期刊文献+
共找到52,437篇文章
< 1 2 250 >
每页显示 20 50 100
A certificateless identity authentication scheme for UAVs via blockchain sharding
1
作者 Zhi-Peng Zhong Xiao Chen +3 位作者 Mu-Hong Huang Hao-Zhe Wang Sheng Cao Xiao-Song Zhang 《Journal of Electronic Science and Technology》 2026年第1期1-13,共13页
With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuri... With the growing deployment of unmanned aerial vehicles(UAVs)swarms in national defense,military operations,and emergency response,secure and reliable intra-swarm identity authentication has become critical for ensuring coordinated action and mission reliability.To address the drawbacks of public key infrastructure(PKI)based authentication in UAV swarms,namely,complex certificate management,strong dependence on centralized authorities,and authentication latency.We propose a certificateless identity authentication scheme for UAV swarms built on blockchain sharding.The scheme leverages sharding to execute authentication in parallel across multiple shards,significantly improving efficiency.Each UAV locally generates its public/private key pair and then adopts a registration-based encryption(RBE)mechanism:A registration algorithm binds the device identity to its key on the blockchain,ensuring public verifiability and immutability of identity mapping.On this basis,an authentication algorithm runs in which the initiator produces an authentication signature using a common reference string(CRS),on-chain public-key registration information,and its local private key,and the verifier rapidly validates the authentication message using the on-chain registration data and the identity of the initiator.The experimental results demonstrate that the proposed scheme achieves low-latency and high-throughput identity authentication in large-scale UAV swarm environments,providing a solid technical foundation and broad application prospects for trustworthy UAV swarm identity authentication. 展开更多
关键词 Blockchain CERTIFICATELESS identity authentication Registration-based encryption UAV swarms
在线阅读 下载PDF
Real-Time Identity Authentication Scheme Based on Dynamic Credentials for Power AIGC System
2
作者 Feng Wei Zhao Chen +3 位作者 Yin Wang Dongqing Liu Xun Zhang Zhao Zhou 《Computers, Materials & Continua》 2025年第3期5325-5341,共17页
The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artifici... The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artificial Intelligence Generated Content(AIGC).However,the openness of power system channels and the resource-constrained nature of power sensors have led to new challenges for the secure transmission of power data and decision instructions.Although traditional public key cryptographic primitives can offer high security,the substantial key management and computational overhead associated with these primitives make them unsuitable for power systems.To ensure the real-time and security of power data and command transmission,we propose a lightweight identity authentication scheme tailored for power AIGC systems.The scheme utilizes lightweight symmetric encryption algorithms,minimizing the resource overhead on power sensors.Additionally,it incorporates a dynamic credential update mechanism,which can realize the rotation and update of temporary credentials to ensure anonymity and security.We rigorously validate the security of the scheme using the Real-or-Random(ROR)model and AVISPA simulation,and the results show that our scheme can resist various active and passive attacks.Finally,performance comparisons and NS3 simulation results demonstrate that our proposed scheme offers enhanced security features with lower overhead,making it more suitable for power AIGC systems compared to existing solutions. 展开更多
关键词 Cyber security identity authentication dynamic credential update AIGC
在线阅读 下载PDF
Measurement-device-independent quantum dialogue protocol with bidirectional identity authentication
3
作者 Shi-Pu Gu Jia-Wei Ying +2 位作者 Xing-Fu Wang Lan Zhou Yu-Bo Sheng 《Chinese Physics B》 2025年第11期318-325,共8页
Quantum dialogue(QD)realizes the real-time secure bidirectional quantum communication.Measurement-deviceindependent(MDI)QD can resist all possible attacks focusing on the imperfect measurement devices and enhance QD’... Quantum dialogue(QD)realizes the real-time secure bidirectional quantum communication.Measurement-deviceindependent(MDI)QD can resist all possible attacks focusing on the imperfect measurement devices and enhance QD’s practical security.However,in practical applications,any secure communication requires identity authentication as a prerequisite.In this paper,we propose an MDI QD protocol with bidirectional identity authentication.The practical communication parties can first authenticate the identity of each other simultaneously before the message exchange.In theory,our MDI QD protocol has unconditional security and the communication parties can exchange 1.5 bits of messages in each communication round with linear optical Bell state measurement.We numerically simulate the secrecy message capacity of our MDI QD protocol.Our protocol has two advantages.First,it can effectively resist the impersonation attack and enhance MDI QD’s practical security.Second,it does not require keys to assist the message exchange and has relatively high efficiency.Our protocol has application potential in the future quantum communication field. 展开更多
