文献   
7.
为躲避杀毒软件等安全产品的检测,密码算法通常被用于病毒攻击过程中。从病毒加壳技术、通信加密技术和加密勒索技术3方面对密码算法在计算机病毒的应用方法进行分析,结合典型案例分析病毒常用的加密算法和攻击流程,并从病毒样本脱壳、加密流量识别和数据加密恢复等方面提出相应的病毒防御对策。最后,针对病毒攻击技术的发展趋势,提出下一步研究方向和需重点解决的技术问题。  相似文献   
8.
本文主要讨论加密技术的实现方法,并分析私钥加密方法和公钥加密方法各自的优劣之处.通过比较各种加密技术的特征,得出其各自的适用范围。并通过回顾现行的技术方案,展望加密技术的发展趋势。  相似文献   
9.
INTRODUCTION The concept of group signature, first introduced by Chaum and van Heyst (1992), allows each group member to sign messages on behalf of the group, and the receiver can use a group public key to verify the group signature, but cannot reveal the signer. In case of disputes, the group authority can open the group signature and identify the signer, but the outsider cannot identify all previous group signatures gener-ated by the same group member. A group member cannot impersonate…  相似文献   
10.
形如axn+byn+czn=0类不定方程解的判定,求解算法,及其解数的研究一直是国内外探讨的1个热门问题,迄今为止,还没有1个完美的结果.本文应用模分解理论,对于指数n=3给出了1个关于方程有解的1个判定定理,并对方程的解法进行了探讨.随着密码学与编码学的兴起和发展,数论的应用越来越广泛,因此研究此问题对推动数论的发展及其在密码及编码上的应用,都有一定的理论意义.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号