期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Formal Compatibility Model for Trusted Computing Applications 被引量:2
1
作者 ZHU Lu YU Sheng +1 位作者 ZHANG Xing SHEN Changxiang 《Wuhan University Journal of Natural Sciences》 CAS 2009年第5期388-392,共5页
The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG sp... The Chinese specification for trusted computing, which has similar functions with those defined by the Trusted Computing Group (TCG), has adopted a different cryptography scheme. Applications designed for the TCG specifications cannot directly function on platforms complying with Chinese specifications because the two cryptography schemes are not compatible with each other. In order to transplant those applications with little to no modification, the paper presents a formal compatibility model based on Zaremski and Wing's type system. Our model is concerned not only on the syntactic compatibility for data type, but also on the semantic compatibility for cryptographic attributes according to the feature of trusted computing. A compatibility algorithm is proposed based on the model to generate adapters for trusted computing applications. 展开更多
关键词 trusted computing compatibility trusted cryptography module (TCM) TCM service module (TSM)
原文传递
Multiparty simultaneous quantum identity authentication with secret sharing 被引量:13
2
作者 YANG YuGuang WEN QiaoYan ZHANG Xing 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2008年第3期321-327,共7页
Two multiparty simultaneous quantum identity authentication(MSQIA)protocols based on secret sharing are presented.All the users can be authenticated by a trusted third party(TTP)simultaneously.In the first protocol,th... Two multiparty simultaneous quantum identity authentication(MSQIA)protocols based on secret sharing are presented.All the users can be authenticated by a trusted third party(TTP)simultaneously.In the first protocol,the TTP shares a random key K with all the users using quantum secret sharing.The ith share acts as the authentication key of the ith user.When it is necessary to perform MSQIA,the TTP generates a random number R secretly and sends a sequence of single photons encoded with K and R to all the users.According to his share,each user performs the corresponding unitary operations on the single photon sequence sequentially.At last,the TTP can judge whether the impersonator exists.The sec-ond protocol is a modified version with a circular structure.The two protocols can be efficiently used for MSQIA in a network.They are feasible with current technol-ogy. 展开更多
关键词 quantum identity authentication secret sharing quantum cryptography
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部