共查询到20条相似文献,搜索用时 15 毫秒
1.
LIUYi-chun WANGLi-na ZHANGHuan-guo 《武汉大学学报:自然科学英文版》2005,10(1):227-230
A new class of atomicity, namely contract atomicity is presented. A new technical strategy based on convertible signature and two-phase commitment is proposed for implementing atomicity of electronic contract protocol. A new atomic contract signing protocol is given out by using EIGamal like convertible undeniable signature and commitment ofconversion key, and another new atomic contract signing protocol is brought forward by using RSA based convertible undeniable signature scheme and commitment of conversion key. These two new protocols are proved to be of atomicity, fairness, privacy, non repudiation. 相似文献
2.
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties. 相似文献
3.
A Secure MAKAP for Wireless Communication 总被引:3,自引:0,他引:3
LIU Zhimeng ZHAO Yanli FAN Hui 《武汉大学学报:自然科学英文版》2006,11(6):1749-1752
A mutual authentication and key establishment protocol proposed by Aydos et al, for wireless communication based on elliptic curve cryptography can provide authentication between the user and server and they agreement a session key in the end of it. Unfortunately, Mangipudi pointed out Aydos' scheme was incurred the man-in-middle attack denial-of-service attack and impersonation based on man-in-middle attack. Then he proposed an improved scheme m overcome the above weakness. However, there is an attack which can forge the message required in the protocol and impersonation a valid user to the server. 相似文献
4.
Towards the Idealization Procedure of BAN-Like Logics 总被引:1,自引:0,他引:1
CAOLi-li CHENKe-fei 《武汉大学学报:自然科学英文版》2005,10(1):214-218
We demonstrate the flaws of Mao‘s method, which is an augmentation of protocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao‘s method. Furthermore, we give some theoretical analysis of our rules using the strand space formalism, and show the soundness of our idealization rules under strand spaces. Some examples on using the new rules to analyze security protocols are also concerned. Our idealization method is more effective than Mao‘s method towards many protocol instances, and is supported by a formal model. 相似文献
5.
Protocols for authentication and key establishment have special requirements in a wireless environment. This paper presents a new key agreement protocol HAKA (home server aided key agreement) for roaming scenario. It is carried out by a mobile user and a foreign server with the aid of a home server, which provides all necessary authentications of the three parties. The session key can be obtained by no one except for the mobile user and the foreign server. HAKA is based on Diffie-Hellman key exchange and a secure hash function without using any asymmetric encryption. The protocol is proved secure in Canetti-Krawczyk (CK) model. 相似文献
6.
Because cross-realm C2C-PAKE (client-to-client password authenticated key exchange) protocols can not resist some attacks, this paper writes up new attacks on two representative protocols, then designs a new cross-realm C2C-PAKE protocol with signature and optimal number of rounds for a client (only 2-rounds between a client and a server). Finally, it is proved that the new protocol can be resistant to all known attacks through heuristic analysis and that it brings more security through the comparisons of security properties with other protocols. 相似文献
7.
ZHANG Hua YUAN Zheng WEN Qiaoyan 《武汉大学学报:自然科学英文版》2006,11(6):1915-1918
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack. 相似文献
8.
ZHOU Xueguang ZHANG Huanguo 《武汉大学学报:自然科学英文版》2006,11(6):1857-1861
Based on the analysis of the covert channel's working mechanism of the internet control message protocol (ICMP) in internet protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6), the ICMP covert channd's algorithms of the IPv4 and IPv6 are presented, which enable automatic channeling upon IPv4/v6 nodes with non-IPv4-compatible address, and the key transmission is achieved by using this channel in the embedded Internet terminal. The result shows that the covert channel's algorithm, which we implemented if, set correct, the messages of this covert channel might go through the gateway and enter the local area network. 相似文献
9.
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can
generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account
the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a
model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public
key cryptography. The model contributes to designing public key cryptography system too.
Foundation item: Supported by the Hi-Tech Research and Development
Foundation item: Supported by the Hi-Tech Research and Development
Biography; Tu Hang (1975-), male, Ph. D candidate, research directions:
Biography; Tu Hang (1975-), male, Ph. D candidate, research directions: 相似文献
10.
CHEN Wen LEI Fei-yu CHEN Xi WANG Wei-nong 《武汉大学学报:自然科学英文版》2005,10(5):843-846
This paper presents a lighter protocol, and it removes the multicast burdens from RSVP to adapt to unicast applications. At the same time, when RSVP is used in wireless networks, some issues about mobility raise popular concerns. The proposed protocol a lightweight mobile RSVP protocol, solves the problems by the following mechanisms: changeless flow identifier, a new state management and "refresh" mechanism. 相似文献
11.
ZHANG Miao XU Guoai HU Zhengming YANG Yixian 《武汉大学学报:自然科学英文版》2006,11(6):1429-1432
The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization. 相似文献
12.
ZHANG Yuan-nong~ XU Guo-xiong~ ZHAO Zheng-yu~ HUANG Tian-xi~.School of Electronic Information Wuhan University Wuhan Hubei China . School of Electronic Information Zhongyuan University of Technology Zhengzhou Henan China 《武汉大学学报:自然科学英文版》2005,10(3):534-538
0Introduction Photonicbandgap(PBG)structureshavebeenextensive lystudiedduringthepastdecade[13],duetothepossi bilityofhandlinglight.ThePBGmaterialsareperiodical structurescomposedofmetallicordielectricelements.Thefirstcharacteristicofthisbehavioristoforbidthepropagation oftheelectromagneticwaveswhosefrequencyincludedwithintheirfrequencybandgap.Thebanddependsonthematerial structure,i.e.,dimensions,periodicityandpermittivity.Thesecondmajorcharacteristicistheabilitytoopenlocalizedelec tromagnet… 相似文献
13.
WANGHua-qun ZHAOJun-xi ZHANGLi-jun 《武汉大学学报:自然科学英文版》2005,10(1):165-168
Based on the difficulty of solving the ECDLP (elliptic curve discrete logarithm problem) on the finite field, we present a (t, n) threshold signature scheme and a verifiable key agreement scheme without trusted party. Applying a modified elliptic curve signature equation, we get a more efficient signature scheme than the existing ECDSA (ellipticcurve digital signature algorithm) from the computability and security view. Our scheme has a shorter key, faster computation, and better security. 相似文献
14.
GU Chun-xiang PAN Heng ZHU Yue-fei 《武汉大学学报:自然科学英文版》2006,11(1):193-197
ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem. 相似文献
15.
We introduced a new method—duration Hidden Markov Model (dHMM) to predicate the secondary structure of Protein. In our study,
we divide the basic second structure of protein into three parts: H (α-Helix), E (β-sheet) and O (others, include coil and
turn). HMM is a kind of probabilistic model which more thinking of the interaction between adjacent amino acids (these interaction
were represented by transmit probability), and we use genetic algorithm to determine the model parameters. After improving
on the model and fixed on the parameters of the model, we write a program HMMPS. Our example shows that HMM is a nice method
for protein secondary structure prediction.
Foundation item: Supported by the National Natural Science Foundation of China (30170214)
Biography: Huang Jing (1977-), female, Master candidate, research direction: bioinformatics. 相似文献
16.
ZHANG Jun KOU Weidong FAN Kai CAO Xuefei 《武汉大学学报:自然科学英文版》2006,11(6):1671-1674
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided. 相似文献
17.
LIU Bin LI Zhitang~ LI Zhanchun Network Computing Center Huazhong University of Science Technology Wuhan Hubei China 《武汉大学学报:自然科学英文版》2006,11(6):1723-1726
0 IntroductionIPv6 ,as a new, widely available version of Internet proto-col , contains numerous features that make it attractivefroma securitystandpoint[1].IPv6is not a panaceafor securi-ty,though, because the basic mechanisms for transportingpackets across the network stay mostly unchanged,and theupper-layer protocols that transport the actual application dataare mostly unaffected.IPv6 is usually deployed without cryp-tographic protections of any kind in real environment[2].So,IPv6 securi… 相似文献
18.
19.
CHEN Jing CUI Guohua 《武汉大学学报:自然科学英文版》2006,11(6):1781-1784
In this paper, we propose a partially non-cryptographic security routing protocol (PNCSR) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations. 相似文献
20.
Yin Jian 《武汉大学学报:自然科学英文版》2003,8(1):283-286
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing
activities. This paper focuses on the problem of integer programming, and describes an evolutionary soft a-gent model to solve
it. In proposed model, agent is composed of three components: goal, environment and behavior. Experimental shows the model
has the characters of parallel computing and goal driving.
Foundation item: Supported by the National Natural Science Foundation of China( 60205007) , Natural Science Foundation of Guangdong Province(001264),
Research Foundation of Software Technology Key Laboratory in Guangdong Province and Research Foundation of State Key Laboratory
for Novel Software Technology at Nanjing University
Biography: Yin Jian ( 1968-), male, Associate professor, research direction: artificial intelligence, data mining. 相似文献