关键词 measurement-device-independent quantum dialogue quantum identity authentication entanglement swapping
原文传递
IOTA-Based Authentication for IoT Devices in Satellite Networks
4
作者 D.Bernal O.Ledesma +1 位作者 P.Lamo J.Bermejo 《Computers, Materials & Continua》 2026年第1期1885-1923,共39页
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi... This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks. 展开更多
关键词 Satellite IoT decentralized authentication directed acyclic graph IOTA identity verifiable credentials
在线阅读 下载PDF
A blockchain-based user-centric identity management toward 6G networks
5
作者 Guoqiang Zhang Qiwei Hu +1 位作者 Yu Zhang Tao Jiang 《Digital Communications and Networks》 2026年第1期1-10,共10页
The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between... The developing Sixth-Generation(6G)network aims to establish seamless global connectivity for billions of humans,machines,and devices.However,the rich digital service and the explosive heterogeneous connection between various entities in 6G networks can not only induce increasing complications of digital identity management,but also raise material concerns about the security and privacy of the user identity.In this paper,we design a user-centric identity management that returns the sole control to the user self and achieves identity sovereignty toward 6G networks.Specifically,we propose a blockchain-based Identity Management(IDM)architecture for 6G networks,which provides a practical method to secure digital identity management.Subsequently,we develop a fully privacy-preserving identity attribute management scheme by using zero-knowledge proof to protect the privacy-sensitive identity attribute.In particular,the scheme achieves an identity attribute hiding and verification protocol to support users in obtaining and applying their identity attributes without revealing concrete data.Finally,we analyze the security of the proposed architecture and implement a prototype system to evaluate its performance.The results demonstrate that our architecture ensures effective user digital identity management in 6G networks. 展开更多
关键词 The sixth generation(6G)network User-centric identity management Blockchain Decentralized identity Privacy preservation
在线阅读 下载PDF
Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment
6
作者 Huihui Zhu Fei Tang +1 位作者 Chunhua Jin Ping Wang 《Computers, Materials & Continua》 2026年第4期648-666,共19页
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto... The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols. 展开更多
关键词 User authentication key establishment CLIENT-SERVER HETEROGENEOUS SECURITY
在线阅读 下载PDF
Design of Navigation Message Authentication for BDSBAS System
7
作者 Chen Xiao Tian Xiang +2 位作者 Luo Ruidan Liu Ting Wu Haitao 《China Communications》 2026年第1期189-203,共15页
The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a ri... The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a risk of spoofing attacks.To improve the anti-spoofing capability of the SBAS,European Union and the United States conduct research on navigation message authentication,and promote the standardization of SBAS message authentication.For the development of Beidou satellite-based augmentation system(BDSBAS),this paper proposes navigation message authentication based on the Chinese commercial cryptographic standards.Firstly,this paper expounds the architecture and principles of the SBAS message authentication,and then carries out the design of timed efficient streaming losstolerant authentication scheme(TESLA)and elliptic curve digital signature algorithm(ECDSA)authentication schemes based on Chinese commercial cryptographic standards,message arrangement and the design of over-the-air rekeying(OTAR)message.Finally,this paper conducts a theoretical analysis of the time between authentications(TBA)and maximum authentication latency(MAL)for L5 TESLA-I and L5 ECDSA-Q,and further simulates the reception time of OTAR message,TBA and MAL from the aspects of OTAR message weight and demodulation error rate.The simulation results can provide theoretical supports for the standardization of BDSBAS message authentication. 展开更多
