搜索结果: 1-15 共查到“军队指挥学 braid”相关记录16条 . 查询时间(0.062 秒)
A Strong Blind Signature Scheme over Braid Groups
Braid Group Blind Signature One-more Matching Conjugacy Random Oracle Model
2009/12/29
The rapid development of quantum computing makes public key cryptosystems not based on commutative algebraic systems hot topic. Because of the non-commutativity property, the braid group with braid in...
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
proxy signature braid group conjugacy search problem
2009/9/27
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper
firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid...
Security Analysis and Design of Proxy Signature Schemes over Braid Groups
proxy signature braid group conjugacy search problem
2009/9/22
The braid groups have attracted much attention as a new platform of constructing cryptosystems. This paper firstly analyzes the security vulnerabilities of existing proxy signature schemes over braid ...
On the Security of a Proxy Blind Signature Scheme over Braid Groups
Security Proxy Blind Signature Scheme Braid Groups
2009/7/22
A proxy blind signature scheme is the combination of
proxy signature and blind signature scheme. In 2009,Verma
proposed a proxy blind signature scheme over braid groups.
Verma claimed that the prop...
Linkability of Blind Signature Schemes over Braid Groups
Linkability Blind Signature Schemes Braid Groups
2009/6/12
Blindness and unforgeability are two essential security
requirements of a secure blind signature scheme.
Blindness means that after interacting with various
users, the signer can never be able to l...
Security Analysis of a Proxy Signature Scheme over Braid Groups
Proxy Signature Scheme Braid Groups signer and proxy singer changing attacks
2009/6/12
Delegation of powers is a common practice in the
real world. To realized the delegation of powers electronically,
Mambo,Usuda and Okamoto proposed the
first proxy signature scheme in 1996. Since th...
A Proxy Signature Scheme over Braid Groups
Proxy Signature Conjugacy Decision Problem Braid groups
2009/6/3
Proxy signatures, introduced by Mambo, Usuda and
Okamoto, allow a designated person to sign on behalf of an original
signer. Braid groups has been playing an important role in the theory of
cryptog...
Blind signature scheme over Braid groups
Blind signature Braid groups Conjugcy search problem
2009/6/2
A blind signature scheme is a cryptographic protocol for
obtaining a signature from a signer such that the signer’s view of the
protocol cannot be linked to the resulting message signature pair. In ...
Entity Authentication Schemes Using Braid Word Reduction
braid group authentication zero knowledge handle reduction
2009/4/15
Artin’s braid groups currently provide a promising background for cryptographical
applications, since the first cryptosystems using braids were introduced in
[2, 3, 18] (see also [22]). A variety of...
Braid Groups have recently been considered for use in Public-Key
Cryptographic Systems. The most notable of these system has been the
Birman-Ko-Lee system presented at Crypto 2000. This article give...
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem
Braid group Non-abelian group Conjugacy Problem
2009/4/8
We propose the first polynomial time algorithm for the braid Diffie-
Hellman conjugacy problem (DHCP) on which the braid key exchange scheme and
the braid encryption scheme are based [10]. We show t...
An Authenticated Group Key Agreement Protocol on Braid groups
braid groups conjugacy problem key agrement protocol
2009/4/8
In this paper, we extend the 2-party key exchange protocol on braid groups
to the group key agreement protocol based on the hardness of Ko-Lee problem. We also
provide authenticity to the group key ...
A Practical Attack on the Root Problem in Braid Groups
Practical Attack Root Problem Braid Groups
2009/3/19
Using a simple heuristic approach to the root problem in braid
groups, we show that cryptographic parameters proposed in this context must
be considered as insecure. In our experiments we can, often...
On an authentication scheme based on the Root Problem in the braid group
authentication scheme Root Problem braid group
2009/2/23
Lal and Chaturvedi proposed two authentication schemes
based on the difficulty of the Root Problem in the braid group. We
point out that the first scheme is not really as secure as the Root
Problem...
Designated Verifier Signature Scheme Based on Braid Groups
braid groups conjugacy search problem root problem
2008/12/19
Artin's braid groups have been recently suggested as a new source for public-key
cryptography. In this paper we first propose the designated verifier group signature
scheme based on the conjugacy se...