军事学 >>> 军事学
搜索结果: 1-12 共查到军事学 braid groups相关记录12条 . 查询时间(0.109 秒)
The rapid development of quantum computing makes public key cryptosystems not based on commutative algebraic systems hot topic. Because of the non-commutativity property, the braid group with braid in...
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid...
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid ...
A proxy blind signature scheme is the combination of proxy signature and blind signature scheme. In 2009,Verma proposed a proxy blind signature scheme over braid groups. Verma claimed that the prop...
Linkability of Blind Signature Schemes over Braid Groups     Linkability  Blind Signature Schemes  Braid Groups       font style='font-size:12px;'> 2009/6/12
Blindness and unforgeability are two essential security requirements of a secure blind signature scheme. Blindness means that after interacting with various users, the signer can never be able to l...
Delegation of powers is a common practice in the real world. To realized the delegation of powers electronically, Mambo,Usuda and Okamoto proposed the first proxy signature scheme in 1996. Since th...
A Proxy Signature Scheme over Braid Groups     Proxy Signature  Conjugacy Decision Problem  Braid groups       font style='font-size:12px;'> 2009/6/3
Proxy signatures, introduced by Mambo, Usuda and Okamoto, allow a designated person to sign on behalf of an original signer. Braid groups has been playing an important role in the theory of cryptog...
Blind signature scheme over Braid groups     Blind signature  Braid groups  Conjugcy search problem       font style='font-size:12px;'> 2009/6/2
A blind signature scheme is a cryptographic protocol for obtaining a signature from a signer such that the signer’s view of the protocol cannot be linked to the resulting message signature pair. In ...
Algorithms in Braid Groups     Algorithms  Braid Groups  cryptographic operations       font style='font-size:12px;'> 2009/4/9
Braid Groups have recently been considered for use in Public-Key Cryptographic Systems. The most notable of these system has been the Birman-Ko-Lee system presented at Crypto 2000. This article give...
In this paper, we extend the 2-party key exchange protocol on braid groups to the group key agreement protocol based on the hardness of Ko-Lee problem. We also provide authenticity to the group key ...
A Practical Attack on the Root Problem in Braid Groups     Practical Attack  Root Problem  Braid Groups       font style='font-size:12px;'> 2009/3/19
Using a simple heuristic approach to the root problem in braid groups, we show that cryptographic parameters proposed in this context must be considered as insecure. In our experiments we can, often...
Designated Verifier Signature Scheme Based on Braid Groups     braid groups  conjugacy search problem  root problem       font style='font-size:12px;'> 2008/12/19
Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we first propose the designated verifier group signature scheme based on the conjugacy se...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...