The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we give the secure model of certificate-based signature (CBS) and propose an efficient CBS scheme. The proposed scheme is shown to be existentially unforgeable against adaptive chosen message and identity attacks under the discrete logarithm assumption in the random oracle model. Compared with the schemes in RSA 2004 and in EuroPKI 2007, no pairing computation and the special MapToPoint...
Blind decoding schemes are proposed as tools for protecting customerspsila privacy in on-line shopping for electronic documents such that the company has no way of knowing which documents the customers have purchased. Most of the blind decoding schemes suffer from the oracle problem. Schemes utilizing the transformability of digital signatures were proposed to ensure the correctness of the requests...
A new concept called multi-proxy multi-signcryption is introduced in this paper. In a multi-proxy multi-signcryption scheme, a group of original signcrypters can authorize a group of proxy signcrypters under the agreement of all signcrypters in the original group. Then only the cooperation of all signcrypters in the proxy group could generate a multi-proxy multi-signcryption. We propose a multi-proxy...
Source address authentication is very important to change current serious network security situation. In this article, we propose a new source address validation scheme based on IBS algorithm and study its security using SVO logic. We find that our scheme can successfully guarantees authenticity of IP packetpsilas information source.
A digital certificate scheme in content protection system for high definition digital interfaces is proposed. Before transferring the encryption content, the device interface is firstly confirmed whether it is passed the certification. After the certification, then transfers the content. The interface of the receiver detects whether the recognition management unit has passed the certification. The...
The combination of the wireless sensor network (WSN) and grid computing in wireless sensor grid (WSG) architecture enables the strengths and characteristics of wireless sensor network and grid computing to be realized on a single integrated platform. This paper analyzes the necessity and key problems of combining the WSN and grid computing and shows a sensor grid architecture which is based on an...
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furthermore it solves the abuse using off-line trusted third party (TTP). The security and fairness are also possessed in the protocol.
Blind signature is very important technology in secure e-commerce. Certificateless public key cryptography avoids the using of certificate in certificate-based public key signature scheme and removes key escrow in ID-based signature scheme. In this paper we introduce the notion of blind signature into certificateless public key cryptography and propose a concrete certificateless blind signature scheme...
Proxy blind signature is a cryptographic research hotspot, and has been applied in many occasions. Many proxy blind signature schemes were proposed, however, all the schemes rely on secure channels to transmit proxy secret key. Therefore, Lu, Cao and Zhou proposed a new proxy blind multi-signature scheme recently, which does not need a secure channel and is provably secure under the random oracle...
A blind signature is a very important technology in e-commerce. This paper uses an ideal cipher with a smaller block size to design a secure two-move blind signature with an optimal padding. Our new scheme has the message recovery property with less bandwidth, which means the user can recover the message from the signature signed by the signer, but costs no other bandwidth to save power and battery...
In order to solve the data integrity, non-repudiation, confidentiality and operation inefficiency of the mobile e-commerce, in this paper, mobile e-commerce security model is established. The design is based on mobile e-commerce architecture, analyzing the digital signature authentication process and data security transmission procedure in the system. Delamination modularized software design method...
In CT-RSA 2008, Yu et al. proposed a family of three efficient Online/Offline signature schemes, which are especially suitable for the devices with limited computing capabilities. In this paper, we propose a new security model of Online/Offline signature. We find that Yu et al.' basic scheme is insecure under our model. We repair Yu et al.'s loophole by proposing a modified scheme.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.