Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr...Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one.展开更多
In this paper, two improved digital signature schemes are presented based on the design of directed signature scheme. The peculiarity of the system is that only if the scheme is specific recipient, the signature is au...In this paper, two improved digital signature schemes are presented based on the design of directed signature scheme. The peculiarity of the system is that only if the scheme is specific recipient, the signature is authenticated. Since the scheme adds the screen of some information parameters, the difficulty of deciphered keys and the security of digital signature system are increased.展开更多
The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key excha...The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key exchange protocols would expose the key exchange process between them.An adversary who observes the key exchange would be aware of the existence of communication behavior.The keys used in covert communication are not suitable to be generated through conventional key exchange schemes.To address this,we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme(BCDH)to conceal the process of the key exchange in blockchain transactions.Following a straightforward setup,BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication.Furthermore,we expand the BCDH approach to operate across multiple blockchains,further enhancing its covertness and stability.We analyze BCDH from several perspectives,including covertness,security,randomness,etc.Additionally,we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance.Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications.展开更多
基金This project was supported by the National Science Foundation of China (60763009)China Postdoctoral Science Foundation (2005038041)Hainan Natural Science Foundation (80528).
文摘Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one.
基金the Natural Science Foundation of Fujian Province (No. A0010011).
文摘In this paper, two improved digital signature schemes are presented based on the design of directed signature scheme. The peculiarity of the system is that only if the scheme is specific recipient, the signature is authenticated. Since the scheme adds the screen of some information parameters, the difficulty of deciphered keys and the security of digital signature system are increased.
文摘The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key exchange protocols would expose the key exchange process between them.An adversary who observes the key exchange would be aware of the existence of communication behavior.The keys used in covert communication are not suitable to be generated through conventional key exchange schemes.To address this,we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme(BCDH)to conceal the process of the key exchange in blockchain transactions.Following a straightforward setup,BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication.Furthermore,we expand the BCDH approach to operate across multiple blockchains,further enhancing its covertness and stability.We analyze BCDH from several perspectives,including covertness,security,randomness,etc.Additionally,we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance.Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications.