Time filter

Source Type

Beijing, China

Beijing Electronic Science and Technology Institute is a university in Beijing, China. It is a major research institute of information security in China. It consists of five departments, with approximately 1,000 students. It belongs to the General Office of the Communist Party of China. Wikipedia.

Feng Y.,Beijing Electronic Science and Technology Institute
IET Conference Publications

Compared to IKE protocol, the capability of JFKi anti-DoS attack is stronger. By m-depth study of JFKi protocol. the two kinds of DoS attack that JFKi may still suffer were analyzed. One is low-cost DoS attack which is lower calculation effort spent on the DoS attack, and the other is high-cost DoS attack which is higher calculation effort. To investigate the DoS attacks that JFKi may still suffer, the procedures of these attacks have been described in detail, and the cost of the attacker and the effect of the attacks have been analyzed deeply. Finally, the corresponding improvement solutions for low-cost DoS attack and high-cost DoS attack which influence to the efficiency of JFKi is minor have been proposed. Source

Lin S.,Fujian Normal University | Sun Y.,Beijing Electronic Science and Technology Institute | Liu X.-F.,Fujian Normal University | Yao Z.-Q.,Fujian Normal University
Quantum Information Processing

In this paper, a quantum private comparison protocol with Bell states is proposed. In the protocol, two participants can determine the relationship between their secret inputs in size, with the assistance of a semi-trusted third party. The presented protocol can ensure fairness, correctness, and security. Meanwhile, all the particles undergo only a one-way trip, which improves the efficiency and security of the communication. Furthermore, only Bell states are exploited in the implementation of the protocol, and two participants are just required having the ability to perform single particle operations, which make the presented protocol more feasible in technique. © 2012 Springer Science+Business Media, LLC. Source

Sun Y.,Beijing University of Posts and Telecommunications | Sun Y.,Beijing Electronic Science and Technology Institute | Wen Q.-Y.,Beijing University of Posts and Telecommunications
Physical Review A - Atomic, Molecular, and Optical Physics

In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency.We also analyze how to achieve the optimal efficiency under various conditions. © 2010 The American Physical Society. Source

Liu B.,Beijing Electronic Science and Technology Institute
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition)

Aiming at the AES cipher chip with rotating S-boxes masking, a new method of correlation power attack was proposed. Firstly, a variance analysis approach was used to identify the time instances when the plaintext blinding and the relevant S-box were computed. Secondly, the random offset of each trace was guessed by calculating the correlation coefficients between hamming weight and the points of masking operation. Lastly, the secret key was revealed by operating correlation power attack using the guessed hamming distance between S-box input and output. Experimental results from attacking 1×104 traces randomly selected in DPA Contest V4 dataset which is publicly available show that this method requires only 45 traces to recovery the key correctly. ©, 2014, Huazhong University of Science and Technology. All right reserved. Source

Chen H.,Beijing Electronic Science and Technology Institute | Li Y.,Beijing Jiaotong University | Ren J.,University of Chinese Academy of Sciences
International Journal of Network Security

In this paper, we construct a new identity-based sign cryption scheme from bilinear pairings, which can pro- cess arbitrary length plaintexts. The scheme produces shorter ciphertext than the Libert-Quisquater signcryp- tion scheme for the same plaintext and adapts to the bandwidth-constrained scenario very well. It is proved secure against adaptive chosen ciphertext and identity attack based on a variant of the Bilinear Di±e-Hellman problem in the random oracle model. Source

Discover hidden collaborations