24小时热门版块排行榜    

查看: 156  |  回复: 1
本帖产生 1 个 ,点击这里进行查看

zhuhf

禁虫 (正式写手)

本帖内容被屏蔽

» 猜你喜欢

已阅   关注TA 给TA发消息 送TA红花 TA的回帖

baiyuefei

版主 (文学泰斗)

风雪

优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主文献杰出贡献优秀版主优秀版主优秀版主优秀版主优秀版主优秀版主

【答案】应助回帖

★ ★ ★ ★ ★ ★ ★ ★ ★ ★
感谢参与,应助指数 +1
zhuhf: 金币+10, ★★★★★最佳答案, 非常感谢! 2016-11-22 21:13:32
lazy锦溪: LS-EPI+1 2016-11-22 21:31:08
Accession number:       
20164302946278
        Title:        Provably secure multi-server privacy-protection system based on chebyshev chaotic maps without using symmetric cryptography
        Authors:        Zhu, Hongfeng1 Email author zhuhongfeng1978@163.com; Zhang, Yifeng1; Sun, Yang1
        Author affiliation:        1 Software College, Shenyang Normal University, No. 253, HuangHe Bei Street, HuangGu District, Shenyang; 110034, China
        Corresponding author:        Zhu, Hongfeng (zhuhongfeng1978@163.com)
        Source title:        International Journal of Network Security
        Abbreviated source title:        Int. J. Netw. Secur.
        Volume:        18
        Issue:        5
        Issue date:        2016
        Publication year:        2016
        Pages:        803-815
        Language:        English
        ISSN:        1816353X
        E-ISSN:        18163548
        Document type:        Journal article (JA)
        Publisher:        Femto Technique Co., Ltd.
        Abstract:        Most of the privacy-protection schemes adopting chaotic maps are usually by symmetric cryptography for guaranteeing identity hiding. This will lead to a high calculated amount. So, the paper will wipe out the symmetric cryptography, and only use chaotic maps, a secure one-way hash function to construct a provable privacy-protection system (PPS) which can achieve two kinds of privacy- protection and switch between them optionally by users: The first is anonymous scheme which can make nobody know the user's identity, including the server and the registration center (RC), and they only know these users are legal or paying members. The other is hiding scheme which owns also privacy-protection property, because the user's identity is not transferred during the process of the proposed protocol, and only the server and the RC know the user's identity. About practical environment, we adopt multi-server architecture which can allow the user to register at the RC once and can access all the permitted services provided by the eligible servers. Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the efficiency analysis of our proposed scheme.
        Number of references:        27
        Main heading:        Lyapunov methods
        Controlled terms:        Access control - Chaotic systems - Cryptography - Efficiency - Hash functions - Public key cryptography
        Uncontrolled terms:        Authenticated key agreement protocols - Chaotic map - Key agreement - Multi-server architecture - One way hash functions - Perfect forward secrecy - Privacy protection - Symmetric cryptography
        Classification code:        723Computer Software, Data Handling and Applications - 913.1Production Engineering - 961Systems Science
        Database:        Compendex
                Compilation and indexing terms, © 2016 Elsevier Inc.
Full-text and Local Holdings Links
2楼2016-11-22 20:54:32
已阅   关注TA 给TA发消息 送TA红花 TA的回帖
相关版块跳转 我要订阅楼主 zhuhf 的主题更新
信息提示
请填处理意见