期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
创建安全的电子邮件——公开密钥技术在办公自动化网络中的应用
1
作者 蔡惠 杨志宏 《通信世界》 1999年第11期60-64,共5页
电子邮件在办公自动化网络中的应用无疑是方便、快捷、经济的。对于科研单位、商业企业,它可以快速地传递最新科技信息、收发重要商业往来函件,从而提高了工作效率,并节省了可观的长途通信费用;同时电子邮件还能够传递声音、图像、... 电子邮件在办公自动化网络中的应用无疑是方便、快捷、经济的。对于科研单位、商业企业,它可以快速地传递最新科技信息、收发重要商业往来函件,从而提高了工作效率,并节省了可观的长途通信费用;同时电子邮件还能够传递声音、图像、文字、影像等多媒体信息,电子邮件使用户获得了时间和空间高度压缩的现代通信手段。但是由于互联网环境的开放特点,普通电子邮件的通信又存在着安全问题,主要表现在:①收信人无法确定发信人的身份和信件内容的真实性和可靠性,收信人可能收到假冒发信人的邮件,邮件内容自然也不可靠。②发信人无法确保发出的邮件只能被指定的收信人接收和阅读,信件的内容还可能被截获和泄漏。 展开更多
关键词 公开 电子邮件 办公自动化网络 公开技术 私人密钥 收信人 数字签名 和解 服务器 剪贴板
在线阅读 下载PDF
电子支付系统安全性探讨
2
作者 陈勇 《电脑与信用卡》 1998年第10期51-53,共3页
随着互联网用户的日益增多,互联网也由单纯的ISP主页浏览服务功能向商业、金融业等其他领域多元化发展。结合信用卡、储蓄卡等现代化的银行结算手段,互联网电子商务的发展前景越来越广阔。持卡人从POS刷卡消费到直接在互联网电子商场上... 随着互联网用户的日益增多,互联网也由单纯的ISP主页浏览服务功能向商业、金融业等其他领域多元化发展。结合信用卡、储蓄卡等现代化的银行结算手段,互联网电子商务的发展前景越来越广阔。持卡人从POS刷卡消费到直接在互联网电子商场上购物,正逐渐成为现实。 银行卡是指由银行机构发行的具有消费功能的金融工具,它作为网上购物的支付工具,只需在消费时输入卡号和密码,即可实现资金的划转,从而实现网上购物消费的全过程。然而在电子支付过程中如何保证信息的安全性和完整性,是开发网上交易支付系统的重要课题。 展开更多
关键词 电子支付系统 系统安全性 互联网 公开 持卡人 数字签名 私人密钥 CA认证 电子商场 银行卡
在线阅读 下载PDF
Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation 被引量:2
3
作者 Wu Qiuxin Zhang Miao 《China Communications》 SCIE CSCD 2012年第9期22-40,共19页
Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app... Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption. 展开更多
关键词 ABE direct revocation model attributerevocation adaptive security dual system encryp-tion access structure
在线阅读 下载PDF
Quantum Probabilistic Encryption Scheme Based on Conjugate Coding 被引量:2
4
作者 杨理 向憧 李宝 《China Communications》 SCIE CSCD 2013年第2期19-26,共8页
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp... We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack. 展开更多
关键词 quantum cryptography probabil-istic encryption information-theoretic in-distinguishability
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部