Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Bionic evolution is an adaptive artificial intelligence technique; it mimics natural evolution process to solve optimization problems. In the paper, we present an improved proxy signature scheme based on bionic evolution. In the scheme, the original private key is generated with bionic evolution algorithm by a successive optimizing process. The optimizing selection algorithm renders effective protection...
HCC (Hyper-elliptic Curves Cryptosystem) is a typical fast public key cryptosystem; it has much superiority in security and application efficiency. We introduced HCC into the designing and analyzing of blind signature, and presented an improved blind signature scheme based on HCC. By utilizing probabilistic encryption and blinding algorithm, the entrusted signer has no knowledge of the message while...
The concept of proxy re-cryptography comes from the work of Blaze, Bleumer, and Strauss in 1998. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without relying on trusted parties. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE to CBE, IBE to CBE, CBE to IBE and IBE to IBE. Now CBE to IBE and IBE...
The signcryption scheme presented by Zheng uses hash function and symmetrical cipher to encrypt message. The first protocol for threshold generation of Zhengpsilas signcryption scheme couldnpsilat support multiple public verifiers. In this paper, we proposed a new signcryption scheme based on EC-ELGamal type encryption. Message to be transmitted is embedded in Elliptic Curve as a point P(m) and encrypted...
Analyses were made on the basic principles of group signature and HCC (hyper-elliptic curves cryptosystem); as to the security problems and system weakness of present group signature schemes, we presented an improved group signature scheme based on HCC. By blinding identity of group members and generating identity certificate for each member, the scheme reduces the complexity in group managing and...
This paper analyzed the basic principles of secret sharing in threshold cryptosystem and its superiority considering its application in key management. Combining secret sharing and key management, we present a threshold key management scheme based on ECC (elliptic curve cryptosystem).By utilizing secret sharing and probabilistic encryption algorithm in key generating and distributing, the scheme achieves...
Multi-receiver signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of signature and multi-receiver encryption. Generalized Multi-Receiver signcryption can provide authenticity or confidentiality separately under specific inputs. Based on ECDSA, a generalized Multi-Receiver signcryption scheme is designed. It will be equivalent to ECDSA or multi-receiver encryption...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.