欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
立项数据库
> 立项详情页
计算机通信
项目名称:计算机通信
项目类别:国家杰出青年科学基金
批准号:60225007
申请代码:F010201
项目来源:国家自然科学基金
研究期限:2003-01-01-2006-12-31
项目负责人:曹珍富
负责人职称:教授
依托单位:上海交通大学
批准年度:2002
中文摘要:
中文主题词门限密码;代理密码;电子现金;密码分析;基础理论
中文主题词:
英文摘要:
Threshold cryptography; proxy
英文主题词:
Threshold cryptography; proxy
成果综合统计
成果类型
数量
期刊论文
会议论文
专利
获奖
著作
108
31
0
0
6
期刊论文
Nonrepudiable threshold proxy
Off-line Password Guessing Att
A Directed Signature Scheme Ba
Provably Secure Robust Thresho
Security of an Efficient ID-Ba
An elliptic curve restrictive
Authenticated encryption proto
A New ID-based Deniable Authen
A new deniable authentication
Braid-based Bit Commitment
Designing efficient proxy sign
Proxy signature scheme using s
A dynamic threshold commercial
Formailzed Security Model of M
Efficient Identity-Based Authe
Cryptanalysis of Li-Tzeng-Hwan
Authorization-Limited Transfor
How to compute modular exponen
A robust ID-based threshold si
Improvement on Tzeng et al.'s
Designated verifier proxy sign
An efficient proxy-protected s
Certificateless Authenticated
Improved public key authentica
Provably secure proxy-protecte
Threshold password authenticat
Remarks on a new key authentic
A Secure Anonymous Routing Pro
Factoring-Based Proxy Signatur
Novel forgery method based on
Proxy blind multi-signature sc
Threshold undeniable signature
Biased bit commitment and appl
A New Threshold Signature Sche
Efficient ID-based Multi-Decry
Identity-based threshold proxy
Security of Pon-Lu-Jeng's Meta
Proofs of security for improve
Group Oriented Identity-Based
Non-interactive deniable authe
A forward secure remote authen
Identity-Based Proxy Multi-Sig
Efficient pairing-based thresh
Erratum to "Non-interactive de
On Security of Two Nonrepudiab
A robust (k, n) + 1 threshold
Z_N - trees and public-key cry
The simultaneous Pell equation
Existence of V(9, t) vectors
More Efficient Identity-Based
A Self-Encryption Remote User
Proofs of security for improved Rabin signature scheme
两类强壮的门限密钥托管方案
一个新的具有指定接收者门限签
代理多重签名的形式化模型及一个
代理签名的现状与进展
具有指定接收组(t, n)门限共享验
基于双难题的两个数字签名方案的
Combinatorial Characterization
Factoring based proxy signatur
Efficient Password-based Authe
An application of a lower boun
Remarks on Wu–Hsu's threshold
An Identity-Based Strong Desig
A secure anonymous internet el
A kind of signature schemes ba
Convertible Proxy Signcryption
Password-Based Group Key Agree
Nonrepudiable proxy multi - si
A Secure Proxy Signcryption Sc
An Efficient Provable Secure I
The exponontial Diophantine eq
Improvement of Yang et al.'s t
Improvement of Lee-Kim-Yoo's r
A generalized proxy signature
Super-simple balanced incomple
Construct secure proxy cryptos
A proxy signature scheme as se
Efficient and provably secure
Encryption Based on Reversible
A Novel ID-Based Partial Deleg
An Improved Deniable Authentic
Efficient remote user authenti
Existence of APAV(q,k) with q
Efficient ID-Based Proxy Signa
Simple three-party key exchang
A new efficient (t, n) verifia
A threshold proxy signature sc
Simulatability and security of
A new threshold proxy signatur
Comment: cryptanalysis of Lee-
A nonrepudiable multi-proxy mu
An ID-based Authenticated Key
A traceable threshold signatur
虚二次域类数的可除性
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts
代理多重签名的形式化模型及一个新的体制
Security Analysis and Improvement of Some Threshold Proxy Signature Schemes
An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
A Self-Encryption Remote User Anonymous Authentication Scheme Usina Smart Cards
Password-Based Group Key Agreement Protocol for Client-Server Application
Efficient Certificateless Authenticated Key Agreement Protocol from Pairings
A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial
Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings
The Braid-Based Bit Commitment Protocol
会议论文
Designated Verifier Proxy Sign
Cryptanalysis of group signatu
Bilinear Pairings-based Thresh
Efficient and Provably Secure
Factoring Based Proxy Signatur
Constructing Secure Warrant-Ba
An efficient digital signature
Robust ID-based threshold sign
A New Efficient Identification
Authenticated Key Agreement Pr
On the security of a group sig
Security model of proxy-multi
A proxy-protected signature sc
Improvement of Multi-proxy Sig
Identity Based Key Insulated S
Remote Authentication with For
Security analysis and improvem
A New Proxy Blind Signature Sc
ID-based Threshold Decryption
Cryptanalysis and improvement
Cryptanalysis of new digital n
An Efficient ID-Based Multi-pr
Cryptanalysis on a proxy multi
Efficient ID-based One-time Pr
An Improvement of an Identity-
A proxy-protected signature sc
A proxy-protected twin signatu
Cryptanalysis of Chang-Lin-Lam
Group Oriented Deniable Authen
Design of smart card-based ele
Formailized security model of
著作
Secure Delegation-by-Warrant I
Two Proxy Signcryption Schemes
Certificateless Threshold Sign
Efficient Non-Interactive Deni
Efficient ID-based Broadcast T
Two-Pass ID-Based Authenticate
曹珍富的项目
下一代互联网安全与隐私关键性技术的研究
期刊论文 2
信息安全协议分析新方法
期刊论文 126
会议论文 100
云通信中密文访问控制的可撤销技术
期刊论文 3
2002中韩双边电子商务及安全研讨会
通信系统安全的属性基密码技术
期刊论文 27
会议论文 10
身份基密钥交换协议的新研究
期刊论文 32
会议论文 14
密钥协商协议的可证安全模型和无公开参数新技术
期刊论文 1
基于移动代理的密码理论体系及其应用
期刊论文 43
会议论文 13
著作 1
下一代互联网安全与隐私关键性技术的研究
期刊论文 184
会议论文 113
二次域密码、门限密钥托管及其应用
期刊论文 2