期刊文献+
共找到1,098篇文章
< 1 2 55 >
每页显示 20 50 100
End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network
1
作者 Shafi Ullah Haidawati Muhammad Nasir +5 位作者 Kushsairy Kadir Akbar Khan Ahsanullah Memon Shanila Azhar Ilyas Khan Muhammad Ashraf 《Computers, Materials & Continua》 2025年第2期3223-3249,共27页
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb... Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness. 展开更多
关键词 Mutual authentication lightweight end-to-end encryption elliptic curve cryptography industrial internet of things curve25519 machine-to-machine communication
在线阅读 下载PDF
Multiuser computational imaging encryption and authentication with OFDM-assisted key management
2
作者 Hongran Zeng Ping Lu +7 位作者 Xiaowei Li Lingling Huang Chaoyun Song Dahai Li In-kwon Lee Seok-Tae Kim Qiong-Hua Wang Yiguang Liu 《Advanced Photonics Nexus》 2024年第5期162-173,共12页
Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imagin... Single-pixel imaging(SPI)enables an invisible target to be imaged onto a photosensitive surface without a lens,emerging as a promising way for indirect optical encryption.However,due to its linear and broadcast imaging principles,SPI encryption has been confined to a single-user framework for the long term.We propose a multi-image SPI encryption method and combine it with orthogonal frequency division multiplexing-assisted key management,to achieve a multiuser SPI encryption and authentication framework.Multiple images are first encrypted as a composite intensity sequence containing the plaintexts and authentication information,simultaneously generating different sets of keys for users.Then,the SPI keys for encryption and authentication are asymmetrically isolated into independent frequency carriers and encapsulated into a Malus metasurface,so as to establish an individually private and content-independent channel for each user.Users can receive different plaintexts privately and verify the authenticity,eliminating the broadcast transparency of SPI encryption.The improved linear security is also verified by simulating attacks.By the combination of direct key management and indirect image encryption,our work achieves the encryption and authentication functionality under a multiuser computational imaging framework,facilitating its application in optical communication,imaging,and security. 展开更多
关键词 computational imaging optical encryption optical authentication key management
在线阅读 下载PDF
A Fully Homomorphic Encryption Scheme Suitable for Ciphertext Retrieval
3
作者 Ronglei Hu ChuceHe +3 位作者 Sihui Liu Dong Yao Xiuying Li Xiaoyi Duan 《Computers, Materials & Continua》 2025年第7期937-956,共20页
Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To ... Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To address these problems,this paper proposes an enhanced Fully Homomorphic Encryption(FHE)algorithm based on an improved DGHV algorithm,coupled with an optimized ciphertext retrieval scheme.Our specific contributions are outlined as follows:First,we employ an authorization code to verify the user’s retrieval authority and perform hierarchical access control on cloud storage data.Second,a triple-key encryption mechanism,which separates the data encryption key,retrieval authorization key,and retrieval key,is designed.Different keys are provided to different entities to run corresponding system functions.The key separation architecture proves particularly advantageous in multi-verifier coexistence scenarios,environments involving untrusted third-party retrieval services.Finally,the enhanced DGHV-based retrieval mechanism extends conventional functionality by enabling multi-keyword queries with similarity-ranked results,thereby significantly improving both the functionality and usability of the FHE system. 展开更多
关键词 Cloud storage homomorphic encryption ciphertext retrieval identity authentication
在线阅读 下载PDF
Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key
4
作者 Wangke Yu Shuhua Wang 《Computers, Materials & Continua》 SCIE EI 2023年第4期67-80,共14页
Wireless network is the basis of the Internet of things and theintelligent vehicle Internet. Due to the complexity of the Internet of things andintelligent vehicle Internet environment, the nodes of the Internet of th... Wireless network is the basis of the Internet of things and theintelligent vehicle Internet. Due to the complexity of the Internet of things andintelligent vehicle Internet environment, the nodes of the Internet of thingsand the intelligent vehicle Internet are more vulnerable to malicious destructionand attacks. Most of the proposed authentication and key agreementprotocols for wireless networks are based on traditional cryptosystems such aslarge integer decomposition and elliptic curves. With the rapid developmentof quantum computing, these authentication protocols based on traditionalcryptography will be more and more threatened, so it is necessary to designsome authentication and key agreement protocols that can resist quantumattacks. In this paper, an anti-quantum authentication scheme for wirelessnetworks based on lattice cryptosystem is constructed. In