首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
针对基于身份加密方案中匿名性和密钥托管问题,利用阶为合数的双线性群,基于Waters方案和Goyal思想,提出一个标准模型下可证安全的基于身份第三方权利受约束匿名加密方案。分析表明,基于困难问题下DBDH假设和DL假设,证明该方案满足匿名性和第三方权利受约束性质,所提方案不仅可以保护接收者的隐私,同时还解决了密钥托管问题。  相似文献   

2.
构造了一个新的匿名基于身份加密(IBE)方案,并将其扩展为一个匿名分等级基于身份加密(HIBE)方案.新方案的构造中使用了合数阶双线性群,利用相同子群中的元素对公共参数和密文进行盲化,从而实现方案的匿名性;利用不同子群中的元素构造用户私钥,从而达到正确解密的目的.其安全性证明使用了Lewko和Waters提出的构造双系...  相似文献   

3.
目前基于身份的广播加密方案多为非匿名方案,安全性较差。为此,将基于身份的匿名加密定义拓展为基于身份的匿名广播加密,在Zhang等人方案(Mathematical and Computer Modelling,2012,No.1)的基础上,结合合数阶双线性群的性质,并基于3个静态假设,构造一种基于身份的匿名广播加密方案。该方案的安全性不依赖于随机预言机,其中的密文和私钥均为固定长度,安全性可达到适应性安全。同时方案具有匿名性,敌手不能通过密文得到接收者的任何身份信息,从而保护了接收者的隐私。通过分析方案的效率验证了其正确性和安全性,并与同类方案进行比较,表明该方案更具优势。  相似文献   

4.
针对目前基于身份的加密方案大都不是匿名的,结合合数阶双线性群的性质,同时基于双线性DH假设构造了一个新的基于身份的匿名加密方案。结果表明,方案的安全性不依赖于随机预言机,密文和私钥均为固定长度。最重要的一点是方案实现了匿名性,由于密文不能得到接收者的任何身份信息,从而保护了接收者的隐私。最后分析了方案的效率,并和类似方案进行了对比。  相似文献   

5.
明洋  原红平  孙变  乔正阳 《计算机应用》2016,36(10):2762-2766
针对现实中广播加密的安全问题,提出一种标准模型下高效的基于身份匿名广播加密方案。匿名广播加密中广播者加密数据通过广播信道发送给用户,其中只有授权用户能够解密获得数据,同时任何人不能分辨出加密数据是发送给哪个用户的,从而保护了接收者用户的隐私。所提方案利用双系统加密技术,基于合数阶双线性群提出。同时,该方案基于静态假设,在标准模型中证明方案是选择明文安全的,密文和密钥取得了固定长度。和对比方案相比,所提方案密钥长度仅需2个群元素,同时方案满足匿名性。  相似文献   

6.
针对现有的匿名广播加密方法在加解密性能和安全性方面的不足,提出一种基于拉格朗日插值多项式的匿名广播加密方法。首先定义了可以抵御自适应敌手攻击的匿名广播加密安全模型;然后在合数阶双线性群环境下采用拉格朗日插值多项式对方案进行了构建,在保证用户身份匿名性的同时,实现了高效的加解密;最后基于子群判定假设和合数阶判定双线性Diffie-Hellman假设,在标准模型下证明了方法针对自适应敌手具有密文的机密性和接收者匿名性。实验与性能分析表明,方法具有较低的通信和计算开销,可以有效地解决云存储中密文数据的匿名访问控制问题。  相似文献   

7.
田园  李明楚  陈治宇 《计算机学报》2007,30(10):1813-1826
公钥加密方案的匿名性(亦称公钥隐密性)与数据保密性同样都具有重要应用价值.文中首先建立关于公钥加密方案的两个通用的新概念,即相对匿名性和相对保密性.通过这些较弱的安全性概念,证明了关于公钥加密方案匿名性质的两类一般性结果.第一类结果建立了公钥加密方案的保密性与匿名性之间两个对偶式的普遍关系,即相对匿名性(相对保密性)连同保密性(匿名性)蕴涵匿名性(保密性);第二类结果给出两个典型的混合加密构造(即Fujisaki-Okamoto构造和Okamoto-Pointcheval构造(REACT))选择密文匿名的充分条件,这些条件仅包括特定意义上的相对匿名性质和其它一些自然的弱保密性要求.文中不仅用多个具体实例表明这些条件都是非常实用的判定准则,而且还进一步应用这些普遍结果,给出对某些具体公钥加密方案匿名性质的简化证明,并证明了著名的NESSIE方案PSEC-1/2/3的选择密文匿名性质.  相似文献   

8.
广播加密允许数据拥有者通过不安全的公开信道将数据安全地发送给一组指定的用户, 只有组内用户(授权用户)利用自身私钥才能正确解密密文, 恢复出明文数据, 不在组内的用户(非授权用户)即使合谋也无法获取数据内容。标识加密是一种非对称加密体制, 可利用能够唯一标识用户身份的任意字符串作为用户的公钥, 消除了传统公钥体制中用于绑定用户公钥的证书。匿名标识广播加密不仅能充分继承标识加密的优点实现多用户数据的安全共享, 而且能有效保护接收者的身份信息。本文以国产商用标识密码算法SM9为基础, 采用多项式技术构造了首个基于SM9的匿名广播加密方案。方案具有与SM9加密算法相同的私钥生成算法, 用户私钥由一个群元素组成。方案的密文由(n+3)个元素组成, 与接收者数量(n)线性相关, 解密仅包含一次双线性对计算。基于q类型的GDDHE困难假设, 在随机谕言器模型中证明方案在静态选择明文攻击下具有不可区分的安全性且满足接收者匿名性。比较分析表明本文方案的计算开销和通信代价与现有高效匿名标识广播加密方案是可比的。最后, 对方案进行编程实验, 在相同安全级别下, 本文方案对比其他方案具有较优的密文长度, 实验结果表明本文方案是可行的。  相似文献   