关键词 Beidou satellite-based augmentation system ECDSA message authentication satellite navigation TESLA
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
8
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 authentication key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
National identity and subjective well-being among college students:A sequential mediation analysis of collective and personal self-esteem
9
作者 Luming Zhao Jiaxi Zhang +1 位作者 Yan Zhang Jiaxi Peng 《Journal of Psychology in Africa》 2026年第1期1-8,共8页
The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49... The current study examined the roles of collective self-esteem and personal self-esteem in the relationship between national identity and subjective well-being.Participants were 583 Chinese college students(females=49%;mean age=19.25±1.85 years).They completed measures of national identity,collective self-esteem,personal self-esteem,and subjective well-being.Path analysis findings result indicated national identity to influence the students’subjective wellbeing through three pathways:(1)national identity→collective self-esteem→subjective well-being,meaning higher subjective wellbeing with collective self-esteem.(2)national identity→personal self-esteem→subjective well-being,to suggest higher personal self-esteem was associated with subjective wellbeing;(3)national identity→collective selfesteem→personal self-esteem→subjective well-being.Compared to simple mediation models constructed with only personal self-esteem or collective self-esteem as a single mediating variable,the chain mediation model better explains the mediating mechanism of national identity on subjective well-being(the variance explained by the mediating variables increased by 65.38%and 59.26%,respectively).The collective self-esteem and personal self-esteem mediation is consistent with social identity theory,whereby national identity enhances collective self-evaluation,which in turn bolsters personal self-worth and subjective well-being.These findings of the current study offer new insights into how national identity affects subjective well-being in collectivistic culture. 展开更多
关键词 National identity collective self-esteem personal self-esteem mediating effect
在线阅读 下载PDF
The Influence of Discrimination Perception on the Psychological Resilience among Vocational High School Students:Longitudinal Mediating Effect of Vocational Identity
10
作者 Lingyan Zhang Yuying Yang Zhuoxuan Huang 《International Journal of Mental Health Promotion》 2026年第2期112-124,共13页
Objectives:Psychological resilience is a critical resource for vocational high school students navigating social biases and fostering mental well-being.This six-month longitudinal study investigated the developmental ... Objectives:Psychological resilience is a critical resource for vocational high school students navigating social biases and fostering mental well-being.This six-month longitudinal study investigated the developmental trajectories of discrimination perception,vocational identity,and psychological resilience in this population.It further examined the longitudinal mediating role of vocational identity in the relationship between discrimination perception and psychological resilience.Methods:A total of 526 students from five vocational high schools in Guangdong,China,were assessed via convenience sampling at two time points:baseline(T1,September 2023)and six-month follow-up(T2,March 2024).Measures of discrimination perception,psychological resilience,and vocational identity were administered.Data were analyzed using a cross-lagged panel model to test for bidirectional relationships.Results:Over the six-month period,students showed significant decreases in discrimination perception and vocational identity,but a significant increase in psychological resilience.The cross-lagged model revealed significant bidirectional relationships:discrimination perception and psychological resilience negatively predicted each other over time(β=−0.124,p<0.01;β=−0.200,p<0.001),while psychological resilience and vocational identity positively predicted each other(β=0.084,p<0.05;β=0.076,p<0.05).The mediation analysis revealed a dual-pathway mechanism.T1 discrimination perception exerted both a significant direct negative effect on T2 psychological resilience(β=−0.332,p<0.001)and a significant indirect positive effect via T1 vocational identity(indirect effect=0.020,95%CI[0.001,0.046]).This confirms a partial mediating role,indicating that vocational identity functions as a compensatory mechanism,transforming the experience of discrimination perception into a potential source of psychological resilience.Conclusions:For vocational high school students,perception of discrimination directly undermines psychological resilience,but also indirectly fosters it through the positive development of vocational identity.These findings highlight vocational identity as a pivotal mechanism in the complex relationship between social adversity and mental resilience. 展开更多
