期刊文献+
共找到143篇文章
< 1 2 8 >
每页显示 20 50 100
A Privacy Preserving Deep Linear Regression Scheme Based on Homomorphic Encryption 被引量:1
1
作者 Danping Dong Yue Wu +1 位作者 Lizhi Xiong Zhihua Xia 《Journal on Big Data》 2019年第3期145-150,共6页
This paper proposes a strategy for machine learning in the ciphertext domain.The data to be trained in the linear regression equation is encrypted by SHE homomorphic encryption,and then trained in the ciphertext domai... This paper proposes a strategy for machine learning in the ciphertext domain.The data to be trained in the linear regression equation is encrypted by SHE homomorphic encryption,and then trained in the ciphertext domain.At the same time,it is guaranteed that the error of the training results between the ciphertext domain and the plaintext domain is in a controllable range.After the training,the ciphertext can be decrypted and restored to the original plaintext training data. 展开更多
关键词 linear regression somewhat homomorphic encryption machine learning
在线阅读 下载PDF
Speech Encryption in Linear Canonical Transform Domain Based on Chaotic Dynamic Modulation
2
作者 Liyun Xu Tong Zhang Chao Wen 《Journal of Beijing Institute of Technology》 EI CAS 2021年第3期295-304,共10页
In order to transmit the speech information safely in the channel,a new speech encryp-tion algorithm in linear canonical transform(LCT)domain based on dynamic modulation of chaot-ic system is proposed.The algorithm fi... In order to transmit the speech information safely in the channel,a new speech encryp-tion algorithm in linear canonical transform(LCT)domain based on dynamic modulation of chaot-ic system is proposed.The algorithm first uses a chaotic system to obtain the number of sampling points of the grouped encrypted signal.Then three chaotic systems are used to modulate the corres-ponding parameters of the LCT,and each group of transform parameters corresponds to a group of encrypted signals.Thus,each group of signals is transformed by LCT with different parameters.Fi-nally,chaotic encryption is performed on the LCT domain spectrum of each group of signals,to realize the overall encryption of the speech signal.The experimental results show that the proposed algorithm is extremely sensitive to the keys and has a larger key space.Compared with the original signal,the waveform and LCT domain spectrum of obtained encrypted signal are distributed more uniformly and have less correlation,which can realize the safe transmission of speech signals. 展开更多
关键词 communication security linear canonical transform transform domain encryption chaotic system
在线阅读 下载PDF
A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations 被引量:4
3
作者 张立民 孙克辉 +1 位作者 刘文浩 贺少波 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第10期98-106,共9页
In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic ... In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic sequences, a novel color image encryption algorithm is proposed by employing a hybrid model of bidirectional circular permutation and DNA masking. In this scheme, the pixel positions of image are scrambled by circular permutation, and the pixel values are substituted by DNA sequence operations. In the DNA sequence operations, addition and substraction operations are performed according to traditional addition and subtraction in the binary, and two rounds of addition rules are used to encrypt the pixel values. The simulation results and security analysis show that the hyperchaotic map is suitable for image encryption, and the proposed encryption algorithm has good encryption effect and strong key sensitivity. It can resist brute-force attack, statistical attack, differential attack, known-plaintext, and chosen-plaintext attacks. 展开更多
