The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To solve the problem existing in the current evaluate methods for cryptographic modules, this paper points out that the evaluation ability should consider effect of measures and the depth defense which includes the aspects of technology, management, operation. Describe the principle and way to establish a scientific indexes. In the end, the paper builds the detailed index systems of cryptographic...
The security management of group key is essential to secure multicast. This paper analyzes the advantages and disadvantages of a key management scheme for secure multicast, and proposes a new rekeying scheme based on it. By adding one-way hash function, some users can calculate the keys along the path from their own point to root by themselves, and during a departure procedure, one user is selected...
In order to offer security for multicast applications, the group key has to be changed whenever a user joins or leaves the group. At present, there are two re-keying strategies: individual re-keying and batch re-keying. Individual re-keying method has the problems of inefficient and out-of-sync. Batch re-keying method alleviates these problems, but this method ignores the change probabilities of members...
Information security is becoming increasingly important in our information driven society. Cryptography is one of the most effective ways to enhance information security. Biometrics based cryptographic key generation techniques, in which biometric features are used to generate cryptographic keys, have been developed to overcome the shortages of the traditional cryptographic methods. An essential issue...
Mobile code can be considered composing of functions. Sander et al implemented non-interactive evaluation of encrypted functions(non-interactive EEF) based on homomorphism. But their scheme is limited to encrypting polynomials in positive integer domain. There is no homomorphism that can securely implement non-interactive evaluation of encrypted elementary functions (non-interactive EEEF) in real...
Sander and Tschudin proposed mobile code protection scheme - evaluation of encrypted functions implemented by homomorphisms based on exponentiation and Goldwasser Micali, but no homomorphisms enable to hide the skeleton and equal coefficient information of a polynomial. To solve the problems, an idea of approximate decryption and a new revised ElGamal are proposed in this paper. Three new public-key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.