the attribute-basedauthentication scheme, the length of the authenticated public-private keypair depends on the maximum order and complexity of the formula in thealgorithm. In the attribute-based authentication scheme, there is a certaincorrelation between the authenticated data and the attribute value of theuser in the scheme. We show that the attribute-based authentication schemegives an attribute-based with smaller public-private key pairs. The securityof the attribute-based authentication scheme is based on the sub-exponentialhard problem of the LWE (Learning With Errors). The Q-poly made bythe adversary in the scheme, and our attribute-based authentication schemeguarantees that private data about user attributes and ciphertext cannot beobtained by malicious attackers. 展开更多
关键词 authentication learning with errors partial encryption SECURITY
在线阅读 下载PDF
Encryption with User Authentication Model for Internet of Medical Things Environment
5
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 User authentication SECURITY PRIVACY internet of medical things homomorphic encryption optimal key generation
在线阅读 下载PDF
Novel Scheme for Compressed Image Authentication Using LSB Watermarking and EMRC6 Encryption
6
作者 S. J. Jereesha Mary C. Seldev Christopher S. Sebastin Antony Joe 《Circuits and Systems》 2016年第8期1722-1733,共12页
In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techni... In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techniques and encryption schemes have been used to secure medical data like medical images. In this paper a combination of two algorithms to provide image authentication for medical images in the compressed format is proposed. In the proposed method, the watermark image is encrypted using the Enhanced modified RC6 block cipher (EMRC6) algorithm and the encrypted watermark image is watermarked using the simple Least significant Bit (LSB) watermarking technique. The watermarked output image shows no visual imparity and the watermark which has been extracted has no visual difference. The test results show that the watermarked image has high quality and the watermark is very secure. Also the PSNR value of proposed method is 44.966 on an average and 43.0633 for the existing system where LSB technique is integrated with MRC6 for security of watermark. Hence the work is aimed to increase the embedding volume and make the watermark more secure which is the basic requirement of medical image security. 展开更多
关键词 WATERMARK EMRC6 LSB Content authentication encryption
在线阅读 下载PDF