关键词 color image encryption DNA sequence operation fractional calculus piecewise-linear hyperchaotic system
原文传递
A Novel Fully Homomorphic Encryption Scheme Bsed on LWE 被引量:2
4
作者 DING Yong LI Xiumin +1 位作者 Lü Haifeng LI Xinguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期84-92,共9页
Although the learning with errors(LWE)-based full homomorphic encryption scheme was the first example of deviation from the original Gentry's blueprint, the scheme did not give detailed conversion process of circui... Although the learning with errors(LWE)-based full homomorphic encryption scheme was the first example of deviation from the original Gentry's blueprint, the scheme did not give detailed conversion process of circuit layer structure, and must rely on bootstrapping technique to achieve full homomorphism. Therefore, through modifying the re-linearization technique proposed by the above scheme, a technique called non-matrix key switching is presented, which includes key switching with re-linearization and pure key switching. The complex matrix operations of existing key switching technique are removed. Combining this technique with modulus switching, a (leveled) fully homomorphic encryption scheme without bootstrapping from LWE is constructed. In order to make circuit layer structure clear, the scheme gives detailed refresh door operation. Finally, we use bootstrapping to upgrade arithmetic circuit to any layer, and make the homomorphic computing capability of the scheme have nothing to circuit depth. 展开更多
关键词 fully homomorphic encryption re-linearization key switching modulus switching LWE BOOTSTRAPPING
原文传递
Algebraic Cryptanalysis of GOST Encryption Algorithm
5
作者 Ludmila Babenko Ekaterina Maro 《Journal of Computer and Communications》 2014年第4期10-17,共8页
This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic an... This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define relations between a secret key and a cipher text. Extended linearization method is evaluated as a method for solving the nonlinear sys- tem of equations. 展开更多
关键词 encryption Algorithm GOST GOST S-BOX Systems of MULTIVARIATE QUADRATIC Equations ALGEBRAIC CRYPTANALYSIS Extended linearIZATION Method Gaussian Elimination
在线阅读 下载PDF
Research on the File Encryption and Programming based on Matrix Transformation
6
作者 Jiangtao Geng Qi Huang 《International Journal of Technology Management》 2013年第1期24-26,共3页
Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt f... Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software. 展开更多
关键词 linear transformation file encryption and decryption matrix vc source code
在线阅读 下载PDF
面向无线传感网络安全的轻量级加密算法研究 被引量:1
7
作者 石鲁生 朱慧博 《传感技术学报》 北大核心 2025年第1期168-173,共6页
轻量级加密算法需在保证安全性的同时尽可能地降低计算和存储资源的消耗,以适应传感器节点的硬件限制。为同时提高数据传输的安全性和准确性,降低传感器节点能耗和计算量,提出面向无线传感网络安全的轻量级加密算法。建立传感器节点分... 轻量级加密算法需在保证安全性的同时尽可能地降低计算和存储资源的消耗,以适应传感器节点的硬件限制。为同时提高数据传输的安全性和准确性,降低传感器节点能耗和计算量,提出面向无线传感网络安全的轻量级加密算法。建立传感器节点分簇模型,为簇首分配相应的对称密钥;利用TCDCP算法构建WSN线性回归模型,采集经过密钥分配处理后的感知数据;引入流密钥的轻量级同态加密算法,实现对感知数据的加密、解密处理,增强无线传感网络安全性能。仿真结果表明,所提算法的加密、解密时间分别为1.01 s、1.05 s,解密成功率平均值为97.0%,RAM空间、ROM空间占用字节数分别为770 kB、800 kB,能耗为82 mJ。所提方法能够有效地保护无线传感网络数据的机密性和完整性,降低资源消耗。 展开更多
