期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Improvement of M-U-O and K-P-W proxy signature schemes 被引量:10
1
作者 李继国 曹珍富 张亦辰 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2002年第2期145-148,共4页
The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer in 1996. However, most existing proxy signature schemes... The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer in 1996. However, most existing proxy signature schemes does not support nonrepudiation. In this paper, we propose two secure nonrepudiable proxy signature schemes, which overcome disadvantages of M U O and K P W proxy signature schemes, respectively. The schemes proposed can withstand public key substitution attack and forge attack. In addition, our new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. Our approach can also be applied to other ElGamal like proxy signature schemes. 展开更多
关键词 nonrepudiable DIGITAL SIGNATURE PROXY SIGNATURE MULTI-SIGNATURE
在线阅读 下载PDF
Accountability Analysis of Electronic Commerce Protocols by Finite Automaton Model 被引量:2
2
作者 Xie Xiao-yao 1,2 , Zhang Huan-guo 1 1. School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2. Institute of Network Technology, Guizhou University of Technology, Guiyang 550003, Guizhou, China 《Wuhan University Journal of Natural Sciences》 CAS 2004年第3期293-295,共3页
The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze th... The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze the transaction protocols in the application of electronic commerce. Key words finite automaton - electronic commerce - nonrepudiation - information security CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (66973034, 90104005, 60373087)Biography: Xie Xiao-yao (1952-), male, Professor, Ph. D candidate, research direction: information security. 展开更多
关键词 finite automaton electronic commerce nonrepudiation information security
在线阅读 下载PDF
Convertible Proxy Signcryption Scheme 被引量:1
3
作者 李继国 李建中 +1 位作者 曹珍富 张亦辰 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第2期209-213,共5页
In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed... In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature. However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes. To protect the receiver's benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which can enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu' s scheme and improved Kim's scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition, the proposed scheme can be extended to convertible threshold proxy signcryption scheme. 展开更多
关键词 proxy signcryption nonrepudiation digital signature proxy signature
在线阅读 下载PDF
Experimental demonstration of complete quantum e-commerce based on an efficient quantum digital payment
4
作者 SHUAISHUAI LIU YU ZHANG +4 位作者 SHAOBO REN SI QIU ZHENGUO LU XUYANG WANG YONGMIN LI 《Photonics Research》 2025年第3期572-582,共11页
With the rapid spread of Internet technology,e-commerce is gradually becoming an integral part of the modern business models.The e-commerce transactions should obey integrity,authentication,nonrepudiation,traceability... With the rapid spread of Internet technology,e-commerce is gradually becoming an integral part of the modern business models.The e-commerce transactions should obey integrity,authentication,nonrepudiation,traceability,and impartiality.Here,we propose and demonstrate a complete continuous-variable quantum e-commerce scheme,which involves subscription,payment,transport,and reception protocols among five parties.To this end,a simple,efficient quantum digital payment scheme is proposed.Furthermore,we streamline the entire e-commerce process by eliminating the private amplification step in the pre-distribution of keys.We achieve a contract signing rate of 1.51×10^(3)times per second for a 33 kilobits contract,and a payment rate of 2.70×10^(3)times per second over 80 km of single-mode fiber.Our results can support 411 times complete transactions per second,including three contract signings and two separate monetary payments.The proposed scheme takes into account the compatibility with existing e-commerce platforms to ensure a smooth transition and provides a practical solution for quantum e-commerce at metropolitan distances. 展开更多
关键词 quantum e commerce integrity continuous variable quantum nonrepudiation streamline t business modelsthe digital payment authentication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部