Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has de...Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has designed and implemented a spatial data watermarking service (SDWS) system which can provide a secure framework for data transaction and transfer via the Internet and protect the rights of both copyright owners and consumers at the same time.展开更多
This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an oracle.Mutually mistrustful Alice and Bob are able to agree and sign a series of documents in...This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an oracle.Mutually mistrustful Alice and Bob are able to agree and sign a series of documents in a way that makes it impossible(within the assumed security model)to repudiate their signatures.The number of signatures supported by a single public key is still limited,though by a large number.However,the security of the signature scheme is not diminished by repeated application,so when the capacity of a public key is exhausted the last transaction can be used to agree a new key.Some ramifications are discussed,security parameters evaluated and an application area delineated for the proposed concept.展开更多
In this paper, we put forward a weak blind quantum signature scheme based on quantum entanglement swapping of Bell states. Different from the existing quantum signature schemes, our scheme can offer two-step verificat...In this paper, we put forward a weak blind quantum signature scheme based on quantum entanglement swapping of Bell states. Different from the existing quantum signature schemes, our scheme can offer two-step verification security services to ensure the validity of the verification. In order to guarantee the unconditional security of the scheme, the quantum key distribution protocol and one-time pad encryption algorithm are employed in our scheme. Besides, the entanglement swapping of Bell states mechanism enhances the security of verification criteria. The proposed scheme has the properties of nonforgeability, nonrepudiation, lindness,and traceability.展开更多
基金Supported by the National High Technology Research and Development Program of China(No.2006AA12Z210)
文摘Nowadays, more and more digitalized spatial data are sold and transmitted on the Internet. Thus, there arises an important issue about copyright protection of the digital data. To solve this problem, this paper has designed and implemented a spatial data watermarking service (SDWS) system which can provide a secure framework for data transaction and transfer via the Internet and protect the rights of both copyright owners and consumers at the same time.
文摘This paper proposes and evaluates a new bipartite post-quantum digital signature protocol based on Winternitz chains and an oracle.Mutually mistrustful Alice and Bob are able to agree and sign a series of documents in a way that makes it impossible(within the assumed security model)to repudiate their signatures.The number of signatures supported by a single public key is still limited,though by a large number.However,the security of the signature scheme is not diminished by repeated application,so when the capacity of a public key is exhausted the last transaction can be used to agree a new key.Some ramifications are discussed,security parameters evaluated and an application area delineated for the proposed concept.
基金supported by the National Natural Science Foundation of China (grant no. 61273250)
文摘In this paper, we put forward a weak blind quantum signature scheme based on quantum entanglement swapping of Bell states. Different from the existing quantum signature schemes, our scheme can offer two-step verification security services to ensure the validity of the verification. In order to guarantee the unconditional security of the scheme, the quantum key distribution protocol and one-time pad encryption algorithm are employed in our scheme. Besides, the entanglement swapping of Bell states mechanism enhances the security of verification criteria. The proposed scheme has the properties of nonforgeability, nonrepudiation, lindness,and traceability.