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
7
作者 Chunlin Xiong Zhengqiu Weng +4 位作者 Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期3013-3032,共20页
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication. 展开更多
关键词 Mobile authentication blockchain federated learning smart contract certificateless encryption VMD LSTM
在线阅读 下载PDF
Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System
8
作者 Yanzhong Sun Xiaoni Du +1 位作者 Shufen Niu Xiaodong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3287-3310,共24页
Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectio... Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability andmulti-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones. 展开更多
关键词 Cloud email system authenticated searchable encryption blockchain-based designated server test multi-trapdoor privacy multi-ciphertext indistinguishability
在线阅读 下载PDF
基于变色龙哈希加密的无线传感网数据聚合隐私保护
9
作者 庞峰 窦立君 《现代电子技术》 北大核心 2025年第21期72-76,共5页
为避免未授权用户获取敏感信息,提升数据聚合隐私保护效果,文中提出一种基于变色龙哈希加密的无线传感网数据聚合隐私保护方法。通过密钥生成算法、哈希算法与求逆算法,构建强变色龙哈希函数;依据强变色龙哈希函数内的公私钥,建立动态... 为避免未授权用户获取敏感信息,提升数据聚合隐私保护效果,文中提出一种基于变色龙哈希加密的无线传感网数据聚合隐私保护方法。通过密钥生成算法、哈希算法与求逆算法,构建强变色龙哈希函数;依据强变色龙哈希函数内的公私钥,建立动态变色龙认证树,防止数据聚合过程中敏感信息泄露给未经授权的第三方,提升数据聚合隐私保护效果;依据动态变色龙认证树,设计无线传感网数据聚合隐私保护协议,通过高级加密标准算法先加密基站上传的数据再采用聚合节点存储数据,完成数据聚合隐私保护。实验结果证明:该方法可有效加密基站上传的数据,完成无线传感网数据聚合隐私保护;在不同概率攻击下,该方法的数据完整性均较高,即数据聚合隐私保护效果较优,可有效避免未授权用户获取敏感信息,提升隐私保护效果。 展开更多
关键词 变色龙 哈希加密 无线传感网 数据聚合 隐私保护 认证树 高级加密 聚合节点
在线阅读 下载PDF
面向智慧油气勘探开发系统的多维密态数据聚合技术研究与应用
10
作者 张晓均 张豪 +1 位作者 李兴鹏 张经伟 《计算机工程与科学》 北大核心 2025年第4期634-643,共10页
工业物联网(IIoT)技术使得智慧油气勘探开发系统加速了场区数据汇聚,打破了信息孤岛壁垒,同时勘探开发关键数据的机密性、完整性、认证性等信息安全保障也越来越重要。对此,提出了面向智慧油气勘探开发系统的多维密态数据聚合方案。该... 工业物联网(IIoT)技术使得智慧油气勘探开发系统加速了场区数据汇聚,打破了信息孤岛壁垒,同时勘探开发关键数据的机密性、完整性、认证性等信息安全保障也越来越重要。对此,提出了面向智慧油气勘探开发系统的多维密态数据聚合方案。该方案结合超递增序列,改进了同态加密算法,设计了随机盲化秘密参数,即使解密私钥遭泄露,油气勘探开发系统终端设备传输的重要数据也不会被窃取。可信中心根据勘探开发系统中各通信实体的真实身份产生对应的私钥,彼此可以根据对方的身份灵活地协商可认证的会话密钥,计算基于哈希函数的消息认证码。这样,控制中心可以轻量级地验证数据集成平台服务器发送的聚合密文的完整性,解密各个场区关键数据的聚合值,掌握勘探开发状态参数的平均值,实现对智慧油气勘探开发系统的实时监督与调控。安全性分析和性能评估结果表明,所提方案可以安全高效地部署在智慧油气勘探开发环境。 展开更多
关键词 智慧油气勘探开发系统 同态加密 密态聚合 消息认证码 完整性验证
在线阅读 下载PDF
基于椭圆曲线加密的无线传感网络源节点隐私信息匿名通信方法
11
作者 石鲁生 朱慧博 《传感技术学报》 北大核心 2025年第7期1303-1308,共6页
无线传感器网络中的节点通常具有有限的能量、处理能力和通信范围,使得它们在实现匿名通信方面受到限制。为保证网络源节点隐私信息通信的安全性,实现通信双方的匿名通信,提出基于椭圆曲线加密的无线传感网络源节点隐私信息匿名通信方... 无线传感器网络中的节点通常具有有限的能量、处理能力和通信范围,使得它们在实现匿名通信方面受到限制。为保证网络源节点隐私信息通信的安全性,实现通信双方的匿名通信,提出基于椭圆曲线加密的无线传感网络源节点隐私信息匿名通信方法。利用椭圆曲线构建密码机制,使网络模型中的节点可分配一个假名,节点通过假名完成通信,保证通信双方信息不被窃取;为待传输隐私信息生成对应的数字签名,只有在认证签名有效的前提下,才能获取隐私信息的明文信息,确保隐私信息的安全性,完成节点隐私信息匿名通信。仿真结果表明,所提方法的通信开销为101 bit,在可窃听范围为40 m时匿名度就达到了100%,完成一次隐私信息匿名通信所需的时间为8.9 ms。 展开更多
