期刊文献+
共找到1,664篇文章
< 1 2 84 >
每页显示 20 50 100
基于Tate Pairings的群组密钥协商方案 被引量:2
1
作者 王勇 李明 曹元大 《计算机工程与应用》 CSCD 北大核心 2004年第36期1-3,86,共4页
该文提出了一种利用超奇异椭圆曲线上的TatePairing进行密钥协商的分布式群组密钥管理机制。该机制的通信开销随成员数目的增加而增长的幅度可忽略,3阶B-树的使用使得其计算开销为O(log3n)。它提供的安全属性包括群组密钥保密性、前向... 该文提出了一种利用超奇异椭圆曲线上的TatePairing进行密钥协商的分布式群组密钥管理机制。该机制的通信开销随成员数目的增加而增长的幅度可忽略,3阶B-树的使用使得其计算开销为O(log3n)。它提供的安全属性包括群组密钥保密性、前向保密和后向保密。从性能和安全性两方面来看,该机制适用于高延迟网络中的大型群组。 展开更多
关键词 群组密钥管理 Tate pairings B-树
在线阅读 下载PDF
Efficient Certificateless Authenticated Key Agreement Protocol from Pairings 被引量:24
2
作者 WANG Shengbao CAO Zhenfu WANG Licheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1278-1282,共5页
In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/ser... In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols. 展开更多
关键词 Web security authenticated key agreement certificateless public key cryptography bilinear pairings
在线阅读 下载PDF
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings 被引量:5
3
作者 LI Fagen HU Yupu LIU Shuanggen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期17-20,共4页
Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we... Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we propose an efficient multi-recipient signcryption scheme based on the bilinear pairings, which broadcasts a message to multiple users in a secure and authenticated manner. We prove its semantic security and unforgeability under the Gap Diffie-Hellman problem assumption in the random oracle model. The proposed scheme is more efficient than re-signcrypting a message n times using a signcryption scheme in terms of computational costs and communication overheads. 展开更多
关键词 SIGNCRYPTION multi-recipient signcryption bilinear pairings provable security
在线阅读 下载PDF
NEW ID-BASED GROUP SIGNATURE FROM PAIRINGS 被引量:8
4
作者 Chen Xiaofeng Zhang Fangguo Kwangjo Kim 《Journal of Electronics(China)》 2006年第6期892-900,共9页
We argue that traditional identity-based systems from pairings seem unsuitable for designing group signature schemes due to the problem of key escrow. In this paper we first propose new ID-based public key systems wit... We argue that traditional identity-based systems from pairings seem unsuitable for designing group signature schemes due to the problem of key escrow. In this paper we first propose new ID-based public key systems without trusted PKG (Private Key Generator) from bilinear pairings. In our new ID-based systems, if the dishonest PKG impersonates an honest user to communicate with others, the user can provide a proof of treachery of the PKG afterwards, which is similar to certificate-based systems. Therefore, our systems reach the Girault’s trusted level 3. We then propose a group signature scheme under the new ID-based systems, the security and performance of which rely on the new systems. The size of the group public key and the length of the signature are independent on the numbers of the group. 展开更多
关键词 Group signature Bilinear pairings Identity-based cryptography
在线阅读 下载PDF
WiBPA:An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings 被引量:2
5
作者 Chunhua Li Peng Wang +2 位作者 Changhong Sun Ke Zhou Ping Huang 《Computers, Materials & Continua》 SCIE EI 2019年第2期319-333,共15页
The security of cloud data has always been a concern.Cloud server provider may maliciously tamper or delete user’s data for their own benefit,so data integrity audit is of great significance to verify whether data is... The security of cloud data has always been a concern.Cloud server provider may maliciously tamper or delete user’s data for their own benefit,so data integrity audit is of great significance to verify whether data is modified or not.Based on the general three-party audit architecture,a dynamic auditing scheme without bilinear pairings is proposed in this paper.It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence.By establishing the mapping relation between logic index and tag index of data block with index transformation table,our scheme can easily support dynamic data operation.By hiding random numbers in the integrity evidence,our scheme can protect users’privacy information.Detailed security analysis shows that our scheme is secure against attacks such as forgery,replaying and substitution.Further experiments demonstrate that our scheme has lower computational overhead. 展开更多
关键词 Cloud storage integrity verification dynamic auditing bilinear pairings
在线阅读 下载PDF
A new improved ID-based proxy ring signature scheme from bilinear pairings 被引量:2
6
作者 郎为民 杨宗凯 +1 位作者 程文青 谭运猛 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第6期688-691,共4页
Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an i... Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an important role in security solutions. Several ID-based signature schemes have been put forward, many of which are based on bilinear pairings. In key management and moderate security demand scenarios, ID-based public key cryptosystem is more preferable than other public key infrastructure based systems. In this paper, an improved ID-based proxy ring signature scheme from bilinear pairings is proposed which combines the advantages of proxy signature and of ring signatures. Our scheme can guarantee the profits of the proxy signer via preventing the original signer form generating the proxy ring signature. Furthermore, bilinear pairings are introduced to minimize the computation overhead and to improve the related performance of our scheme. In contrast with Zhang's scheme, our scheme is a computational efficiency improvement for signature verification because the computational cost of bilinear pairings required is reduced from O(n) to O( 1 ). In addition, the proxy ring signature presented in this paper can perfectly satisfy all the security requirements of proxy ring signature, i. e. signer-ambiguity, non-forgeability, verification, non-deniability and distinguishability. 展开更多