关键词 无线传感网络 轻量级加密算法 分簇模型 线性回归模型 感知数据采集
在线阅读 下载PDF
格上高效且可撤销的密文策略属性基加密方案 被引量:1
8
作者 姜美羡 高军涛 裴焘 《系统工程与电子技术》 北大核心 2025年第4期1364-1373,共10页
针对格上属性基加密方案中存在的运算效率低、访问策略表达能力不够灵活、不具备撤销功能的问题,提出一种格上高效表达且可撤销的密文策略属性基加密方案。在环上带误差学习困难问题下,采用小策略矩阵和更高基数的采样算法降低了方案的... 针对格上属性基加密方案中存在的运算效率低、访问策略表达能力不够灵活、不具备撤销功能的问题,提出一种格上高效表达且可撤销的密文策略属性基加密方案。在环上带误差学习困难问题下,采用小策略矩阵和更高基数的采样算法降低了方案的累计误差,提升了运算效率。将线性秘密共享技术和环上带误差学习困难问题结合,实现了访问策略的高效灵活表达;此外,在该访问策略下加入直接撤销,使方案在具有高效表达性的同时,也具备了用户撤销功能。所提方案在环上带误差学习困难问题下可以抵抗选择性明文攻击。实验仿真比较结果表明了所提方案的有效性和实用性。 展开更多
关键词 属性基加密 线性秘密共享 用户撤销 环上带误差学习 小策略矩阵
在线阅读 下载PDF
边云辅助下的可撤销属性加密方案
9
作者 张伟航 钟永彦 +1 位作者 向元柱 丁士旵 《计算机工程》 北大核心 2025年第7期244-253,共10页
物联网(IoT)设备数据上云已成为主流数据管理方案,但云端数据管理存在安全风险。为确保数据机密性并防止未授权访问,属性访问控制(ABAC)被认为是一种有效的解决方案。然而,现有加密方案负担重、撤销机制不完善,不适用于动态的物联网环境... 物联网(IoT)设备数据上云已成为主流数据管理方案,但云端数据管理存在安全风险。为确保数据机密性并防止未授权访问,属性访问控制(ABAC)被认为是一种有效的解决方案。然而,现有加密方案负担重、撤销机制不完善,不适用于动态的物联网环境,为此提出了边云辅助下的可撤销属性加密方案(ECA-RABE)。该方案采用椭圆曲线加密(ECC)技术降低计算开销;支持多属性机构分担属性管理减少单点故障问题;引入边缘节点(EN)降低物联网设备的计算负载;利用云计算预解密降低用户侧计算压力;引入属性版本号以及系统版本号,设计撤销机制实现用户属性撤销、系统全局属性撤销以及用户撤销。安全性分析与性能分析表明,所提方案在决策双线性Diffie-Hellman(DBDH)假设下是安全的,并且加、解密效率高,更适用于物联网环境。 展开更多
关键词 属性加密 边缘计算 访问控制 线性秘密共享方案 加密外包 解密外包
在线阅读 下载PDF
基于同态加密技术的新型电力系统网络信息检索方法
10
作者 高丽红 韩少卿 +1 位作者 郑涛 张冬亚 《河北电力技术》 2025年第1期59-65,共7页
新型电力系统中的数据包含个人用户的用电习惯、位置信息等敏感数据,未经处理的敏感数据会成为网络攻击的目标,增加电力系统的安全风险,攻击者会篡改或伪造数据,从而影响检索结果的准确性。为此,提出基于同态加密技术的新型电力系统网... 新型电力系统中的数据包含个人用户的用电习惯、位置信息等敏感数据,未经处理的敏感数据会成为网络攻击的目标,增加电力系统的安全风险,攻击者会篡改或伪造数据,从而影响检索结果的准确性。为此,提出基于同态加密技术的新型电力系统网络信息检索方法。引入同态加密技术,结合伪随机序列法,获取有限域中新型电力系统网络信息的残差分量。利用主密钥创建信息加密的标识位序列,融合同态加密和线性迭代函数,增强信息检索的准确性和安全性。对加解密后的信息展开Fourier变换,根据轮廓系数,获取密文检索对应索引并对其进行后置操作,实现新型电力系统网络信息高效检索。仿真结果表明,应用所提方法后,针对所有攻击类型的平均防御成功率在0.98以上,归一化折损累计增益(normalized discounted cumulative gain,NDCG)数值在0.90以上,同时能够有效地满足用户对快速准确检索信息的需求,在实验环境条件下,所提方法的检索时间最长仅为130 ms,检索性能更高效。 展开更多
关键词 同态加密技术 新型电力系统 网络信息 信息检索 线性迭代函数
在线阅读 下载PDF
Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment 被引量:1
11
作者 Amirhossein Ebrahimzadeh Abolfazl Falahati 《Journal of Information Security》 2013年第1期1-6,共6页
Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or unde... Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or undesired receiver does not have the knowledge of the spreading code. For this reason, unencrypted M-sequences are a deficient choice for the spreading code when a high level of security is required. The primary objective of this paper is to analyze vulnerability of linear feedback shift register (LFSRs) codes. Then, a new method based on encryption algorithm applied over spreading codes, named hidden frequency hopping is proposed to improve the security of FHSS. The proposed encryption security algorithm is highly reliable, and can be applied to all existing data communication systems based on spread spectrum techniques. Since the multi-user detection is an inherent characteristic for FHSS, the multi-user interference must be studied carefully. Hence, a new method called optimum pair “key-input” selection is proposed which reduces interference below the desired constant threshold. 展开更多
关键词 FREQUENCY HOPPING SPREAD SPECTRUM KEY Distribution Centre KEY encryption KEY linear Feedback Shift REGISTER FREQUENCY HOPPING Code Division Multiple Access Direct Sequence SPREAD SPECTRUM
