期刊文献+
共找到730篇文章
< 1 2 37 >
每页显示 20 50 100
Proxy signature scheme for ID-based original signers and certificate-based proxy signers
1
作者 辛向军 孙垒 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期318-321,共4页
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o... To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem. 展开更多
关键词 proxy signature id-based cryptosystem bilinear pairings
在线阅读 下载PDF
基于区块链的PKI和IBC组合身份认证方案
2
作者 王艳春 谢诗港 袁琪 《电子科技》 2025年第8期19-26,共8页
文中提出了基于区块链的PKI(Public Key Infrastructure)和IBC(Identity-Based Cryptography)组合身份认证方案,利用区块链去中心化和防篡改特点解决了传统基于PKI技术中存在的单点故障问题以及多CA(Certificate Authority)互信难问题,... 文中提出了基于区块链的PKI(Public Key Infrastructure)和IBC(Identity-Based Cryptography)组合身份认证方案,利用区块链去中心化和防篡改特点解决了传统基于PKI技术中存在的单点故障问题以及多CA(Certificate Authority)互信难问题,从而简化了CA的证书管理以及系统开销。实验结果表明,所提方案中PKI技术既解决了安全域间的信任关系,也解决了IBC无法在大环境使用的问题。IBC技术替代传统数字证书,有效减少了通信开销,提升了认证速度。在有效提高身份认证效率的同时解决了传统身份认证与区块链的单点故障问题,具有更好的安全性。 展开更多
关键词 区块链 身份认证 PKI ibc 安全域 证书管理 CA 通信开销 单点故障
在线阅读 下载PDF
ID-based Key-insulated Authenticated Key Agreement Protocol 被引量:1
3
作者 周渊 程晓明 柴震川 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第2期247-249,共3页
The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography ... The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed. 展开更多
关键词 id-based KEY-INSULATED key agreement
在线阅读 下载PDF
A New ID-Based Proxy Multi-Signature Scheme from Bilinear Pairings 被引量:1
4
作者 GU Chun-xiang PAN Heng ZHU Yue-fei 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期193-197,共5页
ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we... ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem. 展开更多
关键词 id-based signatures proxy multi-signature id-based proxy multi signatures bilinear pairlngs provable security
在线阅读 下载PDF
ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security 被引量:1
5
作者 JIANG Hong XIE Mingming +2 位作者 KANG Baoyuan LI Chunqing SI Lin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第4期362-368,共7页
Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a pu... Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost. 展开更多
关键词 id-based auditing data integrity checking digital signature SECURITY bilinear map
原文传递
An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption 被引量:1
6
作者 柴震川 曹珍富 陆荣幸 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第3期271-278,共8页
Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or ... Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointehval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes. 展开更多
关键词 id-based cryptography proxy signature bilinear pairings provable security
在线阅读 下载PDF
Efficient Privacy Enhanced Software Registration with ID-Based Blind Signatures 被引量:1
7
作者 CHEN Wuping QIN Bo +1 位作者 WU Qianhong ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期733-738,共6页
In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce una... In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce unauthorized use of software while keeping the privacy of users. To the best of our knowledge, this is the first system that the privacy of users is guaranteed in software registration. Our system enjoys a modular design and can be implemented by any secure ID-based partially blind signature scheme. Furthermore, the proposal allows flexible registration information definition. This feature makes our scheme flexible and practical for more software registration applications. 展开更多
关键词 information security privacy enhanced technology software registration id-based cryptography blind signature
原文传递
区块链跨链协议IBC形式化分析
8
作者 魏秋阳 赵旭峰 +2 位作者 朱雪阳 张文辉 卢奕函 《软件学报》 北大核心 2025年第11期4953-4974,共22页
自从比特币诞生以来,区块链技术在许多领域产生了重大的影响.然而,异构、孤立的区块链系统之间缺乏有效的通信机制,限制了区块链生态的长远发展.因此,跨链技术迅速发展并成为了新的研究热点.由于区块链的去中心化本质和跨链场景的复杂性... 自从比特币诞生以来,区块链技术在许多领域产生了重大的影响.然而,异构、孤立的区块链系统之间缺乏有效的通信机制,限制了区块链生态的长远发展.因此,跨链技术迅速发展并成为了新的研究热点.由于区块链的去中心化本质和跨链场景的复杂性,跨链技术面临巨大的安全风险. IBC协议是目前最广泛使用的跨链通信协议之一.对IBC协议进行形式化分析,以期帮助开发者更可靠地设计和实现跨链技术.使用基于时序逻辑的规约语言TLA+对IBC协议进行形式化建模,并使用模型检测工具TLC验证IBC协议应满足的重要性质.通过对验证结果深入分析,发现一些影响数据包传输和代币转移正确性的重要问题,并提出建议来消除相关安全风险.这些问题已经向IBC开发者社区汇报,其中大部分得到确认. 展开更多
关键词 区块链 跨链 ibc协议 形式化分析 TLA+
在线阅读 下载PDF
Provable Security of ID-Based Proxy Multi-Signature Schemes
9
作者 GU Chunxiang ZHU Yuefei ZHAO Tao 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期87-90,共4页
In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this pape... In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme. 展开更多
关键词 id-based signature id-based proxy multi-signature provable security bilinear pairings.
在线阅读 下载PDF
ID-Based Authenticated Dynamic Group Key Agreement
10
作者 王莺洁 潘军 诸鸿文 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期236-241,共6页
Two ID-based authenticated group key agreement schemes, proposed by Choi et al and Du et al, are insecure against an impersonation attack and th ey only discussed the static group. This paper proposed a variant of BD ... Two ID-based authenticated group key agreement schemes, proposed by Choi et al and Du et al, are insecure against an impersonation attack and th ey only discussed the static group. This paper proposed a variant of BD protocol , which is fully authenticated by a proven-secure ID-based signature scheme. T he protocol can res ist the impersonation attack, and other security attributes are also satisfied. Compared with Choi et al and Du et al schemes, the proposed one is mor e efficient and applicable for dynamic groups. 展开更多
关键词 group key agreement elliptic curve AUTHENTICATION id-based signature
在线阅读 下载PDF
An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
11
作者 陆荣幸 曹珍富 +1 位作者 苏仁旺 柴震川 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期205-209,共5页
Peer-to-peer computing has recently started to gain significant acceptance, since it can greatly increase the performance and reliability of overall system. However, the security issue is still a major gating factor f... Peer-to-peer computing has recently started to gain significant acceptance, since it can greatly increase the performance and reliability of overall system. However, the security issue is still a major gating factor for its full adoption. In order to guarantee the security of data exchanged between two peers in Peer-to-Peer system, this paper comes up with an ID-based authenticated key agreement from bilinear pairings and uses BAN logic to prove the protocol’s security. Compared with other existing protocols, the proposed protocol seems more secure and efficient, since it adopts the static shared Diffie-Hellman key. 展开更多
关键词 peer-to-peer computing authenticate key agreement id-based BAN logic
在线阅读 下载PDF
Improved ID-Based Signature Scheme Solving Key Escrow
12
作者 廖剑 戚英豪 +2 位作者 黄佩伟 戎蒙括 李生红 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期121-126,共6页
Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually si... Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually signed by him/herself. To avoid the keyescrow problem, an ID-based signature scheme was presented without trusted PKG. The exact proof of security was presented to demonstrate that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient. 展开更多
关键词 CRYPTOGRAPHY id-based signature bilinear pairings key escrow trusted private key generator
在线阅读 下载PDF
南光重磅新品Evoke 150C亮相IBC 2025
13
《影视制作》 2025年第10期117-117,共1页
日前,南光携旗下NANLUX、NANLITE、NANLINK、GUTEK固道四大子品牌的多款产品参与IBC 2025展会。其中,NANLUX最新推出的重磅新品Evoke 150C得到现场媒体与业内人士的广泛关注,并荣获媒体大奖。Evoke 150C在灯、控、电一体的紧凑机身中搭... 日前,南光携旗下NANLUX、NANLITE、NANLINK、GUTEK固道四大子品牌的多款产品参与IBC 2025展会。其中,NANLUX最新推出的重磅新品Evoke 150C得到现场媒体与业内人士的广泛关注,并荣获媒体大奖。Evoke 150C在灯、控、电一体的紧凑机身中搭载了强大的Nebula星云C8彩色光引擎,融合宽色温、广色域、优秀的光质与调光表现,凭借由IP66+金属机身铸造的专业品质,以及FE卡口下的专业附件支持和对FM卡口附件生态的兼容,让创作者在进行细节勾光、极限藏光和户外移动光位补光等操作时都能称心顺手,放心创作。 展开更多
关键词 Evoke 150C NANLUX ibc 2025
在线阅读 下载PDF
索贝亮相IBC2025
14
《现代电视技术》 2025年第10期98-98,共1页
9月12日-15日,IBC2025在荷兰阿姆斯特丹盛大举行,索贝展示了多款前沿视听产品与一体化解决方案,与欧洲、中东、拉美等地区的客户就多语言适配、本地化服务、定制化功能等进行现场交流。APE 2.0国际版基于索贝自研的MILM-2o与MILM-2s双... 9月12日-15日,IBC2025在荷兰阿姆斯特丹盛大举行,索贝展示了多款前沿视听产品与一体化解决方案,与欧洲、中东、拉美等地区的客户就多语言适配、本地化服务、定制化功能等进行现场交流。APE 2.0国际版基于索贝自研的MILM-2o与MILM-2s双模型架构,实现从线索获取到精剪交付的全流程覆盖,核心能力包括:线索智能聚合、全链路AI工具、模块化灵活适配。 展开更多
关键词 视听产品 一体化解决方案 索贝 ibc2025
在线阅读 下载PDF
中视广信国产菁彩声文件制作系统亮相IBC2025
15
《现代电视技术》 2025年第10期98-98,共1页
9月12日,IBC 2025在荷兰阿姆斯特丹RAI展览中心开幕,中视广信携手UWA世界超高清视频产业联盟并展示了国产Audio Vivid三维菁彩声制作系统,在现场打造了三维空间沉浸式声场。中视广信与UWA联盟共同合作研发的国产Audio Vivid三维菁彩声... 9月12日,IBC 2025在荷兰阿姆斯特丹RAI展览中心开幕,中视广信携手UWA世界超高清视频产业联盟并展示了国产Audio Vivid三维菁彩声制作系统,在现场打造了三维空间沉浸式声场。中视广信与UWA联盟共同合作研发的国产Audio Vivid三维菁彩声制作系统,打破国外在沉浸式音频技术领域的长期垄断,加快推动了国产菁彩声音频标准在后期制作、音乐创作及内容分发中的实施。 展开更多
关键词 Audio Vivid 中视广信 三维菁彩声 ibc2025
在线阅读 下载PDF
索尼亮相IBC2025
16
《现代电视技术》 2025年第10期97-97,共1页
9月12日至15日,索尼参展荷兰IBC2025,展示一系列软硬件集成的专业解决方案,包括摄录一体机、演播室摄像机、监视器等产品,旨在提升内容创作水平及简化媒体制作流程。索尼是内容来源与真实性联盟(C2PA)成员,新品PXW-Z380是支持视频录制... 9月12日至15日,索尼参展荷兰IBC2025,展示一系列软硬件集成的专业解决方案,包括摄录一体机、演播室摄像机、监视器等产品,旨在提升内容创作水平及简化媒体制作流程。索尼是内容来源与真实性联盟(C2PA)成员,新品PXW-Z380是支持视频录制内容真实性验证的摄录一体机,搭载AI处理单元与BIONZ XR图像处理引擎,提升拍摄体验。PXW-Z380内置AI功能,支持高精度主体识别与自动对焦。 展开更多
关键词 索尼 摄录一体机 演播室摄像机 监视器 ibc2025
在线阅读 下载PDF
基于IBC方法的旋翼BVI噪声主动控制机理 被引量:8
17
作者 倪同兵 招启军 马砾 《航空学报》 EI CAS CSCD 北大核心 2017年第7期120-132,共13页
