Zobrazeno 1 - 10
of 25
pro vyhledávání: '"ZHU Yue-fei"'
Publikováno v:
Tongxin xuebao, Vol 31, Pp 73-80 (2010)
A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,an
Externí odkaz:
https://doaj.org/article/152890636f1e43459d93eaf9e072f6c3
Publikováno v:
Application Research of Computers / Jisuanji Yingyong Yanjiu. Jan2015, Vol. 32 Issue 1, p214-221. 5p.
Publikováno v:
Wuhan University Journal of Natural Sciences. 12:87-90
In the last couple of years, ID-based cryptography has got fruitful achievements. Proxy multi-signature allows a desig- nated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general securi
Autor:
Wu Shuhua, Zhu Yue-fei
Publikováno v:
Wuhan University Journal of Natural Sciences. 11:1433-1436
This paper, focusing on the trusted computing group's standards, explained the key concept of trusted computing and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted softw
Autor:
Wu Shuhua, Zhu Yue-fei
Publikováno v:
Wuhan University Journal of Natural Sciences. 11:1625-1628
We presented a simple and efficient password-based encrypted key exchange protocol that allows a user to establish secure session keys with remote servers from client terminals in low resource environments. He does not need to carry smart card storin
Publikováno v:
Wuhan University Journal of Natural Sciences. 11:1621-1624
Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if suc
Publikováno v:
Wuhan University Journal of Natural Sciences. 11:193-197
ID-based public key cryptosystem can be a good alternative for certificate-based public key setting. This paper provides an efficient ID-based proxy multi-signature scheme from pairings. In the random oracle model, we prove that our new scheme is sec
Publikováno v:
Wuhan University Journal of Natural Sciences. 10:235-238
An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure (session key secure) in the AM (authenticated links adversarial model) provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we appl
Publikováno v:
Wuhan University Journal of Natural Sciences. 10:275-278
This paper provides theoretical foundations for the secure proxy signature primitive. We present a formal model for the security of proxy signature schemes, which defines the capabilities of the adversary and the security goals to capture which mean
Autor:
Su Yun-xue, Zhu Yue-fei
Publikováno v:
Wuhan University Journal of Natural Sciences. 9:745-748
This paper describes the research results and development of fair off-line e-cash systems so far, and points out that in these systems, the bank can compute the double-spender’s account secret key, thus the bank can impersonate the double-spender t