关键词 digital signature proxy signature ring signature identity-based cryptography bilinear pairings
在线阅读 下载PDF
Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings 被引量:1
7
作者 WANG Shengbao CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期63-66,共4页
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (C... Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol. 展开更多
关键词 authenticated key agreement (AK) certificatebased encryption (CBE) pairings session key escrow perfect forward security
在线阅读 下载PDF
Pairings-Based Protocol for Group Key Agreement
8
作者 李明 王勇 +1 位作者 谷大武 白英彩 《Journal of Beijing Institute of Technology》 EI CAS 2005年第2期221-224,共4页
An authenticated group key agreement protocol suite (PAGKA) based on pairings is presented in this paper. This suite extends an efficient Diffie-Hellman-based protocol suite by introducing parings on elliptic curves a... An authenticated group key agreement protocol suite (PAGKA) based on pairings is presented in this paper. This suite extends an efficient Diffie-Hellman-based protocol suite by introducing parings on elliptic curves and public-key certificates. The result suite builds its security on the hardness of the bilinear Diffie-Hellman (BDH) problem in the random oracle model, and provides implicit key authentication, perfect forward secrecy and unknown key-share secrecy. 展开更多
关键词 key agreement AUTHENTICATION pairings
在线阅读 下载PDF
A Dynamic ID-Based Authenticated Group Key Exchange Protocol without Pairings
9
作者 XIE Liyun HE Mingxing 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期255-260,共6页
So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties' ephemeral private keys without their long-term private keys, so these GKE protocols... So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties' ephemeral private keys without their long-term private keys, so these GKE protocols are insecure on this attack. In this paper, for resisting above attack, we propose a dynamic authenticated group key exchange (AGKE) protocol in the ID-based setting. Different from previous ID-based protocols, our protocol does not utilize bilinear pairings, which makes it more efficient. At last, we analyze the security of the protocol in the cCK (enhanced Canetti-Krawczyk) security model. 展开更多
关键词 group key exchange eCK security model without pairings
原文传递
Investigating the Relationship between Food Pairings and Plate Waste from Elementary School Lunches
10
作者 Ariun Ishdorj Oral Capps Jr. +1 位作者 Maureen Storey Peter S. Murano 《Food and Nutrition Sciences》 2015年第11期1029-1044,共16页
Plate waste, defined as the quantity of edible food left uneaten after a meal, is a challenge for schools participating in the National School Lunch Program (NSLP). The new nutrition standards in the NSLP of United St... Plate waste, defined as the quantity of edible food left uneaten after a meal, is a challenge for schools participating in the National School Lunch Program (NSLP). The new nutrition standards in the NSLP of United States Department of Agriculture (USDA) were implemented at the beginning of school year (SY) 2012-2013. School foodservice authorities were concerned that the new standards would result in increased plate waste and reduced participation, especially by students who paid full prices for lunch. There are many reasons for plate waste, including students’ dislike of the foods served, the composition of meals, the environment in which students are eating, the lack of time to eat, or perhaps other factors. The objective of this study was to examine the relationship between entrée/vegetable “pairings” and plate waste by elementary school students pre- and post-implementation of the new school meal standards. Plate waste was measured to determine which entrée/vegetable pairs produced the least amount of waste. Plate waste of 144 and 305 entrée/vegetable pairings was analyzed, pre- and post-implementation, respectively. Our results indicated that more nutritious meals were offered during the post-implementation period. The new school meal standards led to no significant changes in entrée plate waste, but vegetable plate waste increased by 5.6%. As such, increases in the combined entrée/vegetable plate waste were evident from 40.4% pre-implementation to 43.5% post-implementation. The top five vegetables in terms of popularity were all starchy vegetables, the majority of which were potatoes in various processed forms. The least popular vegetables were dark-green leafy vegetables, such as steamed broccoli, both pre- and post-implementation. Chicken nuggets were the most popular entrée and were wasted the least. Understanding the dynamics of food pairings and providing desirable entrée and vegetable pairings can help reduce waste from school lunches. 展开更多
关键词 FOOD pairings National School LUNCH Program Nutrients PLATE WASTE VEGETABLES
暂未订购
New Multisignature Scheme Based on Bilinear Pairings
11
作者 LI Bin LI ji-guo +1 位作者 ZHAO Ze-mao WU Yi 《Semiconductor Photonics and Technology》 CAS 2006年第2期131-135,共5页
Two digital multisignature schemes based on bilinear pairings were proposed. One of them is the sequential digital multisignature, and the other is the broadcasting digital multisignature. The scheme has the same secu... Two digital multisignature schemes based on bilinear pairings were proposed. One of them is the sequential digital multisignature, and the other is the broadcasting digital multisignature. The scheme has the same security as JI and LIs multisignature scheme, but the new scheme has the lower computation. So the new scheme is the multisignature which has high security and low computation. It has the theory meaning and extensive application under the condition of SmartCard, etc. 展开更多
关键词 CRYPTOGRAPHY Digital signature Digital multisignature Bilinear pairings
在线阅读 下载PDF
A PROVABLY SECURE PROXY SIGNATURE SCHEME FROM BILINEAR PAIRINGS
12
作者 Wang Aiqin Li Jiguo Wang Zhijian 《Journal of Electronics(China)》 2010年第3期298-304,共7页
A proxy signature allows an entity,called original signer,to delegate its signing power to another entity,called proxy signer,to sign messages on its behalf.Proxy signatures have many practical applications and are ve... A proxy signature allows an entity,called original signer,to delegate its signing power to another entity,called proxy signer,to sign messages on its behalf.Proxy signatures have many practical applications and are very important cryptographic protocol.In this paper,we propose an efficient proxy signature scheme from bilinear pairings.We prove it secure in the random oracle model and analyze computation cost of our scheme.Our scheme satisfies all the properties required for proxy signatures. 展开更多
关键词 Proxy signature Bilinear pairings Provably security
在线阅读 下载PDF
Effect of the mixing of s-wave and chiral p-wave pairings on electrical shot noise properties of normal metal/superconductor tunnel junctions
13
作者 胡雨辰 胡梁宾 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期538-545,共8页
We study theoretically the electrical shot noise properties of tunnel junctions between a normal metal and a superconductor with the mixture of singlet s-wave and chiral triplet p-wave pairing due to broken inversion ... We study theoretically the electrical shot noise properties of tunnel junctions between a normal metal and a superconductor with the mixture of singlet s-wave and chiral triplet p-wave pairing due to broken inversion symmetry. We investigate how the shot noise properties vary as the relative amplitude between the two parity components in the pairing potential is changed. It is demonstrated that some characteristics of the electrical shot noise properties of such tunnel junctions may depend sensitively on the relative amplitude between the two parity components in the pairing potential, and some significant changes may occur in the electrical shot noise properties when the relative amplitude between the two parity components is varied from the singlet s-wave pairing dominated regime to the chiral triplet p-wave pairing dominated regime. In the chiral triplet p-wave pairing dominated regime, the ratio of noise power to electric current is close to 2e both in the in-gap and in the out-gap region. In the singlet s-wave pairing dominated regime, the value of this ratio is close to 4e in the inner gap region but may reduce to about 2e in the outer gap region as the relative amplitude of the chiral triplet pairing component is increased. The variations of the differential shot noise with the bias voltage also exhibit some significantly different features in different regimes. Such different features can serve as useful diagnostic tools for the determination of the relative magnitude of the two parity components in the pairing potential. 展开更多
关键词 normal metal/superconductor tunnel junctions shot noise mixing of s-wave and chiral p-wave pairing spin–orbit coupling
原文传递
A new threshold proxy signature scheme from bilinear pairings 被引量:7
14
作者 QIANHaifeng CAOZhenfu XUEQingshui 《Science in China(Series F)》 2004年第5期612-622,共11页
Based on the GDH signature (short signature scheme) a probabilistic signature scheme is proposed in this paper with security proof.Then a new threshold proxy signature from bilinear pairings is proposed as well by us ... Based on the GDH signature (short signature scheme) a probabilistic signature scheme is proposed in this paper with security proof.Then a new threshold proxy signature from bilinear pairings is proposed as well by us ing the new probabilistic signature scheme and the properties of the Gap Diffie-Hellman (GDH)group (where the Computational Diffie-Hellman problem is hard but the Decisional Diffie-Hellman problem is easy to solve).Our constructions are based on the recently proposed GDH signature scheme of Bonel et al.s article.Bilinear pairings could be built from Weil pairing or Tate pairing.So most our constructions would be simpler,but still with high security.The proposed threshold proxy signature is the first one which is built from bilinear pairings.At the end of this paper security and performance of the threshold proxy signature scheme is also analyzed. 展开更多
关键词 probabilistic signature scheme threshold proxy signature VSS bilinear pairings.
原文传递
Conditional privacy protection authentication scheme based on bilinear pairings for VANET 被引量:1
15
作者 Song Cheng Gu Xin'an +1 位作者 Ping Yuan Zhang Yadong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2020年第1期62-71,共10页
To solve the problem of security and efficiency of anonymous authentication in the vehicle Ad-hoc network(VANET), a conditional privacy protection authentication scheme for vehicular networks is proposed based on bili... To solve the problem of security and efficiency of anonymous authentication in the vehicle Ad-hoc network(VANET), a conditional privacy protection authentication scheme for vehicular networks is proposed based on bilinear pairings. In this scheme, the tamper-proof device in the roadside unit(RSU) is used to complete the message signature and authentication process together with the vehicle, which makes it more secure to communicate between RSU and trusted authority(TA) and faster to update system parameters and revoke the vehicle. And this is also cheaper than installing tamper-proof devices in each vehicle unit. Moreover, the scheme provide provable security proof under random oracle model(ROM), which shows that the proposed scheme can meet the security requirements such as conditional privacy, unforgeability, traceability, etc. And the results of simulation experiment demonstrate that this scheme not only of achieves high efficiency, but also has low message loss rate. 展开更多
关键词 VANET ANONYMOUS authentication BILINEAR pairings CONDITIONAL PRIVACY protection
原文传递
Research on k-anonymity privacy protection scheme based on bilinear pairings 被引量:1
16
作者 Song Cheng Zhang Yadong +1 位作者 Wang Lei Liu Zhizhong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第5期12-19,共8页
Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is pr... Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is proposed. In circular region of Euclidian distance,mobile terminal evenly generates some false locations,from which half optimal false locations are screened out according to position entropy,location and mapping background information. The anonymity obtains the effective guarantee,so as to realize privacy protection. Through security analyses,the scheme is proved not only to be able to realize such security features as privacy,anonymity and nonforgeability,but also able to resist query tracing attack. And the result of simulation shows that this scheme not only has better evenness in selecting false locations,but also improves efficiency in generating and selecting false nodes. 展开更多
关键词 location-based services (LBS) bilinear pairings K-ANONYMITY privacy protection
原文传递
Weak Co-AB-context for G_(C)-χ-injective Modules
17
作者 YANG Qiang 《数学进展》 北大核心 2026年第1期103-119,共17页
In this paper,we introduce the notion of G_(C)-X-injective modules,where X denotes a class of left S-modules and C represents a faithfully semidualizing bimodule.Under the condition that X satisfies certain hypotheses... In this paper,we introduce the notion of G_(C)-X-injective modules,where X denotes a class of left S-modules and C represents a faithfully semidualizing bimodule.Under the condition that X satisfies certain hypotheses,some properties and some equivalent characterizations of G_(C)-X-injective modules are investigated,and we also show that the triple(■,cores■,■)is a weak co-AB-context.As an application,two complete cotorsion pairs and a new model structure in Mod S are given. 展开更多
关键词 C-X-injective module G_(C)-X-injective module cotorsion pair weak co-ABcontext
原文传递
A Cross-Band Quantum Light Source Based on Spontaneous Four-Wave Mixing in a Shallow-Ridge Silicon Waveguide
18
作者 Yijia Wang Qirui Ren +2 位作者 Zhanping Jin Yidong Huang Wei Zhang 《Chinese Physics Letters》 2026年第1期64-70,共7页
