Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Partially blind signature scheme with ID-based server-aided verification
REN Xiaokang, CHEN Peilin, CAO Yuan, LI Yanan, YANG Xiaodong
Journal of Computer Applications    2016, 36 (11): 3098-3102.   DOI: 10.11772/j.issn.1001-9081.2016.11.3098
Abstract526)      PDF (704KB)(410)       Save
Combined ID-based partially blind signature and server-aided verification signature, a partially blind signature scheme with ID-based server-aided verification was presented to overcome the shortcomings of ID-based partially blind signature schemes such as strong security assumption and high computation cost. Most computing tasks of signature verification were accomplished by a server, and it greatly reduced computational overhead of verifier. Based on bilinear mapping, a partially blind signature scheme with specific ID-based server-aided verification was proposed. This scheme was proven to be secure in the standard model. Analysis results show that the proposed scheme greatly reduces computational complexity of signature verification. The proposed scheme is more efficient than Li's scheme (LI F, ZHANG M, TAKAGI T. Identity-based partially blind signature in the standard model for electronic cash. Mathematical and Computer Modelling, 2013, 58(1):196-203) and Zhang's scheme (ZHANG J, SUN Z. An ID-based server-aided verification short signature scheme avoid key escrow. Journal of Information Science and Engineering, 2013, 29(3):459-473).
Reference | Related Articles | Metrics
Location aided broadcast protocol for mobile Ad Hoc networks
SHEN Jun,CAO Yuan-da,ZHANG Shu-dong
Journal of Computer Applications    2005, 25 (11): 2492-2495.  
Abstract1283)      PDF (849KB)(1201)       Save
A new broadcast protocol named as location aided broadcast protocol(LABP),which was aided by location information,was put forward.In this protocol,a relay node separated adjacent area into grids,found the broadcast relay gateways(BRGs) with aid of the grids,and broadcasted the message to all its neighbors,with the information of the BRGs.The simulation results show the excellent broadcast performance with LABP.
Related Articles | Metrics
Time synchronization protocol for wireless sensor networks
PENG Gang, CAO Yuan-da, SUN Li-min
Journal of Computer Applications    2005, 25 (06): 1230-1232.   DOI: 10.3724/SP.J.1087.2005.1130
Abstract1217)            Save
A time synchronization protocol based on hierarchical structure was designed. In this protocol, at first a hierarchical structure tree was established with sink node as root node, then a pair wise synchronization was performed along the tree to establish a global timescale throughout the sensor network. The simulation results show that the time synchronization protocol can be used for wireless sensor network applications.
Related Articles | Metrics
Design and implementation of network security management platform based on XMLRPC
XUE Jing-feng, CAO Yuan-da
Journal of Computer Applications    2005, 25 (05): 1130-1132.   DOI: 10.3724/SP.J.1087.2005.1130
Abstract1390)      PDF (161KB)(653)       Save
Allowing for the shortcomings of existing network security management, a network security management platform based on XMLRPC was designed. The problems of the standardization and combination of log and data in network security management platform were analyzed, a solution method was put forward and the process of implementation was discussed in details. This platform can manage all kinds of network security products running on different operating systems. Moreover, all kinds of log data can be analyzed identically by this platform.
Related Articles | Metrics
Construction and validation of optimal diffusion layers in SPN block cciphers
CUI Ling-guo,CAO Yuan-da
Journal of Computer Applications    2005, 25 (04): 856-858.   DOI: 10.3724/SP.J.1087.2005.0856
Abstract1040)      PDF (126KB)(1226)       Save

Most of diffusion layers are linear transformations on the vector space GF(2 m) n for SPN structures, which correspond to n-rank matrices under certain bases. The diffusion layers in which branch numbers B equals n+1 are optimal, iff their corresponding matrices have no singular square submatrices. An algorithm was proposed to construct optimal linear layers. In order to validate the optimization of diffusion layers, an algorithm was provided. As an example, a optimal linear mapping over GF(2 8) 8 and its optimization-validation were presented.

Related Articles | Metrics
Improved method of location information service
SHEN Jun, CAO Yuan-da, ZHANG Shu-dong
Journal of Computer Applications    2005, 25 (03): 530-532.   DOI: 10.3724/SP.J.1087.2005.0530
Abstract778)      PDF (183KB)(806)       Save
In many cases, mobile host needs to obtain accurate or approximate location information in the network, i.e. needs a location service. Five existing location services known as Location Information Flooding(LIF), DREAM Location Service(DLS), Simple Location Service(SLS), Reactive Location Service(RLS), and GLS Location Service were briefly discussed and their performances were compared. Based on these protocols, a new location service named Simple New Location Update Service (SNLUS) was put forward. It improved the Simple Location Service (SLS) by adding "sign of information update" in location information table. Simulation results show that it provides an effective location information service with less overhead.
Related Articles | Metrics