在线阅读 下载PDF
Analysis of the Design Methods of Word Oriented Linear Feedback Shift Registers
12
作者 ZENG Guang HAN Wenbao HE Kaicheng 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期712-716,共5页
Based on analysis of the structure characteristics and implementation methods of some representative word oriented linear feedback shift registers (LFSRs) in several modem software oriented stream ciphers, this pape... Based on analysis of the structure characteristics and implementation methods of some representative word oriented linear feedback shift registers (LFSRs) in several modem software oriented stream ciphers, this paper firstly classifies the word oriented LFSRs into two classes: the machine instruction type and the arithmetic type. The similarities and differences between each type are illustrated by concrete examples. Then we give a detailed analysis about the word oriented LFSRs in each category from design structure, cryptographic properties and implementation issue aspects. Finally, some basic design criteria for modem word oriented LFSRs and suitable for software implementation are summarized. 展开更多
关键词 stream cipher word oriented design linear feedback shift register (LFSR) fast software encryption
原文传递
A LINEARIZATION ATTACK ON MODIFIED E_0 ALGORITHM
13
作者 Guan Jie Liu Jiandong 《Journal of Electronics(China)》 2006年第3期410-412,共3页
A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be... A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be recovered by a linearization attack with O(2^60.52) operations by solving a System of Linear Equations (SLE) with at most 2^20.538 unknowns. Frederik Armknecht [Cryptology ePrint Archive, 2002/191] proposed a linearization attack on the KSG olEo algorithm with O(2^70.341) operations by solving an SLE with at most 2^24.056 unknowns, so the modification proposed by Hermelin reduces the ability or E0 to resist the linearization attack by comparing with the results ofFrederik Armknecht. 展开更多
关键词 E0 encryption system Stream cipher linearization attack
在线阅读 下载PDF
Linear-Differential Cryptanalysis for SPN Cipher Structure and AES
14
作者 WEI Yongzhuang HU Yupu 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期37-40,共4页
A new attack on block ciphers is introduced, which is termed linear-differential cryptanalysis. It bases the combining of linear cryptanalysis and differential cryptanalysis, and works by using linear-differential pro... A new attack on block ciphers is introduced, which is termed linear-differential cryptanalysis. It bases the combining of linear cryptanalysis and differential cryptanalysis, and works by using linear-differential probability (LDP). Moreover, we present a new method for upper bounding the maximum linear-differential probability (MLDP) for 2 rounds of substitution permutation network (SPN) cipher structure. When our result applies to 2-round advanced encryption standard(AES), It is shown that the upper bound of MLDP is up to 1.68×2^-19, which extends the known results for the 2-round SPN. Furthermore, when using a recursive technique, we obtain that the MLDP for 4 rounds of AES is bounded by 2^-73. 展开更多
关键词 linear-differential cryptanalysis substitution permutation network advanced encryption standard (AES).
