排序方式: 共有19条查询结果,搜索用时 46 毫秒
1.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity,
and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary
can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute
the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures
are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z
q
, except the PVSS output. 相似文献
2.
南运河特大格在64m单线下承式栓焊钢桁梁拖拉架设施工设计 总被引:2,自引:0,他引:2
郑东 《铁道标准设计通讯》2001,21(5):23-24
主要介绍1-64m单线下承式栓焊钢桁梁无导梁拖拉架设过程中梁体结构、临时支墩、移梁滑道、牵引等主要环节的设计及检算。 相似文献
3.
通过采用将焊接小车置于斜面上及利用变频器调速的办法,解决了在N31平车中梁采用埋弧自动焊时的焊缝自动跟踪及焊接速度调节的关键技术问题,提高了焊接质量和工作效率。 相似文献
4.
在城市轨道交通设计中,大功率设备起动时电压下降的计算是电气设计的一个重要组成部分,这关系到整个系统是否能安全合理地运行,并牵涉到变电所、跟随式变电所以及环控电控室的布置,最终影响建筑专业的房间布置。对远端隧道风机起动时电压下降的计算作了理论分析,并以武汉轨道交通6号线一期工程体育中心南站为工程实例进行计算和校验,供同行设计人员参考。 相似文献
5.
Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity code (MIC) called Michael, an initialization vector (IV) sequencing discipline, a key mixing function and a re-keying mechanism. The key mixing function, also called temporal key hash, de-correlates the IVs from weak keys. Some cryptographic properties of the substitution box (S-box) used in the key mixing function are investigated in this paper, such as regularity, avalanche effect, differ uniform and linear structure. Moen et al pointed out that there existed a temporal key recovery attack in TKIP key mixing function. In this paper a method is proposed to defend against the attack, and the resulting effect on performance is discussed. 相似文献
6.
Cryptography is an important tool in the design and implementation of e-voting schemes since it can provide verifiability,
which is not provided in the traditional voting. But in the real life, most voters can neither understand the profound theory
of cryptography nor perform the complicated cryptographic computation. An e-voting system is presented in this paper to leverage
the use of cryptography. It combines the advantages of voting scheme of Moran-Naor and voting scheme based on homomorphic
encryption. It makes use of the cryptographic technique, but it hides the details of cryptographic computation from voters.
Compared with voting scheme of Moran-Naor, the new system has three advantages: the ballots can be recovered when the voting
machine breaks down, the costly cut-and-choose zero-knowledge proofs for shuffling votes made by the voting machine are avoided
and the partial tally result in each voting machine can be kept secret.
Foundation item: the National Natural Science Foundation of China (No. 60673076) and the National High Technology Research and Development
Program (863) of China (No. 2008AA01Z403) 相似文献
7.
8.
9.
Introduction Quantumkeyagreement(QKA)enablestwo userstosharesecretrandombitsthroughaquan-tumchannel.Thesesecretbitscanbeusedasa conventionalsecretkeyforsecurecommunications overaclassicalchannel.TheadvantageofQKA overtraditionalkeyagreementmethodsisthatthe exchangeofquantumbitscanbeshowntobeun-conditionallysecure(orinformation-theoretically secure).ThefirstQKAprotocolwasproposedbyBen-nettetalinRef.[1].Bennettetalconsidered quantumkeyagreementbetweentwolegalusers AliceandBob.Thephysicalca… 相似文献
10.
巢湖市西坝路桥为预应力混凝土斜吊杆系杆拱桥,由于斜吊杆、横梁、拱肋之间交汇点构造比较复杂,且有三向预应力布置,故对施工技术及组织安排要求较高。本文着重介绍上部结构施工中的一些工工艺要点。 相似文献