期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Digital signature systems based on smart card and fingerprint feature 被引量:3
1
作者 You Lin Xu Maozhi Zheng Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期825-834,共10页
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one. 展开更多
关键词 digital signature fingerprint feature error-correcting code cryptographic key smart card
在线阅读 下载PDF
Using the Wavelet as the Private Key for Encrypting the Watermark
2
作者 何小帆 《Journal of Chongqing University》 CAS 2002年第1期16-20,共5页
Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, i... Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, it is presented that in wavelet domain watermarking, the associated wavelet can be considered as the private key for encrypting the watermark so as to enhance the security of the embedded mark. This idea is partly supported by the fact that from computational complexity viewpoint, it is very time-consuming to search over the immense set of all candidate wavelets for the right one if no a priori knowledge is known about it. To verify our proposal, the standard image 'Lena' is first watermarked in a specific wavelet domain, the watermark recovery experiments are then conducted in the wavelet domain for a set of wavelets with the one used for mark embedded in it,separately. It follows from the experimental results that the mark can be recovered only in the right wavelet domain, which justifies the suggestion. 展开更多
关键词 Digital watermark WATERMARKING CRYPTOGRAPHY Private key cryptographic system WAVELET Daubechies wavelet
在线阅读 下载PDF
Integration of quantum key distribution and highthroughput classical communications in fielddeployed multi-core fibers
3
作者 Qi Wu Domenico Ribezzo +23 位作者 Giammarco Di Sciullo Sebastiano Cocchi Divya Ann Shaji Lucas Alves Zischler Ruben Luis Paolo Serena Chiara Lasagni Alberto Bononi Tetsuya Hayashi Alessandro Gagliano Paolo Martelli Alberto Gatto Paola Parolari Pierpaolo Boffi Davide Bacco Alessandro Zavatta Yixiao Zhu Weisheng Hu Zhaopeng Xu Mark Shtaif Andrea Marotta Fabio Graziosi Antonio Mecozzi Cristian Antonelli 《Light: Science & Applications》 2025年第10期2955-2970,共16页
Quantum key distribution(QKD)is a secure communication method for sharing symmetric cryptographic keys based on the principles of quantum physics.Its integration into the fiber-optic network infrastructure is importan... Quantum key distribution(QKD)is a secure communication method for sharing symmetric cryptographic keys based on the principles of quantum physics.Its integration into the fiber-optic network infrastructure is important for ensuring privacy in optical communications.Multi-core fibers(MCFs),the likely building blocks of future high-capacity optical networks,offer new opportunities for such integration.Here,we experimentally demonstrate,for the first time,the coexistence of discrete-variable QKD and high-throughput classical communication in the C-band over a fielddeployed MCF with industry standard cladding diameter of 125μm.Specifically,we demonstrate successful secure-key establishment in one core of a 25.2-km uncoupled-core MCF,while simultaneously loading the remaining three cores with full C-band counter-propagating classical traffic at an aggregate net rate of 110.8 Tb/s.By proposing and experimentally validating an improved analytical model for inter-core spontaneous Raman scattering noise,we find that this configuration is optimal for our deployed MCF link as it is immune to four-wave mixing,that becomes relevant when the quantum and classical signals are propagating in the same direction.Our findings make an important step forward in demonstrating the integration of QKD and classical transmission in uncoupled-core multicore fibers for next-generation optical communication networks. 展开更多
关键词 sharing symmetric cryptographic keys quantum key distribution qkd multi core fibers high throughput classical communication inter core spontaneous raman scattering noise discrete variable qkd quantum key distribution building blocks
原文传递
An Efficient Key Assignment Scheme Based on One—Way Hash Function in a User Hierarchy 被引量:3
4
作者 Tzer-ShyongChen Yu-FangChung 《Journal of Computer Science & Technology》 SCIE EI CSCD 2003年第2期210-213,共4页
In order to solve the problems resulted from dynamic access control in a userhierarchy, a cryptographic key assignment scheme is proposed by Prof. Lin to promote the performingability and to simplify the procedure. Ho... In order to solve the problems resulted from dynamic access control in a userhierarchy, a cryptographic key assignment scheme is proposed by Prof. Lin to promote the performingability and to simplify the procedure. However, it may cause the security in danger as the userchanges his secret key; besides, some secret keys may be disclosed due to the unsuitable selectionof the security classes' identities. Through setting up a one-way hash function onto Lin's scheme,the proposed modification can greatly improve the security of Lin's scheme. 展开更多
关键词 cryptography access control cryptographic key assignment one-way hashfunction user hierarchy
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部