在线阅读 下载PDF
Federated Learning Model for Auto Insurance Rate Setting Based on Tweedie Distribution 被引量:1
15
作者 Tao Yin Changgen Peng +2 位作者 Weijie Tan Dequan Xu Hanlin Tang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期827-843,共17页
In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie distribution.The traditional approach to obtaining ... In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie distribution.The traditional approach to obtaining the Tweedie regression model involves training on a centralized dataset,when the data is provided by multiple parties,training a privacy-preserving Tweedie regression model without exchanging raw data becomes a challenge.To address this issue,this study introduces a novel vertical federated learning-based Tweedie regression algorithm for multi-party auto insurance rate setting in data silos.The algorithm can keep sensitive data locally and uses privacy-preserving techniques to achieve intersection operations between the two parties holding the data.After determining which entities are shared,the participants train the model locally using the shared entity data to obtain the local generalized linear model intermediate parameters.The homomorphic encryption algorithms are introduced to interact with and update the model intermediate parameters to collaboratively complete the joint training of the car insurance rate-setting model.Performance tests on two publicly available datasets show that the proposed federated Tweedie regression algorithm can effectively generate Tweedie regression models that leverage the value of data fromboth partieswithout exchanging data.The assessment results of the scheme approach those of the Tweedie regressionmodel learned fromcentralized data,and outperformthe Tweedie regressionmodel learned independently by a single party. 展开更多
关键词 Rate setting Tweedie distribution generalized linear models federated learning homomorphic encryption
在线阅读 下载PDF
Paillier同态加密下车辆协同自适应预测巡航控制 被引量:1
16
作者 杨敏艺 宋秀兰 +1 位作者 杨燕玲 柴伟豪 《计算机测量与控制》 2024年第8期153-160,共8页
车辆协同式自适应巡航控制(CACC)以其高效便捷的特点成为智能交通系统的研究热点,但随着车辆接入网络,网络攻击对车联网系统的安全性造成了很大威胁;针对传统方案较繁琐、密文密钥同时传输数据仍可能被篡改的问题,采用Paillier同态加密... 车辆协同式自适应巡航控制(CACC)以其高效便捷的特点成为智能交通系统的研究热点,但随着车辆接入网络,网络攻击对车联网系统的安全性造成了很大威胁;针对传统方案较繁琐、密文密钥同时传输数据仍可能被篡改的问题,采用Paillier同态加密算法对加速度进行加密,仅传输密文;针对控制目标设计一综合跟踪信号,并基于Paillier算法的同态性设计密文数乘运算,使加速度密文无须解密而直接用于自车构建跟踪信号;将跟踪信号与分布式模型预测控制(MPC)结合,采用线性矩阵不等式对控制策略的优化问题进行转化,求解最优控制输入,保证车辆队列的安全协同行驶;经Matlab仿真验证了控制系统的性能指标以及Paillier同态加密的有效性。 展开更多
