Trusted computing encryption model based on XTR public key cryptosystem

被引:0
|
作者
Zhou, Hua [1 ]
机构
[1] School of Electronic and Information, Guizhou University, Guiyang, China
来源
关键词
723.2 Data Processing and Image Processing - 921.1 Algebra;
D O I
10.12733/jcis14730
中图分类号
学科分类号
摘要
14
引用
收藏
页码:4465 / 4472
相关论文
共 50 条
  • [21] A new public key cryptosystem based on matrices
    Alvarez, Rafael
    Martinez, Francisco-Miguel
    Vicent, Jose-Francisco
    Zamora, Antonio
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 36 - 39
  • [22] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [23] A PUBLIC KEY CRYPTOSYSTEM BASED ON LYNDON WORDS
    SIROMONEY, R
    MATHEW, L
    INFORMATION PROCESSING LETTERS, 1990, 35 (01) : 33 - 36
  • [24] Encryption Key Protection For Private Computing on Public Platforms
    Morris, Thomas H.
    Nair, V. S. S.
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 821 - +
  • [25] New Public Key Cryptosystem Based on Quaternions
    Durcheva, Mariana
    Karailiev, Kristian
    PROCEEDINGS OF THE 43RD INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'17), 2017, 1910
  • [26] A public key cryptosystem based on actions by semigroups
    Maze, G
    Monico, C
    Rosenthal, J
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 266 - 266
  • [27] A JOINT SIGNATURE ENCRYPTION AND ERROR CORRECTION PUBLIC-KEY CRYPTOSYSTEM BASED ON ALGEBRAIC CODING THEORY
    李元兴
    成坚
    王新梅
    JournalofElectronics(China), 1992, (01) : 33 - 39
  • [28] Efficient Revocation on Identity based Encryption with Public Key Infrastructure in Cloud Computing
    Sale, Nitin
    Talhar, Nitin
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [29] A threshold key escrow scheme based on public key cryptosystem
    Zhenfu Cao
    Science in China Series E: Technological Sciences, 2001, 44 : 441 - 448