9.
针对现有基于身份的多接收者签密方案存在的接收者身份泄露和解签密不公平等问题,文中提出一种具有公平性的基于身份的多接收者匿名签密方案.该方案运用拉格朗日插值多项式实现匿名性,不仅能解决现有方案不能保护接收者隐私的问题,而且具有解签密公平性,可防止发送者的欺骗行为.最后,对方案的正确性以及安全性进行了证明,并与其它方案进行...  相似文献   

10.
周彦伟  杨波  王青龙 《软件学报》2018,29(2):442-455
为满足广播环境下通信数据的机密性和认证性需求以及消息收发双方的匿名性,本文提出基于身份的多接收者匿名混合签密机制,满足收发双方的匿名性保护需求,并且接收者具有解密独立性;正确性分析及安全性证明表明本文机制是安全、有效的多接收者匿名混合签密机制;相较与现有方案而言,除具有保密性和不可伪造性之外,本文机制具有更优的性能,如更高的匿名性、公开验证性等.同时,将本文机制改进后,提出具有收发双方匿名性、公开验证性、不可否认性等安全属性的多接收者多消息混合签密机制,实现广播通信环境下用户的多消息发送需求.  相似文献   

11.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

12.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

13.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

14.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

15.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

16.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

17.
正The demands of a rapidly advancing technology for faster and more accurate controllers have always had a strong influence on the progress of automatic control theory.In recent years control problems have been arising with increasing frequency in widely different areas,which cannot be addressed using conventional control techniques.The principal reason for this is the fact that a highly competitive economy is forcing systems to operate in regimes where  相似文献   

18.
正Aim The Journals of Zhejiang University-SCIENCE(A/B/C)areedited by the international board of distinguished Chinese andforeign scientists,and are aimed to present the latest devel-opments and achievements in scientific research in China andoverseas to the world’s scientific circles,especially to stimulateand promote academic exchange between Chinese and for-eign scientists everywhere.  相似文献   

19.
The relative concentrations of different pigments within a leaf have significant physiological and spectral consequences. Photosynthesis, light use efficiency, mass and energy exchange, and stress response are dependent on relationships among an ensemble of pigments. This ensemble also determines the visible characteristics of a leaf, which can be measured remotely and used to quantify leaf biochemistry and structure. But current remote sensing approaches are limited in their ability to resolve individual pigments. This paper focuses on the incorporation of three pigments—chlorophyll a, chlorophyll b, and total carotenoids—into the LIBERTY leaf radiative transfer model to better understand relationships between leaf biochemical, biophysical, and spectral properties.Pinus ponderosa and Pinus jeffreyi needles were collected from three sites in the California Sierra Nevada. Hemispheric single-leaf visible reflectance and transmittance and concentrations of chlorophylls a and b and total carotenoids of fresh needles were measured. These data were input to the enhanced LIBERTY model to estimate optical and biochemical properties of pine needles. The enhanced model successfully estimated reflectance (RMSE = 0.0255, BIAS = 0.00477, RMS%E = 16.7%), had variable success estimating transmittance (RMSE = 0.0442, BIAS = 0.0294, RMS%E = 181%), and generated very good estimates of carotenoid concentrations (RMSE = 2.48 µg/cm2, BIAS = 0.143 µg/cm2, RMS%E = 20.4%), good estimates of chlorophyll a concentrations (RMSE = 10.7 µg/cm2, BIAS = − 0.992 µg/cm2, RMS%E = 21.1%), and fair estimates of chlorophyll b concentrations (RMSE = 7.49 µg/cm2, BIAS = − 2.12 µg/cm2, RMS%E = 43.7%). Overall root mean squared errors of reflectance, transmittance, and pigment concentration estimates were lower for the three-pigment model than for the single-pigment model. The algorithm to estimate three in vivo specific absorption coefficients is robust, although estimated values are distorted by inconsistencies in model biophysics. The capacity to invert the model from single-leaf reflectance and transmittance was added to the model so it could be coupled with vegetation canopy models to estimate canopy biochemistry from remotely sensed data.  相似文献   

20.
This article discusses the history and design of the special versions of the bombe key-finding machines used by Britain’s Government Code & Cypher School (GC&CS) during World War II to attack the Enigma traffic of the Abwehr (the German military intelligence service). These special bombes were based on the design of their more numerous counterparts used against the traffic of the German armed services, but differed from them in important ways that highlight the adaptability of the British bombe design, and the power and flexibility of the diagonal board. Also discussed are the changes in the Abwehr indicating system that drove the development of these machines, the ingenious ways in which they were used, and some related developments involving the bombes used by the U.S. Navy’s cryptanalytic unit (OP-20-G).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号