关键词 Vocational high school students vocational identity discrimination perception psychological resilience
在线阅读 下载PDF
EARAS:An Efficient,Anonymous,and Robust Authentication Scheme for Smart Homes
11
作者 Muntaham Inaam Hashmi Muhammad Ayaz Khan +3 位作者 Khwaja Mansoor ul Hassan Suliman A.Alsuhibany Ainur Abduvalova Asfandyar Khan 《Computers, Materials & Continua》 2026年第3期780-797,共18页
Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share ... Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share over security,leading to insecure smart products.Traditional host-based protection solutions are less effective due to limited resources.Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters.In order to handle control,administration,and security concerns in traditional networking,the Gateway Node offers a contemporary networking architecture.By managing all network-level computations and complexity,the Gateway Node relieves IoT devices of these responsibilities.In this study,we introduce a novel privacy-preserving security architecture for gateway-node smart homes.Subsequently,we develop Smart Homes,An Efficient,Anonymous,and Robust Authentication Scheme(EARAS)based on the foundational principles of this security architecture.Furthermore,we formally examine the security characteristics of our suggested protocol that makes use of methodology such as ProVerif,supplemented by an informal analysis of security.Lastly,we conduct performance evaluations and comparative analyses to assess the efficacy of our scheme.Performance analysis shows that EARAS achieves up to 30%to 54%more efficient than most protocols and lower computation cost compared to Banerjee et al.’s scheme,and significantly reduces communication overhead compared to other recent protocols,while ensuring comprehensive security.Our objective is to provide robust security measures for smart homes while addressing resource constraints and preserving user privacy. 展开更多
关键词 Smart home user authentication gateway node security IoT security privacy and security
在线阅读 下载PDF
Research on the Influence of Professional Identity of Specialized Nurses on Core Competency Development and Enhancement Pathways
12
作者 Alima Khulan Gaalan +1 位作者 Solongo Dashnyam Baasanjav Nachin 《Journal of Clinical and Nursing Research》 2026年第2期385-389,共5页
Within contemporary healthcare systems, professional identity among specialized nurses serves as a pivotal intrinsic factor influencing the development of their core competencies. This review synthesizes existing rese... Within contemporary healthcare systems, professional identity among specialized nurses serves as a pivotal intrinsic factor influencing the development of their core competencies. This review synthesizes existing research, revealing that professional identity positively impacts the development of core competencies through multiple pathways, including psychological drive, behavioral facilitation, teamwork, and career stability. Building on this analysis, this paper proposes systematic enhancement strategies from four dimensions: education and training, organizational environment, cultural development, and individual growth, aiming to provide a reference for nursing practice and professional development. 展开更多
关键词 Specialized nurse Professional identity Core competency Nursing education Career development Enhancement pathways
暂未订购
MMF-CycleGAN:A Multi-Scale Generative Framework for Robust and Identity-Preserving Face Frontalization
13
作者 Swetha K Shiloah Elizabeth Darmanayagam Sunil Retmin Raj Cyril 《Computer Modeling in Engineering & Sciences》 2026年第3期934-966,共33页
Recognizing frontal faces from non-frontal or profile images is a major problem due to pose changes,self-occlusions,and the complete loss of important structural and textural components,depressing recognition accuracy... Recognizing frontal faces from non-frontal or profile images is a major problem due to pose changes,self-occlusions,and the complete loss of important structural and textural components,depressing recognition accuracy and visual fidelity.This paper introduces a new deep generative framework,Modified Multi-Scale Fused CycleGAN(MMF-CycleGAN),for robust and photo-realistic profile-to-frontal face synthesis.The MMF-CycleGAN framework utilizes pre-processing and then the generator employs a Deep Dilated DenseNet encoder-based hierarchical feature extraction along with a transformer and decoder.The proposed Multi-Scale Fusion PatchGAN discriminator enforces consistency at multiple spatial resolutions,leading