Affiliation:
1. Communication University of China
2. CEC Information Security Research Institute
Abstract
This paper proposes a secure prosecution program after analysis and study on the defects of current network report systems in their report modes and protection on prosecutors’ privacy. The program can not only achieve better anonymity for prosecutors but also can track malicious prosecutors. This paper improved the efficiency of existing algorithms for privacy, and realized various functions for the prosecution system to ensure anonymity, non-repudiation, traceability and other safety indicators.
Publisher
Trans Tech Publications, Ltd.
Reference9 articles.
1. Jinxian Zhuang. Anonymous Evocable Electronic Report System. Shanghai Jiaotong University, thesis, (2008).
2. H. J. Kim, J. I. Lim and D. H. Lee. Efficient and securemember deletion in group Signature schemes. Information Security and Cryptology, 2001, p.150–161.
3. D. Song. Practical forward secure group Signature schemes. Proc of the 8t ACM Conference on Computer and Communications Security, ACM, 2001, p.225–234.
4. Yanli Zhang, Jiayong Liu. Design and Implementation Based on ECC Digital Signature System. Information security and communications confidential, 2011, No. 5, p.86–90.
5. S. Bhattacharys, S. K. Ghosh. An artificial intelligence based approach for risk management using attack graph[C]. 2007 International Conference on Computational Intelligence and Securit, 2007, p.794–798.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Advance of Digital Signature with Quantum Computing;Highlights in Science, Engineering and Technology;2023-04-01