搜索结果: 1-12 共查到“军事学 braid groups”相关记录12条 . 查询时间(0.055 秒)
A Strong Blind Signature Scheme over Braid Groups
Braid Group Blind Signature One-more Matching Conjugacy Random Oracle Model
2009/12/29
The rapid development of quantum computing makes public key cryptosystems not based on commutative algebraic systems hot topic. Because of the non-commutativity property, the braid group with braid in...
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
proxy signature braid group conjugacy search problem
2009/9/27
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper
firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid...
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
proxy signature braid group conjugacy search problem
2009/9/22
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid ...
On the Security of a Proxy Blind Signature Scheme over Braid Groups
Security Proxy Blind Signature Scheme Braid Groups
2009/7/22
A proxy blind signature scheme is the combination of
proxy signature and blind signature scheme. In 2009,Verma
proposed a proxy blind signature scheme over braid groups.
Verma claimed that the prop...
Linkability of Blind Signature Schemes over Braid Groups
Linkability Blind Signature Schemes Braid Groups
2009/6/12
Blindness and unforgeability are two essential security
requirements of a secure blind signature scheme.
Blindness means that after interacting with various
users, the signer can never be able to l...
Security Analysis of a Proxy Signature Scheme over Braid Groups
Proxy Signature Scheme Braid Groups signer and proxy singer changing attacks
2009/6/12
Delegation of powers is a common practice in the
real world. To realized the delegation of powers electronically,
Mambo,Usuda and Okamoto proposed the
first proxy signature scheme in 1996. Since th...
A Proxy Signature Scheme over Braid Groups
Proxy Signature Conjugacy Decision Problem Braid groups
2009/6/3
Proxy signatures, introduced by Mambo, Usuda and
Okamoto, allow a designated person to sign on behalf of an original
signer. Braid groups has been playing an important role in the theory of
cryptog...
Blind signature scheme over Braid groups
Blind signature Braid groups Conjugcy search problem
2009/6/2
A blind signature scheme is a cryptographic protocol for
obtaining a signature from a signer such that the signer’s view of the
protocol cannot be linked to the resulting message signature pair. In ...
Braid Groups have recently been considered for use in Public-Key
Cryptographic Systems. The most notable of these system has been the
Birman-Ko-Lee system presented at Crypto 2000. This article give...
An Authenticated Group Key Agreement Protocol on Braid groups
braid groups conjugacy problem key agrement protocol
2009/4/8
In this paper, we extend the 2-party key exchange protocol on braid groups
to the group key agreement protocol based on the hardness of Ko-Lee problem. We also
provide authenticity to the group key ...
A Practical Attack on the Root Problem in Braid Groups
Practical Attack Root Problem Braid Groups
2009/3/19
Using a simple heuristic approach to the root problem in braid
groups, we show that cryptographic parameters proposed in this context must
be considered as insecure. In our experiments we can, often...
Designated Verifier Signature Scheme Based on Braid Groups
braid groups conjugacy search problem root problem
2008/12/19
Artin's braid groups have been recently suggested as a new source for public-key
cryptography. In this paper we first propose the designated verifier group signature
scheme based on the conjugacy se...