to sharper textures and improved global facial geometry.Also,GAN training stability and identity preservation are improved through the Ranger optimizer,which effectively balances adversarial,identity,and cycle-consistency losses.Experiments on three benchmark datasets show that MMFCycleGAN achieves accuracy of 0.9541,0.9455,and 0.9422,F1-scores of 0.9654,0.9641,and 0.9614,and AUC values of 0.9742,0.9714,and 0.9698,respectively,and the extreme-pose accuracy(yaw>60°)reaches 0.92.Despite its enhanced architecture,the framework maintains an efficient inference time of 0.042 s per image,making it suitable for real-time biometric authentication,surveillance,and security applications in unconstrained environments. 展开更多
关键词 Face image frontalization CycleGAN DenseNet feature fusion PatchGAN discriminator optimization and identity preservation
在线阅读 下载PDF
Self-Presentation onWeChat Moments and Ego Identity in Emerging Adults: The Role of Online Positive Feedback and Gender
14
作者 Shuqing Wang Xiaorui Zhu +2 位作者 Xin Gao Jialing Deng Xiumei Yan 《International Journal of Mental Health Promotion》 2026年第3期183-204,共22页
Background:Emerging adulthood is a critical period for ego identity exploration and consolidation,and self-presentation on social media constitutes a salient online context for this developmental process.However,limit... Background:Emerging adulthood is a critical period for ego identity exploration and consolidation,and self-presentation on social media constitutes a salient online context for this developmental process.However,limited research has explored the associations between self-presentation on WeChat Moments and ego identity.This study aims to examine these associations,focusing on the mediating role of online positive feedback and the moderating role of gender.Methods:Using a three-wave longitudinal design,this study followed 767 Chinese college students(Mean age=18.96 years)through cluster sampling.Participants completed self-report questionnaires assessing self-presentation on WeChat Moments,online positive feedback,and ego identity status.Data analyses were conducted using mediation modeling and multi-group structural equation modeling.Results:Authentic self-presentation was positively associated with identity achievement and negatively associated with identity diffusion,whereas positive self-presentation was linked to higher levels of identity foreclosure.Online positive feedback played a significant mediating role in the associations between self-presentation strategies and identity statuses,and gender differences were observed in this mediating pathway.For both males and females,authentic self-presentation was associated with higher identity achievement through online positive feedback.However,indirect associations with identity foreclosure and diffusion were observed only among females:authentic self-presentation was linked to lower levels,whereas positive self-presentation was linked to higher levels of foreclosure and diffusion through online positive feedback.No comparable indirect associations were detected among males.Conclusions:Online positive feedback is closely linked to self-presentation strategies and ego identity statuses,with these associations varying by gender. 展开更多
关键词 Self-presentation on WeChat moments ego identity online positive feedback emerging adults
在线阅读 下载PDF
An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication 被引量:9
15
作者 刘文杰 陈汉武 +3 位作者 马廷淮 李志强 刘志昊 胡文博 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第10期4105-4109,共5页
A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit tw... A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. 展开更多
关键词 deterministic secure quantum communication cluster state identity authentication
原文传递
Economical multiparty simultaneous quantum identity authentication based on Greenberger-Horne-Zeilinger states 被引量:6
16
作者 杨宇光 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3233-3237,共5页
A multiparty simultaneous quantum identity authentication protocol based on Creenberger-Horne-Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. ... A multiparty simultaneous quantum identity authentication protocol based on Creenberger-Horne-Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. Compared with the scheme proposed recently (Wang et al 2006 Chin. Phys. Lett. 23(9) 2360), the proposed scheme has the advantages of consuming fewer quantum and classical resources and lessening the difficulty and intensity of necessary operations. 展开更多
关键词 quantum identity authentication multiparty simultaneous quantum identity authentication Greenberger-Horne-Zeilinger state
原文传递
Fine-Grained and Fair Identity Authentication Scheme for Mobile Networks Based on Blockchain 被引量:2
17
