Guilin University Of Electronic Technology

Displaying 1-5 of 5 results

  • White Papers // Jan 2013

    Research and Realization of Resource Cloud Encapsulation in Cloud Manufacturing

    Resource Cloud Encapsulation (RCE) is one of the key technologies of recourse accessing in Cloud Manufacturing (CM) and the foundation of resource virtualization. Under the analysis of the technologies of resource virtualization in Cloud Manufacturing, a framework of RCE is proposed. With the definition for each layer of the framework,...

    Provided By Guilin University Of Electronic Technology

  • White Papers // Nov 2012

    Generic Related-Key and Induced Chosen IV Attacks Using the Method of Key Differentiation

    Related-key and chosen IV attacks are well known cryptanalytic tools in cryptanalysis of stream ciphers. Though the related-key model is considered to be much more unrealistic scenario than the chosen IV model the authors show that under certain circumstances the attack assumptions may become equivalent. They show that the key...

    Provided By Guilin University Of Electronic Technology

  • White Papers // Nov 2012

    Security Enhancement to a Group Key Transfer Protocol Against Insider Attack

    Group key transfer protocol distributes a session key to authorized members with a trusted key generation center. Nam et al. claim that they achieve security, efficiency and correctness based on Shamir's secret sharing, which is the improved version of Harn-Lin's protocol. The authors' main contribution is to show the security...

    Provided By Guilin University Of Electronic Technology

  • White Papers // Nov 2009

    Analysis of Two Types Deniable Authentication Protocols

    Deniability enables protocol participants to deny their involvement after they have taken part in a particular protocol run. In this paper, the authors present the security analysis of a class of interactive deniable authentication protocols and a non-interactive one. For interactive protocols, they focus on a serial of pairings based...

    Provided By Guilin University Of Electronic Technology

  • White Papers // Mar 2009

    Group-Based Proxy Re-Encryption Scheme Secure Against Chosen Ciphertext Attack

    The notion of proxy cryptography is very useful in cases when one user needs to perform sensitive operation without holding the necessary secret key. Recently, proxy re-encryption scheme received much attention due to its application in information storing, secure email, etc. In this paper, the authors propose a proxy re-encryption...

    Provided By Guilin University Of Electronic Technology

  • White Papers // Jan 2013

    Research and Realization of Resource Cloud Encapsulation in Cloud Manufacturing

    Resource Cloud Encapsulation (RCE) is one of the key technologies of recourse accessing in Cloud Manufacturing (CM) and the foundation of resource virtualization. Under the analysis of the technologies of resource virtualization in Cloud Manufacturing, a framework of RCE is proposed. With the definition for each layer of the framework,...

    Provided By Guilin University Of Electronic Technology

  • White Papers // Nov 2012

    Security Enhancement to a Group Key Transfer Protocol Against Insider Attack

    Group key transfer protocol distributes a session key to authorized members with a trusted key generation center. Nam et al. claim that they achieve security, efficiency and correctness based on Shamir's secret sharing, which is the improved version of Harn-Lin's protocol. The authors' main contribution is to show the security...

    Provided By Guilin University Of Electronic Technology

  • White Papers // Nov 2012

    Generic Related-Key and Induced Chosen IV Attacks Using the Method of Key Differentiation

    Related-key and chosen IV attacks are well known cryptanalytic tools in cryptanalysis of stream ciphers. Though the related-key model is considered to be much more unrealistic scenario than the chosen IV model the authors show that under certain circumstances the attack assumptions may become equivalent. They show that the key...

    Provided By Guilin University Of Electronic Technology

  • White Papers // Mar 2009

    Group-Based Proxy Re-Encryption Scheme Secure Against Chosen Ciphertext Attack

    The notion of proxy cryptography is very useful in cases when one user needs to perform sensitive operation without holding the necessary secret key. Recently, proxy re-encryption scheme received much attention due to its application in information storing, secure email, etc. In this paper, the authors propose a proxy re-encryption...

    Provided By Guilin University Of Electronic Technology

  • White Papers // Nov 2009

    Analysis of Two Types Deniable Authentication Protocols

    Deniability enables protocol participants to deny their involvement after they have taken part in a particular protocol run. In this paper, the authors present the security analysis of a class of interactive deniable authentication protocols and a non-interactive one. For interactive protocols, they focus on a serial of pairings based...

    Provided By Guilin University Of Electronic Technology