关键词 Paillier同态加密 网络安全 协同自适应巡航控制 线性矩阵不等式 模型预测控制
在线阅读 下载PDF
联盟链下的高效车联网数据安全共享研究 被引量:2
17
作者 彭贻希 金燚 +2 位作者 陈志德 唐敏 张章学 《情报探索》 2024年第7期49-55,共7页
[目的/意义]旨在解决现有的车联网数据共享方案中计算开销大、共享效率低、安全性不足等问题。[方法/过程]设计了一个车联网高效数据安全共享方案,采用基于线性秘密共享(LSSS)的密文策略属性加密(CP-ABE)算法和基于联盟区块链群组技术,... [目的/意义]旨在解决现有的车联网数据共享方案中计算开销大、共享效率低、安全性不足等问题。[方法/过程]设计了一个车联网高效数据安全共享方案,采用基于线性秘密共享(LSSS)的密文策略属性加密(CP-ABE)算法和基于联盟区块链群组技术,实现了车联网高效数据共享,减少数据冗余,并通过共识机制的优化,进一步提高时间效率,同时确保车辆实体的数据安全性和隐私性。[结果/结论]该方案能够适应车联网快速移动、动态变化的复杂特性,可实现灵活访问控制和高自由度的数据共享,满足车联网场景需求。 展开更多
关键词 区块链 车联网 密文策略属性加密(CP-ABE) 线性秘密共享(LSSS) 群组管理 数据共享
在线阅读 下载PDF
基于云端辅助的国土资源数字化档案信息自动加密方法 被引量:5
18
作者 高丽萍 季仕承 郝玉忠 《自动化技术与应用》 2024年第2期85-88,共4页
为了保护国土资源数字化档案的安全性,解决由于云端监听导致信息被窃取的问题,提出基于云端辅助的档案信息自动加密方法。初始化加密体系中主要对象,生成各对象的公钥和私钥对。为防止提交给云的档案信息被窃取,拆分脱敏处理数据,再与... 为了保护国土资源数字化档案的安全性,解决由于云端监听导致信息被窃取的问题,提出基于云端辅助的档案信息自动加密方法。初始化加密体系中主要对象,生成各对象的公钥和私钥对。为防止提交给云的档案信息被窃取,拆分脱敏处理数据,再与已知假名组互相搭配后储存至云端。最后分段线性映射加密文件,对云端储存的数据明文和密钥字节做异或运算,完成数据储存加密。实验证明所提方法的加密性能较好,运算速度快,实际应用价值较高。 展开更多
关键词 公钥 私钥 拆分脱敏 分段线性映射 异或运算 数据加密
在线阅读 下载PDF
医疗云平台中个人健康档案转诊时的安全共享方案
19
作者 吕晨雨 沈济南 +3 位作者 邓学剑 陈鑫朋 杜秋阳 梁芳 《湖北民族大学学报(自然科学版)》 CAS 2024年第2期198-204,共7页
为解决医疗云平台共享个人健康档案(personal health record,PHR)存在的隐私泄露和加解密效率不理想的问题,以医疗云平台中帕金森病患者的转诊场景为例,提出了一种基于线性秘密共享的改进密文属性代理重加密方案(improved linear secret... 为解决医疗云平台共享个人健康档案(personal health record,PHR)存在的隐私泄露和加解密效率不理想的问题,以医疗云平台中帕金森病患者的转诊场景为例,提出了一种基于线性秘密共享的改进密文属性代理重加密方案(improved linear secret sharing based ciphertext attribute proxy re-encryption scheme,LCPS)。该方案利用线性秘密共享技术来隐藏访问策略中的隐私属性,降低因访问策略暴露引发的隐私泄露风险;该方案还对代理重加密算法进行改进,通过减少复杂的双线性运算,提高了加解密效率。结果表明,LCPS在加解密方面的表现要优于其他方案。在判定性q-BDHE(q-decisional bilinear Diffie-Hellman exponent)困难假设下具有选择明文攻击时的不可区分性(indistinguishability under chosen-plaintext attack,IND-CPA)。该方案具有可移植性,同样适用于医疗云中其他病症转诊时的个人健康档案安全共享。 展开更多
关键词 医疗云 属性加密 线性秘密共享 策略隐藏 代理重加密 个人健康档案 隐私保护
在线阅读 下载PDF
基于LSSS共享矩阵无授权策略的属性密码解密效率提高方案 被引量:10
20
作者 刘梦君 刘树波 +3 位作者 王颖 王晶 李永凯 曹辉 《电子学报》 EI CAS CSCD 北大核心 2015年第6期1065-1072,共8页
在基于LSSS(Linear Secret-Sharing Schemes)共享矩阵的属性密码方案中,为了获得相对较高的解密效率,需要剔除授权集合中冗余参与方在解密时的计算.为达到这一目的,现有方案都需要使用授权策略进行最小参与方搜寻,而在一些应用场合下,... 在基于LSSS(Linear Secret-Sharing Schemes)共享矩阵的属性密码方案中,为了获得相对较高的解密效率,需要剔除授权集合中冗余参与方在解密时的计算.为达到这一目的,现有方案都需要使用授权策略进行最小参与方搜寻,而在一些应用场合下,授权策略的出现是不安全的.如果不使用授权策略,现有的解密优化方案便无法运行.本文提出一种LSSS共享矩阵下,无授权策略的属性密码解密效率提高方案.理论分析和实验表明,它可以在无授权策略情况下,找到最小参与方集合,从而提高了解密效率. 展开更多
关键词 属性加密 LSSS(linear Secret-Sharing Schemes)共享矩阵 解密效率
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部