13 research outputs found

    A Study on High Secure and Efficient MANET Routing Scheme

    Get PDF
    In mobile ad hoc networks (MANETs), the more applications we use, the more security is required. In this paper, we propose a high secure and efficient routing scheme that not only satisfies the properties of anonymity, security, authentication, nonrepudiation, and unforgeability that the previous paper achieved for ad hoc networks, but also satisfies other necessary properties such as confidentiality, traceability, and flexibility for multipaths in order to make the ad hoc environment more secure and practicable

    The Certificate Management of Public Key Infrastructure

    No full text
    [[abstract]]隨著網際網路的蓬勃發展與普及,各式各樣的應用也隨之大量推出,不論是商業、服務、教育...等各領域均有不錯的發展。因此,也造就了電子商務(E-commerce)的熱潮,但新的問題和挑戰也隨之產生,如:安全性、不可否認性及私密性等。解決這些問題的方法中,公開金鑰基礎建設(public Key Infrastructure, PKI)是其中常被考慮的方式,而憑證的概念更是PKI的核心。本文提出一種新的PKI實際運作架構,以安全的電子郵件伺服器(Secure Mail Server, SMS)線上(On-line)運作架構,解決憑證廢止清單(Certificate Revocation List, CRL)發行時間空窗期所可能產生的種種安全問題。此外,本文所提機制亦強化憑證使用的安全性,使憑證能更廣泛的應用在各種電子商務中。[[abstract]]Because of the growth and the popularization of the Internet, various kinds of applications are available and developed quite rapidly in many areas, such as commerce, education, and entertainment...etc. In the area of commerce, people call the application on the Internet “E-Commerce”. The E-commerce is a very hot headline, but some issue and challenge come along at the same time, for example, Integrity, Authentication, Confidentiality, and Non-repudiation. There are many ways to solve them, the most famous one of them is PKI (Public Key Infrastructure). The concept of Certificate is the most important part of PKI, but it gets some defects in CRL (Certificate Revocation List). This article proposes a new method that could improve the processes of CRL. At the same time, this article proposes a scheme, SMS On-line Structure, that could solve some secure problems of CRL issuing time gap, and increase the application of certificates. Finally, we propose an E-Commerce scheme base on PKI which can achieve the goal of personal service and authorization easily

    Broadcasting cryptosystem in computer networks

    No full text

    A Verifiable Multi-authority Secret Election Allowing Abstention From Voting

    No full text
    In this paper, we propose a robust and verifiable multi-authority secret voting scheme which meets the requirements of large-scale general elections. This scheme uses a uniquely blind threshold signature scheme to get blind threshold electronic votes such that any voter can abstain from voting after the registration phase. It also uses the threshold cryptosystem to guarantee fairness among the candidates ’ campaigns and to provide a mechanism for ensuring that any voter can make an open objection to the tally if his vote has not been published. In this scheme, the computations among voters are independent and voters only have to send an anonymous message to the counter after the registration phase. This scheme preserves the privacy of a voter from the counter, administrators, scrutineers and other voters. Completeness, robustness and verifiability of the voting process are ensured and hence no one can produce a false tally or corrupt or disrupt the election

    A simple password authentication using a polynomial

    No full text
    corecore