To fully utilize the resources provided by optical fiber networks,a cross-band quantum light source generating photon pairs,where one photon in a pair is at C band and the other is at O band,is proposed in this work.T... To fully utilize the resources provided by optical fiber networks,a cross-band quantum light source generating photon pairs,where one photon in a pair is at C band and the other is at O band,is proposed in this work.This source is based on spontaneous four-wave mixing(SFWM)in a piece of shallow-ridge silicon waveguide.Theoretical analysis shows that the waveguide dispersion could be tailored by adjusting the ridge width,enabling broadband photon pair generation by SFWM across C band and O band.The spontaneous Raman scattering(SpRS)in silicon waveguides is also investigated experimentally.It shows that there are two regions in the spectrum of generated photons from SpRS,which could be used to achieve cross-band photon pair generation.A chip of shallow-ridge silicon waveguide samples with different ridge widths has been fabricated,through which cross-band photon pair generation is demonstrated experimentally.The experimental results show that the source can be achieved using dispersion-optimized shallow-ridge silicon waveguides.This cross-band quantum light source provides a way to develop new fiber-based quantum communication functions utilizing both C band and O band and extends applications of quantum networks. 展开更多
关键词 photon pair generation shallow ridge silicon waveguide spontaneous four wave mixing optical fiber networks adjusting ridge widthenabling cross band quantum light source broadband photon pair generation waveguide dispersion
原文传递
The Magic of Organocatalytic Synergism in Switchable Polymerization:One-pot Synthesis of Block Copolymers with Programmable Sequences and Compositions
19
作者 Shuai-Shuai Zhu Mao-Ji Zhao +1 位作者 Ying-Jie Yuan Yong Wang 《Chinese Journal of Polymer Science》 2026年第1期68-78,I0010,共12页
Switchable polymerization is emerging as a powerful tool to construct block copolymers directly from mixtures of monomers.However,current achievements typically iterate between two polymerization cycles to afford prod... Switchable polymerization is emerging as a powerful tool to construct block copolymers directly from mixtures of monomers.However,current achievements typically iterate between two polymerization cycles to afford products with fixed sequences and compositions.Herein,we report the triethylborane/1,8-diazabicyclo[5.4.0]undec-7-ene(Et_3B/DBU)pair-mediated four-component switchable polymerization of propylene oxide(PO),CO_(2),phthalic anhydride(PA),and racemic lactide(rac-LA),which enables the on-demand synthesis of four different block copolymers,i.e.,poly(propylene phthalate)-b-polylactide(PPE-b-PLA),PPE-b-PLA-b-poly(propylene carbonate)(PPC),PPE-b-PPC-b-PLA,and PPE-b-PPCb-poly(propylene oxide)(PPO),through rationally modulating the Lewis pair(LP)ratio.Core to this protocol is that increasing the loading of Et_(3)B accelerates the ring-opening of PO while impeding the reactivity of rac-LA,thus allowing for fine-tuning of the thermodynamic and kinetic of the switchable polymerization.Therefore,the four polymerization cycles involving PO/PA ring-opening copolymerization(ROCOP),PO/CO_(2) ROCOP,rac-LA ring-opening polymerization(ROP),and PO ROP can be connected and discriminated in precisely programmed manners. 展开更多
关键词 Switchable polymerization Organic Lewis pair Block copolymers Ring-opening copolymerization Multicomponent reaction
原文传递
Electrochemical C-H carboxylation of benzylamines
20
作者 Weimei Zeng Youai Qiu 《Chinese Chemical Letters》 2026年第1期290-295,共6页
In this study,electrochemical C-H carboxylation of benzylamines with CO_(2) was reported.This linear paired electrolysis system enables efficient and economical synthesis of value-added α-amino acids(α-AAs) under mi... In this study,electrochemical C-H carboxylation of benzylamines with CO_(2) was reported.This linear paired electrolysis system enables efficient and economical synthesis of value-added α-amino acids(α-AAs) under mild conditions.Various substituted benzylamines containing diverse functional groups and even highly reactive moieties,such as cyano,amide and alkene groups could be successfully transformed to the carboxylated products.Notably,this method proved to be applicable to the late-stage modification of biorelevant compounds,highlighting its potential for synthetic chemistry.Mechanistic studies such as radical trapping experiments,kinetic isotope effect(KIE) tests and cyclic voltammetry(CV) studies provided useful insight into this transformation. 展开更多
关键词 Electrochemical carboxylation Benzylic C-H bond Carbon dioxide α-Amino acids Linear paired electrolysis
原文传递
上一页 1 2 84 下一页 到第
使用帮助 返回顶部