关键词 无线传感网络 隐私信息匿名通信 椭圆曲线加密 数字签名认证 哈希函数
在线阅读 下载PDF
基于指纹密码学及SNEP框架的加密通信机制
12
作者 彭茂玲 何娇 《计算机应用文摘》 2025年第3期150-153,共4页
随着信息技术的飞速发展,数据安全和隐私保护成为当今社会的重要议题。文章提出了一种基于指纹密码学和安全网络加密协议(SNEP)框架的加密通信机制。结合生物识别技术中的指纹特征及SNEP框架,该机制确保了数据传输过程的安全性和效率。... 随着信息技术的飞速发展,数据安全和隐私保护成为当今社会的重要议题。文章提出了一种基于指纹密码学和安全网络加密协议(SNEP)框架的加密通信机制。结合生物识别技术中的指纹特征及SNEP框架,该机制确保了数据传输过程的安全性和效率。其中,通过将用户指纹信息与加密密钥相结合,生成唯一的加密密钥,确保了数据在传输过程中的安全性。同时,SNEP框架的引入使得加密过程更加灵活和可扩展,能适应不同的应用场景和安全需求。 展开更多
关键词 指纹密码学 加密通信 SNEP框架 数据安全 生物特征认证
在线阅读 下载PDF
基于区块链技术的车联网隐私数据安全加密方法
13
作者 魏晓宁 《智能物联技术》 2025年第3期50-53,共4页
为避免隐私数据受到外部攻击时出现丢失等异常现象,基于区块链技术的应用,以车联网为例,开展隐私数据安全加密方法的设计研究。采用区块聚合机制,将多个交易共同打包处理,进行车联网通信身份验证;设计支持多消息并行认证的批量验证机制... 为避免隐私数据受到外部攻击时出现丢失等异常现象,基于区块链技术的应用,以车联网为例,开展隐私数据安全加密方法的设计研究。采用区块聚合机制,将多个交易共同打包处理,进行车联网通信身份验证;设计支持多消息并行认证的批量验证机制,进行车联网隐私数据批量验证;设计区块链数据结构,采用加法同态加密对数据进行分类保护,保障隐私数据块结构安全。对比实验结果表明,设计的方法不仅可以加密隐私数据,还能有效抵御外部攻击。 展开更多
关键词 区块链技术 身份验证 安全加密方法 批量验证 隐私数据 车联网
在线阅读 下载PDF
数字化档案敏感信息混沌密钥加密算法仿真
14
作者 黄仁彦 杨立 《计算机仿真》 2025年第1期249-252,262,共5页
为了降低数字化档案信息泄露和非法访问概率,确保密钥在传输和使用过程中不被泄露或篡改,降低冗余信息的干扰,提升信息安全性,提出一种基于身份认证的数字化档案敏感信息加密算法。通过基于椭圆曲线的身份认证确保只有合法身份认证的用... 为了降低数字化档案信息泄露和非法访问概率,确保密钥在传输和使用过程中不被泄露或篡改,降低冗余信息的干扰,提升信息安全性,提出一种基于身份认证的数字化档案敏感信息加密算法。通过基于椭圆曲线的身份认证确保只有合法身份认证的用户才能访问敏感信息,使用Bloom filter方法对合法用户访问的敏感信息中的冗余数据实施处理,减少不必要的信息量,利用混沌序列加密方法对处理后的敏感信息实施加密,生成具有高随机性和复杂性的混沌密钥,增加敏感信息破解的难度,确保数据的安全性。实验结果表明,所提算法能够有效地保护数字化档案中的敏感信息,防止未经授权的访问和泄露,具有较高的加密安全性。 展开更多
关键词 身份认证 敏感信息加密 混沌序列
在线阅读 下载PDF
基于无线打印机的双信道随机数交叉认证算法研究
15
作者 张超 顾涛 +1 位作者 王超 张智斌 《华北科技学院学报》 2025年第3期77-87,共11页
为解决物理公章管理中的安全隐患(如违法滥用、盗用和仿刻等问题),提出一种基于无线打印机的双信道随机数交叉认证算法(DCRCA)。算法结合蓝牙与Wi-Fi信道的协同工作,改进AES加密算法,提升数据加密过程中密钥的随机性与动态性。提出一次... 为解决物理公章管理中的安全隐患(如违法滥用、盗用和仿刻等问题),提出一种基于无线打印机的双信道随机数交叉认证算法(DCRCA)。算法结合蓝牙与Wi-Fi信道的协同工作,改进AES加密算法,提升数据加密过程中密钥的随机性与动态性。提出一次一密算法,做到用印事后可追溯,结合数据完整性校验算法及数字水印技术,加强公章图案数据在传输中的安全性,有效防止中间人攻击、重放攻击和数据篡改等安全威胁。实验结果表明,算法在提升安全性的同时,保持了高效性和低延迟,能够有效支持高安全需求场景(如加密文件和公章打印)。为无线打印机及其他移动设备间的安全通信提供了新的思路,具有广泛的应用前景。 展开更多
关键词 无线打印机 双信道认证 通信加密 蓝牙 WI-FI
在线阅读 下载PDF
基于区块链和CP-ABE的跨域认证方案 被引量:2
16
作者 左娇 张龙 张可佳 《计算机工程与设计》 北大核心 2025年第4期1056-1063,共8页
为保护不同域用户身份信息的隐私性和信息传输的安全性,提出一种基于区块链和密文策略属性基加密(CP-ABE)的跨域认证方案。利用模糊提取技术对用户生物特征进行处理,将其转换成公开信息与随机生物密钥后参与认证,保护用户身份信息不被泄... 为保护不同域用户身份信息的隐私性和信息传输的安全性,提出一种基于区块链和密文策略属性基加密(CP-ABE)的跨域认证方案。利用模糊提取技术对用户生物特征进行处理,将其转换成公开信息与随机生物密钥后参与认证,保护用户身份信息不被泄露;利用区块链技术独有的数据难以篡改和信息全网公开等特性,完成用户身份信息一致性的跨域认证;利用CP-ABE,实现跨域认证过程中密文数据交互的隐私性保护。经安全性与性能分析,方案可抵抗重放攻击、口令猜测攻击、内部攻击和消息篡改攻击,有较高的安全性,与现有的跨域认证方案相比有较低的计算开销。 展开更多
关键词 跨域认证 生物认证 区块链 模糊提取 属性加密 密钥协商 隐私保护
在线阅读 下载PDF
支持黑名单的去中心化k次匿名属性认证 被引量:1
17