作者 Mengjuan Zhai Yanli Ren +1 位作者 Guorui Feng Xinpeng Zhang 《China Communications》 SCIE CSCD 2022年第6期35-49,共15页
With the popularity of the internet,users hope to better protect their privacy while obtaining network services.However,in the traditional centralized authentication scheme,identity information such as the user's ... With the popularity of the internet,users hope to better protect their privacy while obtaining network services.However,in the traditional centralized authentication scheme,identity information such as the user's private key is generated,stored,and managed by the network operator.Users can't control their identity information,which will lead to a great threat to the privacy of users.Based on redactable blockchain,we propose a fine-grained and fair identity authentication scheme for mobile networks.In our proposed scheme,the user's identity information is generated and controlled by the users.We first propose a notion of score chameleon hash(SCH),which can delete or update the information of illegal users so as to dynamically update the status of users and provide users with more fine-grained and fair services.We propose another notion of self-updating secret sharing(SUSS),which allows users to update the trapdoor and the corresponding hash key after redacting the blockchain without requiring trusted authority to redistribute the trapdoor.Experimental results show that,compared with the immutable blockchain Bitcoin,the redactable blockchain in our identity authentication scheme provides users with fine-grained and fair redacting functions,and can be adopted with a small additional overhead. 展开更多
关键词 identity authentication secret sharing chameleon hash redactable blockchain
在线阅读 下载PDF
Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing 被引量:4
18
作者 YANG Yanyan HU Mingsheng +2 位作者 KONG Shan GONG Bei LIU Xinxin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期134-140,共7页
In the cloud computing, different cloud service providers are often in different trust domains. As the traditional identity authentication mode cannot be applied to the cloud computing, the cross-domain identity authe... In the cloud computing, different cloud service providers are often in different trust domains. As the traditional identity authentication mode cannot be applied to the cloud computing, the cross-domain identity authentication mechanism is needed to solve the identity authentication problem in the cloud computing. In view of the security problems in cloud computing, a cross-domain identity authentication scheme based on group signature is proposed. This scheme introduces a group of cloud service providers and users who are located in different trust domains. Any member of the group can generate the signature on behalf of the whole group, making the user access the cloud service provider in the case of privacy security. At the same time, with traceability it can track illegal operation of illegal users. In addition, the scheme uses the Chinese Remainder Theorem to integrate the message, and it can control the length of the data in the calculation process, simplifying the calculation process. It also realizes the join and revocation of group members without changing the key of other legitimate group members, and the maintenance cost of authentication schemes is low. The results show that the scheme has the advantages of anonymity, anti-counterfeit, traceability, anti-joint attack and so on. It can not only realize tracking function under the condition of guaranteeing user's privacy, but can also simplify the authentication calculation process to improve the efficiency of the cross domain identity authentication, and its performance is more suitable for large-scale cloud computing environment. 展开更多
关键词 cloud computing cross-domain identity authentication group SIGNATURE Chinese REMAINDER THEOREM TRACEABILITY
原文传递
Sequence Patterns of Identity Authentication Protocols 被引量:2
19
作者 陶宏才 何大可 《Journal of Southwest Jiaotong University(English Edition)》 2006年第3期205-211,共7页
From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TFP). Ten feasible sequence... From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TFP). Ten feasible sequence patterns of authentication protocol with TIP and 5 sequence patterns without TFP are gained. These gained sequence patterns meet the requirements for identity authentication, and basically cover almost all the authentication protocols with TFP and without TFP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then, according to the sequence symmetry, several good sequence patterns with TFP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols. 展开更多
关键词 authentication protocol identity authentication Sequence pattern TTP
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部