为揭示单片桨叶控制(IBC)主动控制技术抑制旋翼桨-涡干扰(BVI)噪声的降噪机理,建立了一套基于CFD/CSD/FW-H_pds方程的综合噪声分析方法。旋翼桨-涡干扰噪声与旋翼桨叶载荷特性、气动变形以及旋翼桨尖涡结构等密切相关,为有效模拟旋翼桨... 为揭示单片桨叶控制(IBC)主动控制技术抑制旋翼桨-涡干扰(BVI)噪声的降噪机理,建立了一套基于CFD/CSD/FW-H_pds方程的综合噪声分析方法。旋翼桨-涡干扰噪声与旋翼桨叶载荷特性、气动变形以及旋翼桨尖涡结构等密切相关,为有效模拟旋翼桨叶的载荷特性及桨尖涡结构,将Navier-Stokes方程作为前飞流场的主控方程,空间离散上采用三阶MUSCL插值格式与通量差分裂Roe格式相结合;时间方向上采用双时间法,使用隐式LU-SGS格式在伪时间方向上进行推进;湍流模型采用对分离流动具有较好捕捉能力的Spalart-Allmaras模型。为提高旋翼桨叶弹性变形运动的模拟精度,建立了基于Hamilton变分原理的CSD模型,并与高精度的CFD求解器结合,发展了适合旋翼桨叶变形及载荷特性模拟的流固耦合分析方法。在CFD/CSD耦合方法分析流场基础上,使用可穿透空间积分面的FW-H_pds方法对旋翼气动噪声特性进行计算。首先,对流场及噪声数值方法进行验证;然后,着重针对UH-60A旋翼的斜下降飞行状态,分别对有/无IBC噪声主动控制条件下的旋翼BVI气动噪声特性进行了模拟,相位角、幅值和频率等不同控制参数的影响对比分析结果表明:IBC主动控制减小了前行侧桨叶表面尤其是桨叶尖部的负压峰值,降低了桨-涡干扰发生位置附近的桨叶气动载荷;同时主动控制后的桨尖涡集中程度变弱,并且增加了桨叶与桨尖涡之间的相遇距离,从而显著降低了桨-涡干扰噪声;选取合理的相位角、幅值和频率等主动控制参数组合,BVI噪声降低可达5~7dB。 展开更多
关键词 旋翼 桨-涡干扰(BVI)噪声 噪声主动控制 NAVIER-STOKES方程 FW-H_pds方法 CFD/CSD耦合方法 单片桨叶控制(ibc)
原文传递
基于IBC太阳电池的二氧化硅掩膜研究 被引量:2
18
作者 李力 姜辰明 +1 位作者 黄铭 沈辉 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2014年第5期29-31,38,共4页
在叉指状背接触太阳电池(IBC电池)的制作过程中,一种办法是以二氧化硅作为掩膜阻挡磷扩散进入已经扩硼的区域,在有二氧化硅保护的区域,p+区保持不变,在没有二氧化硅保护的地方磷扩散进入形成n+背表面场,从而实现在不同区域的不同扩散。... 在叉指状背接触太阳电池(IBC电池)的制作过程中,一种办法是以二氧化硅作为掩膜阻挡磷扩散进入已经扩硼的区域,在有二氧化硅保护的区域,p+区保持不变,在没有二氧化硅保护的地方磷扩散进入形成n+背表面场,从而实现在不同区域的不同扩散。该文是研究在不同的的温度下热氧化得到的二氧化硅氧化层的厚度,厚度从0 nm到124 nm,然后通过测量磷扩散前后方阻变化和ECV图像,研究不同厚度下的二氧化硅掩膜对磷扩散的阻挡作用。同时,还测量了在不同情况下硅片的少子寿命,以确定一个最佳的热氧化二氧化硅工艺,为IBC电池工艺的后续研究提供参考。 展开更多
关键词 ibc太阳电池 二氧化硅掩膜 方阻 少子寿命 ECV
在线阅读 下载PDF
一种解决IBC密钥托管问题的新方案 被引量:3
19
作者 许盛伟 李新玉 王荣荣 《计算机应用与软件》 北大核心 2018年第9期307-310,333,共5页
为了解决基于身份公钥密码体制中与生俱来的密钥托管问题,结合已有的方案,提出一种新的具有更多优势的密钥托管方案。用户和密钥生成中心各自选择一部分参数生成系统主密钥,在用户不必引入一部分身份信息的前提下达到共同生成用户私钥... 为了解决基于身份公钥密码体制中与生俱来的密钥托管问题,结合已有的方案,提出一种新的具有更多优势的密钥托管方案。用户和密钥生成中心各自选择一部分参数生成系统主密钥,在用户不必引入一部分身份信息的前提下达到共同生成用户私钥的目的。用户可通过双线性对的性质,验证密钥生成中心是否诚实提供自己所选取的参数。在监听过程中,由于设置了最受信赖的托管代理,用户的隐私得到了更好的保护,解决了监听及可信第三方权利过大的问题。在必要情况下,可通过修改用户或密钥生成中心选取的参数来达到更换部分或全部密钥的效果,使系统具有良好的动态性。 展开更多
关键词 ibc 密钥托管 门限秘密共享 双线性对
在线阅读 下载PDF
IBC合金对LR6电池深放电性能的影响 被引量:1
20
作者 谷书华 张博 +1 位作者 钟勇 王力臻 《电池》 CAS CSCD 北大核心 2019年第4期316-317,共2页
通过恒流放电和析气测试,研究LR6电池的室温150 mA恒流连放,室温、高温(60℃)小电流深放电性能。在室温下,IBC-4系列合金均具有较低的析气量,使用IBC-4-8合金的电池的放电性能最好。在室温下,电池中锌粉的利用率随着放电电流的减小而增... 通过恒流放电和析气测试,研究LR6电池的室温150 mA恒流连放,室温、高温(60℃)小电流深放电性能。在室温下,IBC-4系列合金均具有较低的析气量,使用IBC-4-8合金的电池的放电性能最好。在室温下,电池中锌粉的利用率随着放电电流的减小而增加,总的析气量加大;高温20 mA、50 mA和80 mA恒流放电,锌粉利用率分别为99. 29%、98. 83%和94. 62%。放电析气总量随着放电深度的增加而增加,对电池的安全性和稳定性有一定的影响。 展开更多
关键词 碱性锌锰电池 锌铟铋钙(ibc)合金 析气 深放电
在线阅读 下载PDF
上一页 1 2 37 下一页 到第
使用帮助 返回顶部