作者 陶静怡 彭凌祺 阚海斌 《计算机工程》 北大核心 2025年第2期159-169,共11页
随着云计算和数据服务的普及,人们对隐私保护和数据安全的需求日益迫切。传统的匿名认证方案可以保护用户的隐私,但是在对用户的访问控制方面存在不足,而现有的k次匿名属性认证方案无法对恶意用户问责。为了在保护用户隐私的同时对用户... 随着云计算和数据服务的普及,人们对隐私保护和数据安全的需求日益迫切。传统的匿名认证方案可以保护用户的隐私,但是在对用户的访问控制方面存在不足,而现有的k次匿名属性认证方案无法对恶意用户问责。为了在保护用户隐私的同时对用户进行访问控制和问责,提出一种支持黑名单的去中心化k次匿名属性认证方案,旨在使服务提供商能够对用户进行细粒度访问控制并限制其访问次数,同时能够阻止黑名单中的恶意用户再次访问服务。该方案利用去中心化属性加密与非交互式零知识证明技术,使得用户能够以匿名的方式认证其属性,同时还能证明其访问服务的次数没有超过阈值。为了在实现匿名性的同时对恶意用户问责,设计黑名单机制,利用无陷门累加器技术加快了黑名单管理和认证的过程,提高了方案的效率。此外,通过结合去中心化属性密码和区块链技术,该方案还具有去中心化的特性。实验结果表明,该方案的安全模型满足抗误验证性和匿名性,在实际应用中具有一定的可行性和实用性。 展开更多
关键词 区块链 属性密码 零知识证明 黑名单 匿名认证 累加器
在线阅读 下载PDF
4G/5G无人机指挥控制链路传输威胁与防护
18
作者 姜家财 吴昊 +3 位作者 朱宇 杨斌 郭伟 肖光龙 《电讯技术》 北大核心 2025年第9期1428-1434,共7页
随着4G/5G移动通信技术被应用于无人机指挥控制(Command and Control,C2)链路,此类链路因安全保护机制不足而面临日益严峻的安全威胁。针对4G/5G无人机C2链路完整性保护缺失的弱点,在实验室环境下完成了4G/5G无人机C2链路指令篡改攻击... 随着4G/5G移动通信技术被应用于无人机指挥控制(Command and Control,C2)链路,此类链路因安全保护机制不足而面临日益严峻的安全威胁。针对4G/5G无人机C2链路完整性保护缺失的弱点,在实验室环境下完成了4G/5G无人机C2链路指令篡改攻击验证实验。为了应对该威胁,提出了基于高性能认证加密的C2链路数据防护方案,并在飞腾E2000Q嵌入式环境下完成了与现有商用EEA3+EIA3组合方案的对比测试和分析。所提方案在保证安全性的同时具有更好的性能表现。 展开更多
关键词 移动通信技术 网络安全 无人机指挥控制链路 篡改攻击 认证加密
在线阅读 下载PDF
基于国密SM9的公钥认证可搜索加密方案
19
作者 蒲浪 林超 +2 位作者 伍玮 顾晶晶 何德彪 《软件学报》 北大核心 2025年第9期4271-4284,共14页
云存储为用户的数据管理带来了极大便捷,已成为数字经济的重要组成部分.然而,复杂多样的网络环境和不完全可信的第三方对用户隐私造成极大威胁.为保护用户隐私,通常先加密数据后存储,但传统加密技术生成的密文阻碍了后续数据检索.公钥... 云存储为用户的数据管理带来了极大便捷,已成为数字经济的重要组成部分.然而,复杂多样的网络环境和不完全可信的第三方对用户隐私造成极大威胁.为保护用户隐私,通常先加密数据后存储,但传统加密技术生成的密文阻碍了后续数据检索.公钥可搜索加密(public-key encryption with keyword search,PEKS)技术在保障数据加密的同时,可提供保密检索功能,但由于常用关键词数量较少,传统PEKS方案易遭受关键词猜测攻击.公钥认证可搜索加密(public-key authenticated encryption with keyword search,PAEKS)在PEKS的基础上引入认证技术,可进一步提高安全性.然而,现有PAEKS方案大多基于国外密码算法设计,不符合我国密码技术自主创新的发展需求.基于国密SM9提出SM9-PAEKS方案,通过重新设计算法结构,将耗时运算转移至资源丰富的云端服务器,有效提升用户端检索效率.并在随机谕言模型下基于q-BDHI和Gap-q-BCAA1安全假设证明所提方案的安全性.最后理论分析和实验结果表明,与同类方案中通信代价最优的方案相比,SM9-PAEKS在仅增加96字节通信代价的情况下,总计算开销可至少降低约59.34%,其中关键词陷门生成的计算开销降低尤其显著,约为77.55%.有助于丰富国密算法的应用,同时可为云存储中数据加密与检索提供理论与技术支撑. 展开更多
关键词 公钥认证可搜索加密 SM9加密算法 隐私保护 数据安全 云存储
在线阅读 下载PDF
基于区块链和去中心化可问责属性认证的众包方案
20
作者 陶静怡 张亮 阚海斌 《软件学报》 北大核心 2025年第4期1844-1858,共15页
众包是一种分布式解决问题的方式,可以降低成本并有效利用资源.区块链技术的引入解决了传统众包平台集中化程度过高的问题,但它的透明性却带来了隐私泄露的风险.传统的匿名认证虽然可以隐藏用户身份,但存在匿名滥用的问题,同时还增加了... 众包是一种分布式解决问题的方式,可以降低成本并有效利用资源.区块链技术的引入解决了传统众包平台集中化程度过高的问题,但它的透明性却带来了隐私泄露的风险.传统的匿名认证虽然可以隐藏用户身份,但存在匿名滥用的问题,同时还增加了对工作者筛选的难度.提出一种去中心化可问责属性认证方案,并将其与区块链结合设计一种新型众包方案.该方案利用去中心化属性加密与非交互式零知识证明技术,在保护用户身份隐私的同时实现可链接性和可追踪性,并且请求者可以制定访问策略来筛选工作者.此外,该方案通过门限秘密分享技术实现了属性授权机构和追踪组,提高系统的安全性.通过实验仿真和分析证明该方案在时间和存储开销上符合实际应用需求. 展开更多
关键词 区块链 属性加密 零知识证明 众包 匿名认证 可问责制
在线阅读 下载PDF
上一页 1 2 55 下一页 到第
使用帮助 返回顶部