Search
Search Results
-
Another ID-based proxy signature scheme and its extension
So far, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy non-repudiation. In this...
-
Provable efficient certificateless group key exchange protocol
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to...
-
Collapsing the Wave Function of Meaning: The Epistemological Matrix of Talk-in-Interaction
Devoted to an explication of how interacting agents mutually and micro-temporally provide for each other the grounds for immediate next action in the... -
Escrow-free certificate-based authenticated key agreement protocol from pairings
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based...
-
Electronic payment scheme to prevent the treachery
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic...
-
Identity based group key agreement in multiple PKG environment
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative...
-
Improved authenticated multi-key agreement protocol
Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share...
-
Practical Internet voting protocol without strong physical assumption
Internet voting protocols is the base of the Internet voting systems. In this paper a new practical Internet voting protocol is introduced. The...
-
Efficient certificateless authenticated key agreement protocol from pairings
In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient...
-
An improved identity-based society oriented signature scheme with anonymous signers
In this paper, we present an improved identity-based society oriented signature scheme with anonymous signers, which satisfies: (1) when members...
-
A new protocol for multi-item electronic auctions
The authors propose a new protocol for multizzitem electronic auctions. It has the following advantages: first, the protocol is more applicable and...
-
Homomorphism key agreement based on RSA
This paper reviews the basic content of key management, points out the limitation of the existing key agreement protocols. It introduces RSA public...
-
Systems Support for Remote Visualization of Genomics Applications over Wide Area Networks
Microarray experiments can provide molecular-level insight into a variety of biological processes, from yeast cell cycle to tumorogenesis. However,... -
A method of homomorphic encryption
The existing homomorphic encryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication...
-
A cluster-based secure active network environment
We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in...
-
Atomic electronic contract protocol based on convertible signature
A new class of atomicity, namely contract atomicity is presented. A new technical strategy based on convertible signature and two-phase commitment is...
-
Distribution of random session key based on key-insulated public-key cryptosystems
Based on the characteristic of key-insulated public-key cryptosystem, we propose a distributed random session keys distribution protocol without a...
-
A new images hiding scheme based on chaotic sequences
We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use...