Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 13. Отображено 13.
21-07-2023 дата публикации

Homology-based traceable ring signature method and system

Номер: CN116471025A
Принадлежит:

The invention discloses a homology-based traceable ring signature method and system, and the method comprises a secret key generation step, a signature generation step, a signature verification step and a signature tracing step, an OR protocol and FS conversion are introduced to construct a signature algorithm, and while the correctness and linkability of the traceable ring signature are ensured, the signature verification efficiency is improved. The functional characteristic of followability is met, and the system can be effectively instantiated by using different security level parameters of the CSIDH. The method has the advantages of high security, small signature size and the like, provides a tracing function on the basis of the linkable ring signature, can be widely applied to multiple application fields such as block chain anonymous voting, electronic cash systems and the like, and can resist quantum attacks.

Подробнее
18-07-2023 дата публикации

Cloud-assisted Internet of Things authentication method and system based on block chain

Номер: CN116455664A
Принадлежит:

The invention discloses a cloud-assisted Internet of Things authentication method and system based on a block chain, and the method comprises the steps: firstly executing an initialization step: generating a public parameter through a third-party key generation center KGC, and initializing the block chain; then the cloud server and the IoT device register to the KGC, and then an authentication and key negotiation step is executed, in the first stage, the cloud server generates a first message authentication tuple based on an identifiable identifier of the IoT device to be accessed, and sends the first message authentication tuple to the IoT device to be accessed; stage 2, the target IoT device generates a second message authentication tuple based on the received first message authentication tuple and sends the second message authentication tuple to the corresponding cloud server; and stage 3, the cloud server authenticates the second message authentication tuple, and if the authentication ...

Подробнее
27-06-2023 дата публикации

Post-quantum certificateless signature generation method and device based on symmetric cryptographic primitives

Номер: CN116346356A
Принадлежит:

The invention provides a post-quantum certificateless signature generation method and device based on symmetric cryptographic primitives. The method comprises steps 1 to 7. The post-quantum certificateless signature based on the symmetric cryptographic primitive is creatively provided, zero-knowledge proof is generated in a secure multi-party calculation mode, the anti-quantum purpose can be achieved, generation of the certificateless signature meets the post-quantum security requirement, and the security of the to-be-protected target is improved.

Подробнее
23-06-2023 дата публикации

Certificateless SM9 online and offline signature generation method and system

Номер: CN116318705A
Принадлежит:

The invention discloses a certificateless SM9 online and offline signature generation method and system. The method comprises the steps of initialization, partial private key extraction, secret value setting, public key setting, private key setting, signature, signature verification and the like. According to the method, a large amount of certificate data does not need to be transmitted, the signature is divided into an online stage and an offline stage, and the method can be suitable for application scenes with limited resources. According to the method, the vacancy of an SM9 digital signature algorithm in a certificateless system is made up.

Подробнее
13-06-2023 дата публикации

SM9 group signature generation and verification method and system supporting membership revocation

Номер: CN116260591A
Принадлежит:

The invention discloses an SM9 group signature generation and verification method and system supporting membership revocation. The method comprises the steps of public parameter setting, user registration, group signature, signature verification, user revocation, evidence updating, list retrieval and the like. According to the signature structure based on the SM9 digital signature algorithm, the certificate management problem in a traditional public key cryptosystem is eliminated. The method supports group signature member qualification revocation, the change of the group members does not influence the signature verification of the previous group signature, and the length of the group signature is irrelevant to the number of the group members. The scheme makes up the blank of the SM9-based commercial password system in the field of group signature, and can be used for application scenarios such as anonymous certificates, identity hosting, voting and electronic cash.

Подробнее
07-07-2023 дата публикации

SM9 ring signature method and system based on constant-level signature size

Номер: CN116405217A
Принадлежит:

The invention discloses an SM9 ring signature method and system based on a constant-level signature size, and the method comprises an initialization step, a secret key generation step, a ring signature step and a signature verification step, and is based on a signature structure of an SM9 digital signature algorithm, and eliminates a certificate management problem in a conventional public key cryptosystem. According to the scheme, the process of generating the group signature by the signer does not need the cooperation of other users, the constant-level signature size is realized based on the password accumulator structure, and the signature and verification operation efficiency is improved. The scheme can be used for application scenes such as electronic cash, electronic voting and anonymous communication.

Подробнее
07-07-2023 дата публикации

Post-quantum identification signature generation verification method and system based on symmetric cryptographic primitives

Номер: CN116405221A
Принадлежит:

The invention relates to a post-quantum identification signature generation method and system based on symmetric cryptographic primitives. The method comprises the following steps: firstly, according to a given security parameter, acquiring a master key which comprises a master public key and a master private key; generating a user private key according to a given user identity and the main private key; obtaining a signature value according to the generated user private key and the message; finally, the verifier carries out zero-knowledge proof on the signature value according to a given message, and if the proof is passed, the signature is correct; otherwise, the signature is wrong. Compared with the prior art, the post-quantum signature method has the following advantages and beneficial effects: with the development of the post-quantum signature technology, the existing scholars put forward a lattice-based signature algorithm and a homology-based signature algorithm, but the post-quantum ...

