期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem
1
作者 Cheng Guo Chin-Chen Chang 《Journal of Electronic Science and Technology》 CAS 2012年第3期250-255,共6页
This paper proposes a new proactive weighted threshold signature scheme based on Iflene's general secret sharing, the generalized Chinese remainder theorem, and the RSA threshold signature, which is itself based on t... This paper proposes a new proactive weighted threshold signature scheme based on Iflene's general secret sharing, the generalized Chinese remainder theorem, and the RSA threshold signature, which is itself based on the Chinese reminder theorem. In our scheme, group members are divided into different subgroups, and a positive weight is associated to each subgroup, where all members of the same subgroup have the same weight. The group signature can be generated if and only if the sum of the weights of members involved is greater than or equal to a fixed threshold value. Meanwhile, the private key of the group members and the public key of the group can be updated periodically by performing a simple operation aimed at refreshing the group signature message. This periodical refreshed individual signature message can enhance the security of the proposed weighted threshold signature scheme. 展开更多
关键词 Generalized Chinese remaindertheorem proactive weighted threshold signature RSAcryptosystem secret sharing.
在线阅读 下载PDF
An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem 被引量:2
2
作者 Jingjing Wang Yiliang Han Xiaoyuan Yang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期260-269,共10页
Traditional k-anonymity schemes cannot protect a user's privacy perfectly in big data and mobile network environments. In fact, existing k-anonymity schemes only protect location in datasets with small granularity. B... Traditional k-anonymity schemes cannot protect a user's privacy perfectly in big data and mobile network environments. In fact, existing k-anonymity schemes only protect location in datasets with small granularity. But in larger granularity datasets, a user's geographical region-location is always exposed in realizations of k-anonymity because of interaction with neighboring nodes. And if a user could not find enough adjacent access points, most existing schemes would be invalid. How to protect location information has become an important issue. But it has not attracted much attention. To solve this problem, two location-privacy protection models are proposed. Then a new generalized k-anonymity Location Privacy Protection Scheme based on the Chinese Remainder Theorem (LPSS-CRT) in Location-Based Services (LBSs) is proposed. We prove that it can guarantee that users can access LBSs without leaking their region-location information, which means the scheme can achieve perfect anonymity. Analysis shows that LPPS-CRT is more secure in protecting location privacy, including region information, and is more efficient, than similar schemes. It is suitable for dynamic environments for different users' privacy protection requests. 展开更多
关键词 location privacy protection generalized k-anonymity location-based services the Chinese remaindertheorem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部