期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks
1
作者 Yang Zhao Jingmin An +1 位作者 Hao Li Saru Kumari 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期555-575,共21页
The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the ... The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the environmentofVSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users,so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, inthis paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTASET).The scheme combines fault-tolerant and aggregate signcryption,whichnot onlymakes up for the deficiency oflow security of aggregate signature, but alsomakes up for the deficiency that aggregate signcryption cannot tolerateinvalid signature. The scheme supports one verification pass when all signcryptions are valid, and it supportsunbounded aggregation when the total number of signcryptions grows dynamically. In addition, this schemesupports heterogeneous equality test, and realizes the access control of private data in different cryptographicenvironments, so as to achieve flexibility in the application of our scheme and realize the function of quick searchof plaintext or ciphertext. Then, the security of HFTAS-ET is demonstrated by strict theoretical analysis. Finally, weconduct strict and standardized experimental operation and performance evaluation, which shows that the schemehas better performance. 展开更多
关键词 Aggregate signcryption FAULT-TOLERANT HETEROGENEOUS equality test vehicular sensor network
在线阅读 下载PDF
Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test
2
作者 Seth Alornyo Mustapha Adamu Mohammed +2 位作者 Bright Anibrika Selorm Kodzo Pious Akwasi Sarpong Michael Asante 《Journal of Computer and Communications》 2020年第12期197-213,共17页
Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment... Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment. We combined parallel key-insulated encryption (PKIE) with multiple helper keys and identity-based encryption with the equality test (IBE-ET) to obtain parallel key insulated ID-based public key encryption with outsourced equivalent test (PKI-IBPKE-ET). The scheme inherits the advantages of identity-based encryption (IBE), which simplifies certificate management for public key encryption. Furthermore, the parallel key-insulation with multiple helper mechanism was introduced in our scheme, which perfectly reduced the possibility of helper key exposure. Our scheme will enable the protection and periodic update of decryption keys in insecure environment. Our scheme achieves a weak indistinguishable identity chosen ciphertext (W-IND-ID-CCA) security in the random oracle model. Ultimately, it is observed that our scheme is feasible and practical through the experimental simulation and theoretical analysis. 展开更多
关键词 Identity-Based Encryption equality test Parallel Key-Insulated
在线阅读 下载PDF
Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing
3
作者 Zhen Zhao Bao-Cang Wang Wen Gao 《Journal of Computer Science & Technology》 2025年第1期215-228,共14页
Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without decryption.Since peopl... Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without decryption.Since people prefer to encrypt before outsourcing their data for privacy protection nowadays,the research of IBEET on cloud computing applications naturally attracts attention.However,we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption(IBE)mechanism.In traditional IBEET,the private key generator(PKG)with the master secret key generates trapdoors for all authorized cloud servers.Considering the reality in practice,the PKG is usually not fully trusted.In this case,the Private-Key Generator(PKG)may generate,share,or even sell any trapdoor without any risk of being caught,or not being held accountable,which may lead to serious consequences such as the illegal sharing of a gene bank's trapdoors.In this paper,to relieve the illegal trapdoor sharing problem in IBEET,we present a new notion,called IBEET Supporting Accountable Authorization(IBEET-AA).In IBEET-AA,if there is a disputed trapdoor,the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm.For the additional tracing function,except for the traditional indistinguishability(IND)and one-way(OW)security models in IBEET,we define three more security models to protect the tracing security against dishonest authorizers,PKG,and testers,respectively.Based on Gentry's IBE scheme,we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles. 展开更多
关键词 identity-based encryption with equality test accountable authorization cloud computing Gentry's IBE zero-knowledge proof
原文传递
ON TESTING THE EQUALITY OF K MULTIPLE AND PARTIAL CORRELATION COEFFICIENTS
4
作者 A. K. Gupta Bowling Green State University, USA D. G. Kabe Sf. Mary’s University, USA 《Acta Mathematica Scientia》 SCIE CSCD 2001年第2期221-223,共3页
Coutsourides (1980) derives an ad hoc nuisance parameter removal test for testing the equality of two multiple correlation coefficients of two independent p variate normal populations, under the assumption that a samp... Coutsourides (1980) derives an ad hoc nuisance parameter removal test for testing the equality of two multiple correlation coefficients of two independent p variate normal populations, under the assumption that a sample of size n is available from each population. He also extends his ad hoc nuisance parameter removal test to the testing of the equality of two multiple correlation matrices. This paper presents likelihood ratio tests for testing the equality of k multiple correlation coefficients, and also k partial correlation coefficients. 展开更多
关键词 Normal populations multiple correlation coefficients equality testing like-lihood ratio test MOMENTS
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部