Подробнее
27-06-2023 дата публикации

SM9-based dual authentication signature prevention method and system

Номер: CN116346352A
Принадлежит:

The invention discloses a method and a system for preventing dual authentication signature based on SM9, and the method comprises an initialization step, a secret key generation step, a signature step, a verification step and a secret key extraction step, a dishonest signer is subjected to private key extraction and disclosure by utilizing the conversion of a one-time signature architecture, the dual authentication is effectively prevented, and the security of the signer is improved. And the unforgeable security is met. The method has the advantages of being high in security, complete in function, high in operation efficiency and the like, has a great promotion effect on localization of a cryptographic algorithm, and is suitable for various scenes such as prevention of double-spam attacks by a block chain payment system and prevention of repeated certificate issuing of a management mechanism by a PKI (Public Key Infrastructure) system.

Подробнее
25-07-2023 дата публикации

Anti-dual authentication signature generation method and system based on SM2 signature

Номер: CN116488819A
Принадлежит:

The invention is suitable for the technical field of information security, and provides a dual authentication prevention signature generation method and system based on an SM2 signature. The method comprises the following steps: step 1, initializing a Diffie-Hellman tuple zero knowledge proof; 2, system initialization: giving a safety parameter 1n, and performing system parameter initialization calculation; step 3, key generation: giving a system parameter PP and a user A, and carrying out key calculation; and the like. According to the scheme, zero-knowledge proof, an original SM2 digital signature and a secret sharing protocol are used for constructing the scheme, a message composed of an address and a label is signed while the original signature is unforgeable, and secret keys are allowed to be extracted public for signatures on two different labels of the same address, so that the security of the signatures is improved, and the security of the signatures is improved. The method can ...

Подробнее
07-07-2023 дата публикации

SM2-based dual authentication signature prevention method and equipment

Номер: CN116405216A
Принадлежит:

The invention provides a dual authentication signature prevention method and device based on SM2. The method comprises the following steps: step 1, initializing a system, inputting a safety parameter 1n, and outputting a public parameter set PP; step 2, inputting a public parameter set PP to generate a key; step 3, inputting a public parameter set PP, a to-be-signed message m = (alpha, p) and a private key sk to generate a signature s; step 4, inputting a public parameter set PP, a to-be-verified message m = (alpha, p), a signature s and a public key vk for signature verification; wherein alpha is an address part in the message m to be verified; p is the content load in the message m to be verified. According to the method, the anti-dual-authentication signature is adopted and is realized and tested, so that the generalization process of a cryptographic algorithm is promoted, the signature scheme conforms to unforgeable security, and the method has the advantages of small computation amount ...

Подробнее
09-05-2023 дата публикации

Offline authorization and online signature generation method and system based on SM9 signature

Номер: CN116094729A
Принадлежит:

The invention discloses an off-line authorization and on-line signature generation method and system based on SM9 signature, and the method comprises the steps: a key generation center KGC gives a parameter, selects a random number as a main private key, and calculates a main public key Ppub = [alpha] P2; the key generation center KGC generates a partial private key dID = [alpha * (H1 (ID) + alpha)-1] P1 of the offline authorizer, and sends the dID to the user; setting an offline authorizer key; setting a key of an online signer; performing offline authorization on the message mi; and carrying out online signature and signature verification on the message mi. Existing literatures indicate an SM2-based online and offline authorization signature system and an SM9-based certificateless signature system, but an SM9 digital signature-based offline authorization and online signature scheme is not provided yet. According to the method, the signature is divided into an online stage and an offline ...

Подробнее
01-08-2023 дата публикации

SM9 digital signature method and system supporting membership revocation

Номер: CN116522406A
Принадлежит:

The invention discloses an SM9 digital signature method and system supporting membership revocation, and the method comprises an initialization step, a secret key generation step, a signature step, a verification step, an evidence updating step and a user revocation step. And the certificate management problem in the traditional public key cryptosystem is eliminated. The method supports member qualification revocation, changes of members do not affect verification of previous signatures, and the signature length is irrelevant to the number of the members. According to the scheme, the defect of a user revocation function based on the SM9 digital signature is overcome. The method can be used for application scenes such as anonymous credentials, identity hosting and voting.

Подробнее
18-07-2023 дата публикации

SM2 signature-based efficient dual-authentication-prevention signature generation and verification method and system

Номер: CN116455577A
Принадлежит:

The invention discloses an efficient dual-authentication-prevention signature generation and verification method and system based on an SM2 signature, a scheme is constructed by using zero-knowledge proof, an original SM2 digital signature and a secret sharing protocol, a message composed of an address and a label is signed while the original signature has the unforgeability, and the signature is generated and verified by using the signature. Signatures on two different tags for the same address allow public extraction of keys. Therefore, the method can be applied to application scenes for preventing double signatures, such as block chains, electronic voting and the like, and is used for preventing malicious behaviors such as double payment, multiple voting and the like.

Подробнее