简介:Aggregatesignaturesareausefulprimitivewhichallowsaggregatingmanysignaturesondifferentmessagescomputedbydifferentusersintoasingleandconstant-lengthsignatureandadaptstoMobileAdhocNETwork(MANETs)verymuch.JuminSong,etal.presentedanID-basedaggregatesignature,appliedittoMANETsandproposedasecureroutingscheme.Inthiswork,weanalyzeJuminSong,etal.’saggregatesignatureschemeandfindsomelimitationsonitsbatchverification.Inaddition,inthiswork,weapplyCraigGentry,etal.’sID-basedaggregatesignaturetoon-demandroutingpro-tocoltopresentasecureroutingscheme.Ourschemenotonlyprovidessoundauthenticationandasecureroutingprotocolinadhocnetworks,butalsomeetsthenatureofMANETs.
简介:在信任计算的一个重要函数是保护的存储,它能保护数据和钥匙的无限的数量。在存在为信任站台的信任站台模块(TPM)钥匙装载计划,有是的TPM的一个计算平台它的信任的锚,装载操作的全部的时间与装载目标目标的祖先的数字一样,导致装载有许多祖先的一把TPM钥匙的低效率。改进效率,装载计划的一把基于身份的TPM钥匙被建议。在这个计划,装载操作的时间当任何TPM钥匙被装进TPM时,仅仅是二。因此,要求的时间花费了因为装载一个TPM关键罐头被减少,特别为复杂TPM关键存储层次。由分析正确性,安全,效率和可行性,建议计划有更好理论并且应用程序价值。
简介:Withouttheassumptionthattheprivatekeysarekeptsecureperfectly,cryptographicprimitivescannotbedeployedintheinsecureenvironmentswherethekeyleakageisinevitable.Inordertoreducethedamagecausedbythekeyexposureintheidentity-based(ID-based)signaturescenariosefficiently,weproposeanID-basedkey-insulatedsignatureschemeinthispaper,whicheliminatestheexpensivebilinearpairingoperations.Comparedwiththepreviouswork,ourschememinimizesthecomputationcostwithoutanyextracost.Underthediscretelogarithm(DL)assumption,asecurityproofofourschemeintherandomoraclemodelhasalsobeengiven.
简介:当前基于身份(标志)cryptosystem缺乏两大政党的认证和用户的私人钥匙的机制分发。一些基于标志的signcryption计划和基于标志的证实的关键协议协议被介绍了,但是他们不能完全解决这个问题。一个新奇基于标志的认证计划基于基于标志的加密(IBE)和指纹哈希方法被建议在IBE计划解决困难,它包括证实发送者的消息接收装置,证实用户并且把私人钥匙传给他们的信任权威(TA)。而且,计划从终端扩大指纹认证的应用程序到网络并且免于指纹数据制造。指纹认证方法由二个因素组成。这个方法联合一个标志例如,给USB钥匙调音,与用户由混合有指纹特征的一个假散乱数字的指纹回锅肉丁。安全和试验性的效率满足实际应用的要求。
简介:In2010,Hwang,etal.proposeda'DoS-resistantID-basedpasswordauthenticationschemeusingsmartcards'asanimprovementofKim-Lee-Yoo's'ID-basedpasswordauthenticationscheme'.Inthispaper,wecryptanalyzeHwang,etal.'sschemeandpointoutthattherevealedsessionkeycouldthreatthesecurityofthescheme.Wedemonstratethatextractinginformationfromsmartcardsisequaltoknowingthesessionkey.Thusknownsessionkeyattacksarealsoeffectiveundertheas-sumptionthattheadversarycouldobtaintheinformationstoredinthesmartcards.WeproposedanimprovedschemewithsecurityanalysistoremedytheweaknessesofHwang,etal.'sscheme.Thenewschemedoesnotonlykeepallthemeritsoftheoriginal,butalsoprovidesseveraladditionalphasestoimprovetheflexibility.Finally,theimprovedschemeismoresecure,efficient,practical,andconvenient,becauseellipticcurvecryptosystemisintroduced,theexpensivesmartcardsandsynchronizedclocksystemarereplacedbymobiledevicesandnonces.