期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings 被引量:8
1
作者 亓延峰 唐春明 +2 位作者 娄裕 徐茂智 郭宝安 《China Communications》 SCIE CSCD 2013年第11期37-41,共5页
Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi... Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure. 展开更多
关键词 certificateless signcryption iden-tity-based cryptography proxy signcryption elliptic curve discrete logarithm problem
在线阅读 下载PDF
New Multivariate-Based Certificateless Hybrid Signcryption Scheme for Multi-Recipient 被引量:2
2
作者 HAN Yiliang YUE Zelun +1 位作者 FANG Dingyi YANG Xiaoyuan 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期433-440,共8页
With the development of quantum computer, multivariate public key cryptography withstanding quantum attack has became one of the research focus. The existed signcryption schemes from discrete logarithm and bilinear pa... With the development of quantum computer, multivariate public key cryptography withstanding quantum attack has became one of the research focus. The existed signcryption schemes from discrete logarithm and bilinear paring are facing the serious threats. Based on multivariate public key cryptography, a new certificateless multi-receiver hybrid signcryption scheme has been proposed. The proposal reduced the cipher text and could handle arbitrary length messages by employing randomness reusing and hybrid encryption, as well as keeping security. In the random oracle model, the scheme's confidentiality could withstand the IND-CCA2 adversary and its unforgeability could withstand the UF-CMA adversary under the hardness of multivariat quadratic (MQ) problem and isomorphism of polynomials (IP) assumption. It has less computation overhead and higher transmission efficiency than others. It reduced 33% cipher data compared with the existed similar scheme. 展开更多
关键词 multivariate public key cryptography certificateless hybrid signcryption multi-receiver post-quantum cryptography
原文传递
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network 被引量:2
3
作者 Lemei Da Hai Liang +3 位作者 Yong Ding Yujue Wang Changsong Yang Huiyong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期879-902,共24页
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity. 展开更多
关键词 Unmanned aerial vehicle cluster network certificateless signcryption certificateless signature batch verification source authentication data privacy blockchain
在线阅读 下载PDF
A power resource dispatching framework with a privacy protection function in the Power Internet of Things 被引量:1
4
作者 Shuanggen LIU Shuangzi ZHENG +1 位作者 Wenbo ZHANG Runsheng FU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第9期1354-1368,共15页
Smart meters in the Power Internet of Things generate a large amount of power data.However,data privacy in the process of calculation,storage,and transmission is an urgent problem to be solved.Therefore,in this paper ... Smart meters in the Power Internet of Things generate a large amount of power data.However,data privacy in the process of calculation,storage,and transmission is an urgent problem to be solved.Therefore,in this paper we propose a power resource dispatching framework(PRDF)with a privacy protection function,which uses a certificateless aggregate signcryption scheme based on cloud-fog cooperation.Using pseudonyms and aggregating users’power data,PRDF not only protects users’privacy,but also reduces the computing cost and communication overhead under traditional cloud computing.In addition,if the control center finds that a user has submitted abnormal data,it can send a request to the user management center to track the real identity of the user.Our scheme satisfies security requirements based on the random oracle model,including confidentiality and unforgeability.Furthermore,we compare our scheme with other certificateless aggregate signcryption schemes by simulations.Simulation results show that compared with traditional methods,our method performs better in terms of the computation cost. 展开更多
关键词 Power Internet of Things Cloud-fog cooperation Elliptic curve Random oracle model certificateless aggregate signcryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部