閾值密碼學的研究與分類

吳秉宸 - 2019 - tdr.lib.ntu.edu.tw
… required to perform an RSA encryption, which is the amount … key (𝑘𝑆) generation and data
transfer. This helps to resist any … To avoid such situation, threshold encryption algorithm was …

防帳卡號被盜之低成本免憑證電子錢網路付款可行性方案研究

周志賢 - 2013 - nhuir.nhu.edu.tw
… , a meaningless RSA public key requires using a meaningful … pairing, Paillar encryption,
double ElGamal encryption, and … secure hash function and that U has no information about B’s …

以ECC 為基礎的雲端檔案完整保全之綜合性策略研究

周志賢 - 2015 - nhuir.nhu.edu.tw
… Among them involves the information transfer process. The … Define two cryptographic hash
functions with the mapping: H1: G1 … key cryptosystems such as RSA, Elgamal, Bilinear pairing, …

[HTML][HTML] 基于区块链的个人敏感数据安全存储及共享方法

曹穗 - Computer Science and Application, 2022 - hanspub.org
… of private information, and the high overhead of encryption … -CP-ABE,并使用乘法同态
ElGamal密码系统来确保授权验证期间的… 的非对称加密算法,相比于RSA的安全性依赖于大整数的分解…

公开可验证的秘密重新分配门限方案(英文)

谭作文, 刘卓军 - 中国科学院大学学报, 2004 - journal.ucas.ac.cn
… Obviously ,only the participant Pi has its own private key and … is a public cryptographically
strong Hash function .Note that … is infeasible and ElGamal-like encryption systems is unbroken , …

基于混沌映射的数据库信息隐私加密储存算法

熊爱明, 李明倩, 刘芳 - 吉林大学学报(信息科学版), 2023 - xuebao.jlu.edu.cn
… query is constructed, compressed by hash function, and … 质数判断的 RSA 算法(EPNRSA:
RSA algorithm based on Enhanced … 一种实现数据库同态计算的ELGamal 重加密算法[J]. 北京交通…

[PDF][PDF] 无可信第三方的加密重复数据安全删除方法

张曙光, 咸鹤群, 王利明, 刘红燕, 侯瑞涛 - 密码学报, 2018 - jcr.cacrnet.org.cn
… to protect data privacy, most users choose to use a private key to … encryption algorithm is
adopted to design the secure … 本文使用的同态加密方案为 lifted ElGamal encryption, 该方案共包含…

以軟硬體參數為基礎之資料加密法

張鉦新 - 2018 - thuir.lib.thu.edu.tw
RSA 原理是使用兩個夠大的質數相乘所得出的數字,將其做質 因數… Hash Function 是將資料打
亂混合,重新建立一個叫做hashElgamal, “A public key cryptosystem and a signature scheme …

[HTML][HTML] 強化基於智慧卡之公開金鑰密碼系統實作安全性與效率

WC Lien - 2013 - ir.lib.ncu.edu.tw
… (ECC), whereas a cryptographic elliptic curve is usually … This dissertation proposes a
new DPA attack on the RSA-… [18] Taher ElGamal. A public key cryptosystem and a signature …

[HTML][HTML] 公平電子交易協定及小額付費系統之研究

YC Chen - 2006 - ir.lib.ncu.edu.tw
exchange protocols involves a trusted third party to ensure fairness, but an appropriate third
party with such functions … to provide functions closing to fair exchange without relying on a …