924 resultados para certificateless threshold signature


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

将前向安全的概念引入到基于双线性映射的门限签名方案中,提出了一个基于双线性映射的前向安全的门限签名方案.该方案将签名密钥分散到签名成员集合中,采用各成员部分密钥前向更新的方式实现了签名密钥的前向更新,增强了签名密钥的安全性,使得签名方案具有前向安全性.另外,由于部分密钥具有前向更新的特性,从而方案有效防止了移动攻击.对该方案的安全性进行了分析,分析表明,该方案是安全、有效的.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Infrastructureless networks are becoming more popular with the increased prevalence of wireless networking technology. A significant challenge faced by these infrastructureless networks is that of providing security. In this paper we examine the issue of authentication, a fundamental component of most security approaches, and show how it can be performed despite an absence of trusted infrastructure and limited or no existing trust relationship between network nodes. Our approach enables nodes to authenticate using a combination of contextual information, harvested from the environment, and traditional authentication factors (such as public key cryptography). Underlying our solution is a generic threshold signature scheme that enables distributed generation of digital certificates.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Tzeng et al. proposed a new threshold multi-proxy multi-signature scheme with threshold verification. In their scheme, a subset of original signers authenticates a designated proxy group to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. Subsequently, there are two improved schemes to eliminate the security leak of Tzeng et al.’s scheme. In this paper, we have pointed out the security leakage of the three schemes and further proposed a novel threshold multi-proxy multi-signature scheme with threshold verification.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Temperature modulated alternating differential scanning calorimetric studies show that Se rich Ge0.15Se0.85−xAgx (0 x 0.20) glasses are microscopically phase separated, containing Ag2Se phases embedded in a Ge0.15Se0.85 backbone. With increasing silver concentration, Ag2Se phase percolates in the Ge–Se matrix, with a well-defined percolation threshold at x = 0.10. A signature of this percolation transition is shown up in the thermal behavior, as the appearance of two exothermic crystallization peaks. Density, molar volume, and microhardness measurements, undertaken in the present study, also strongly support this view of percolation transition. The superionic conduction observed earlier in these glasses at higher silver proportions is likely to be connected with the silver phase percolation.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

IEEE Computer Society

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A search for new physics using three-lepton (trilepton) data collected with the CDF II detector and corresponding to an integrated luminosity of 976 pb-1 is presented. The standard model predicts a low rate of trilepton events, which makes some supersymmetric processes, such as chargino-neutralino production, measurable in this channel. The mu+mu+l signature is investigated, where l is an electron or a muon, with the additional requirement of large missing transverse energy. In this analysis, the lepton transverse momenta with respect to the beam direction (pT) are as low as 5 GeV/c, a selection that improves the sensitivity to particles which are light as well as to ones which result in leptonically decaying tau leptons. At the same time, this low-p_T selection presents additional challenges due to the non-negligible heavy-quark background at low lepton momenta. This background is measured with an innovative technique using experimental data. Several dimuon and trilepton control regions are investigated, and good agreement between experimental results and standard-model predictions is observed. In the signal region, we observe one three-muon event and expect 0.4+/-0.1 mu+mu+l events

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper is concerned with off-line signature verification. Four different types of pattern representation schemes have been implemented, viz., geometric features, moment-based representations, envelope characteristics and tree-structured Wavelet features. The individual feature components in a representation are weighed by their pattern characterization capability using Genetic Algorithms. The conclusions of the four subsystems teach depending on a representation scheme) are combined to form a final decision on the validity of signature. Threshold-based classifiers (including the traditional confidence-interval classifier), neighbourhood classifiers and their combinations were studied. Benefits of using forged signatures for training purposes have been assessed. Experimental results show that combination of the Feature-based classifiers increases verification accuracy. (C) 1999 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The oxygen vacancy has been inferred to be the critical defect in HfO 2, responsible for charge trapping, gate threshold voltage instability, and Fermi level pinning for high work function gates, but it has never been conclusively identified. Here, the electron spin resonance g tensor parameters of the oxygen vacancy are calculated, using methods that do not over-estimate the delocalization of the defect wave function, to be g xx = 1.918, g yy = 1.926, g zz = 1.944, and are consistent with an observed spectrum. The defect undergoes a symmetry lowering polaron distortion to be localized mainly on a single adjacent Hf ion. © 2012 American Institute of Physics.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The laser-induced photodissociation of formaldehyde in the wavelength range 309<λ<330nm 309<λ<330nm has been investigated using H (Rydberg) atom photofragment translational spectroscopy. Photolysis wavelengths corresponding to specific rovibronic transitions in the A ˜ A 2 1 ←X ˜ A 1 1 ÃA21←X̃A11 2 1 0 4 3 0 201403 , 2 2 0 4 1 0 202401 , 2 2 0 4 3 0 202403 , 2 3 0 4 1 0 203401 , and 2 1 0 5 1 0 201501 bands of H 2 CO H2CO were studied. The total kinetic energy release spectra so derived can be used to determine partial rotational state population distributions of the HCO cofragment. HCO product state distributions have been derived following the population of various different N K a NKa levels in the A ˜ A 2 1 ÃA21 2 2 4 3 2243 and 2 3 4 1 2341 states. Two distinct spectral signatures are identified, suggesting competition between dissociation pathways involving the X ˜ A 1 1 X̃A11 and the a ˜ A 2 3 ãA23 potential energy surfaces. Most rovibrational states of H 2 CO(A ˜ A 2 1 ) H2CO(ÃA21) investigated in this work produceH+HCO(X ˜ A ′ 2 ) H+HCO(X̃A′2) photofragments with a broad kinetic energy distribution and significant population in high energy rotational states of HCO. Photodissociation via the A ˜ A 2 1 ÃA21 2 2 4 3 2243 1 1,1 11,1 (and 1 1,0 11,0 ) rovibronic states yields predominantly HCO fragments with low internal energy, a signature that these rovibronic levels are perturbed by the a ˜ A 2 3 ãA23 state. The results also suggest the need for further careful measurements of the H+HCO H+HCO quantum yield from H 2 CO H2CO photolysis at energies approaching, and above, the barrier to C–H bond fission on the a ˜ A 2 3 ãA23 potential energy surface.