Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2009-S1
Add to Favorite Get Latest Update

DMSS-Dynamic Merkle Authentication-tree Signature

CAI Yong-quan,LIU Fang(College of Computer Science and Technology,Beijing University of Technology,Beijing 100124,China)  
We achieve a dynamic update of the authentication-tree through creating the sub tree and dynamic update of the key.In the original signature,the number of the signature influence the scale of the authentication-tree,and the increase of the number of signature makes lower efficient.In our scheme,the number of signature is not affected by the scale of the authentication-tree.In addition,the paper do a safety analysis to the improved authentication Merkle tree signature,the results show that the signature of the improver Merkle authentication is as safe as the original Merkle authentication signature tree,and as used key management according the time,the The signature also has forward-secure.
【Fund】: 国家973重点基础研究计划(No.2007CB11106)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 Qiu Gang1 Liu Zhidu2 Zhou Lihua1(1 The CNIS Key Laboratory of the Education Ministry,Xidian University,Xi′an 710071,China;2 College of Computer and Information Technology,Nanyang Normal University,Nanyang 473061,Henan China);Remote attestation scheme based on Merkle tree[J];Journal of Huazhong University of Science and Technology(Nature Science Edition);2010-04
2 ZHANG Huan-guo,GUAN Hai-ming,WANG Hou-zheng(Key Lab of Aerospace Information Security and Trusted Computing of Ministry of Education,Computer School,Whan University,Wuhan 430072,China);The Challenge of Quantum Computing to Information Security and Our Countermeasures[J];Journal of Yunnan University of Nationalities(Natural Sciences Edition);2011-05
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 WANG Hou-zhen1,2,ZHANG Huan-guo1,GUAN Hai-ming3,WU Qian-hong1 (1.The Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,School of Computer,Wuhan University,Wuhan 430072,China;2.Key Laboratory of Mathematics Mechanization,Beijing 100080,China;3.Chinese Electronic Equipment System Corporation,Beijing 100039,China);Multivariable Algebra Theory and Its Application in Cryptography[J];Journal of Beijing University of Technology;2010-05
2 HUANG Chen,LI Zhong-xian,YANG Yi-xian,XU Guo-sheng(Information Security Center,Beijing University of Posts and Telecommunications,Beijing 100876,China);A New Web Single Sign-on Scheme Supporting the Multiple Authentication Modes[J];Journal of Beijing University of Posts and Telecommunications;2006-05
3 ZHANG Miao,YANG Chang,SUN Qi,SHEN Zhi-dong,ZHANG Huan-guo(School of Computer Science,Wuhan University,Wuhan 430079,China);Key Management in the Platform of Trusted Computing[J];Journal of Chuxiong Normal University;2006-09
4 SUN Qi;YANG Chang;ZHANG Miao;SHEN Zhi-dong;ZHANG Huan-guo(School of Computer,Wuhan University,Wuhan,Hubei 430079,China);Research on Architecture of TCG Software Stack[J];Journal of Chuxiong Normal University;2006-12
5 ZHOU Ming-tian~1 TAN Liang~2 (1.School of Computer Science and Engineering,Univ.of Electron.Sci.& Tech.of China Chengdu 610054; 2.Software Key Lab.of Sichuan Province,Sichuan Normal University Chengdu 610066);Progress in Trusted Computing[J];Journal of University of Electronic Science and Technology of China;2006-S1
6 WANG Xin mei(Xidian University,National Key Lab.on ISN,Xi′an 710071,China);Modification of the Digital Signature Scheme Based on Error Correcting Codes[J];ACTA ELECTRONICA SINICA;2000-02
7 SHI Wen-chang,LIANG Hong-liang,SUN Yu-fang (Institute of Software,The Chinese Academy of Sciences,Beijing 100080,China);On Scheme for Dynamic Determination of Subject's Current Sensitivity Label[J];Acta Electronica Sinica;2001-08
8 LIU Yi,JIANG Zheng-tao,WANG Yu-min (National Key Laboratory on Integrated Server Networks,Xidian University,Xi'an,Shaanxi 710071,China);Mobile Agent Route Protection Based on Merkle Trees and Its Extension[J];Acta Electronica Sinica;2005-07
9 SI Tian-ge,TAN Zhi-yong,LIU Duo,DAI Yi-qi (Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);A Noninterference Model Based on Actions for Nondeterministic Systems[J];Acta Electronica Sinica;2008-11
10 TAN Liang1,2,LIU Zhen3,ZHOU Ming-tian3(1.Key Lab of Visualization in Scientific Computing and Virtual Reality of Sichuan,College of Computer,Sichuan Normal University,Chengdu,Sichuan 610068,China;2.Institute of Computing Technology,Chinese Academy of Sciences,Beijing,100190,China;3.School of Computer Science and Engineering,University.of Electronic Science and Technology.of China,Chengdu,Sichuan 610054,China);Development of Attestation in TCG[J];Acta Electronica Sinica;2010-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved