期刊文献+
共找到497篇文章
< 1 2 25 >
每页显示 20 50 100
A Robust Image Encryption Method Based on the Randomness Properties of DNA Nucleotides
1
作者 Bassam Al-Shargabi Mohammed Abbas Fadhil Al-Husainy +1 位作者 Abdelrahman Abuarqoub Omar Albahbouh Aldabbas 《Computers, Materials & Continua》 2026年第4期391-415,共25页
The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently... The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently,the protection of sensitive data has become increasingly critical.Regardless of the complexity of the encryption algorithm used,a robust and highly secure encryption key is essential,with randomness and key space being crucial factors.This paper proposes a new Robust Deoxyribonucleic Acid(RDNA)nucleotide-based encryption method.The RDNA encryption method leverages the unique properties of DNA nucleotides,including their inherent randomness and extensive key space,to generate a highly secure encryption key.By employing transposition and substitution operations,the RDNA method ensures significant diffusion and confusion in the encrypted images.Additionally,it utilises a pseudorandom generation technique based on the random sequence of nucleotides in the DNA secret key.The performance of the RDNA encryption method is evaluated through various statistical and visual tests,and compared against established encryption methods such as 3DES,AES,and a DNA-based method.Experimental results demonstrate that the RDNA encryption method outperforms its rivals in the literature,and achieves superior performance in terms of information entropy,avalanche effect,encryption execution time,and correlation reduction,while maintaining competitive values for NMAE,PSNR,NPCR,and UACI.The high degree of randomness and sensitivity to key changes inherent in the RDNA method offers enhanced security,making it highly resistant to brute force and differential attacks. 展开更多
关键词 Security analysis image protection randomness in cryptography DNA nucleotides DNA-based encryption
在线阅读 下载PDF
Deep-learning-based ciphertext-only attack on optical double random phase encryption 被引量:11
2
作者 Meihua Liao Shanshan Zheng +4 位作者 Shuixin Pan Dajiang Lu Wenqi He Guohai Situ Xiang Peng 《Opto-Electronic Advances》 SCIE 2021年第5期12-23,共12页
Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical e... Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical encryption systems but it is limited for practical applications since it requires a large set of plaintext-ciphertext pairs for the cryptosystem to be at-tacked.Here,we propose a two-step deep learning strategy for ciphertext-only attack(COA)on the classical double ran-dom phase encryption(DRPE).Specifically,we construct a virtual DRPE system to gather the training data.Besides,we divide the inverse problem in COA into two more specific inverse problems and employ two deep neural networks(DNNs)to respectively learn the removal of speckle noise in the autocorrelation domain and the de-correlation operation to retrieve the plaintext image.With these two trained DNNs at hand,we show that the plaintext can be predicted in real-time from an unknown ciphertext alone.The proposed learning-based COA method dispenses with not only the retrieval of random phase keys but also the invasive data acquisition of plaintext-ciphertext pairs in the DPRE system.Numerical simulations and optical experiments demonstrate the feasibility and effectiveness of the proposed learning-based COA method. 展开更多
关键词 optical encryption random phase encoding ciphertext-only attack deep learning
在线阅读 下载PDF
Attack on Optical Double Random Phase Encryption Based on the Principle of Ptychographical Imaging 被引量:2
3
作者 李拓 史祎诗 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第1期63-66,共4页
The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can... The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can be converted to the model of ptyehographical imaging. Owing to the inherent merits of the ptyehographical imaging, the DRPE system can be breached totally in a fast and nearly perfect way, which is unavailable for currently existing attack methods. Further, since the decryption keys can be seen as an object to be imaged from the perspective of imaging, the ptychographical technique may be a kind of new direction to further analysis of the security of other encryption systems based on double random keys. 展开更多
关键词 of as for it Attack on Optical Double random Phase encryption Based on the Principle of Ptychographical Imaging in IS on
原文传递
A New Encryption-Then-Compression Scheme on Gray Images Using the Markov Random Field 被引量:1
4
作者 Chuntao Wang Yang Feng +2 位作者 Tianzheng Li Hao Xie Goo-Rak Kwon 《Computers, Materials & Continua》 SCIE EI 2018年第7期107-121,共15页
Compressing encrypted images remains a challenge.As illustrated in our previous work on compression of encrypted binary images,it is preferable to exploit statistical characteristics at the receiver.Through this line,... Compressing encrypted images remains a challenge.As illustrated in our previous work on compression of encrypted binary images,it is preferable to exploit statistical characteristics at the receiver.Through this line,we characterize statistical correlations between adjacent bitplanes of a gray image with the Markov random field(MRF),represent it with a factor graph,and integrate the constructed MRF factor graph in that for binary image reconstruction,which gives rise to a joint factor graph for gray images reconstruction(JFGIR).By exploiting the JFGIR at the receiver to facilitate the reconstruction of the original bitplanes and deriving theoretically the sum-product algorithm(SPA)adapted to the JFGIR,a novel MRF-based encryption-then-compression(ETC)scheme is thus proposed.After preferable universal parameters of the MRF between adjacent bitplanes are sought via a numerical manner,extensive experimental simulations are then carried out to show that the proposed scheme successfully compresses the first 3 and 4 most significant bitplanes(MSBs)for most test gray images and the others with a large portion of smooth area,respectively.Thus,the proposed scheme achieves significant improvement against the state-of-the-art leveraging the 2-D Markov source model at the receiver and is comparable or somewhat inferior to that using the resolution-progressive strategy in recovery. 展开更多
关键词 encryption-then-compression compressing encrypted image Markov random field compression efficiency factor graph.
在线阅读 下载PDF
Image encryption using random sequence generated from generalized information domain
5
作者 张夏衍 张国基 +2 位作者 李璇 任亚洲 伍杰华 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第5期176-185,共10页
A novel image encryption method based on the random sequence generated from the generalized information domain and permutation–diffusion architecture is proposed. The random sequence is generated by reconstruction fr... A novel image encryption method based on the random sequence generated from the generalized information domain and permutation–diffusion architecture is proposed. The random sequence is generated by reconstruction from the generalized information file and discrete trajectory extraction from the data stream. The trajectory address sequence is used to generate a P-box to shuffle the plain image while random sequences are treated as keystreams. A new factor called drift factor is employed to accelerate and enhance the performance of the random sequence generator. An initial value is introduced to make the encryption method an approximately one-time pad. Experimental results show that the random sequences pass the NIST statistical test with a high ratio and extensive analysis demonstrates that the new encryption scheme has superior security. 展开更多
关键词 image encryption random number generator CRYPTOGRAPHY
原文传递
Constructing Certificateless Encryption with Keyword Search against Outside and Inside Keyword Guessing Attacks 被引量:5
6
作者 Yang Lu Jiguo Li 《China Communications》 SCIE CSCD 2019年第7期156-173,共18页
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to enc... Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to encrypted data retrieval in cryptographic cloud storage. Certificateless public key cryptography (CLPKC) is a novel cryptographic primitive that has many merits. It overcomes the key escrow problem in identity-based cryptography (IBC) and the cumbersome certificate problem in conventional public key cryptography (PKC). Motivated by the appealing features of CLPKC, several certificateless encryption with keyword search (CLEKS) schemes have been presented in the literature. But, our cryptanalysis demonstrates that the previously proposed CLEKS frameworks suffer from the security vulnerability caused by the keyword guessing attack. To remedy the security weakness in the previous frameworks and provide resistance against both inside and outside keyword guessing attacks, we propose a new CLEKS framework. Under the new framework, we design a concrete CLEKS scheme and formally prove its security in the random oracle model. Compared with previous two CLEKS schemes, the proposed scheme has better overall performance while offering stronger security guarantee as it withstands the existing known types of keyword guessing attacks. 展开更多
关键词 searchable public key encryption CERTIFICATELESS encryption with KEYWORD search INSIDE KEYWORD guessing ATTACK OUTSIDE KEYWORD guessing ATTACK random oracle model
在线阅读 下载PDF
Double Encryption Using Trigonometric Chaotic Map and XOR of an Image 被引量:2
7
作者 Orawit Thinnukool Thammarat Panityakul Mahwish Bano 《Computers, Materials & Continua》 SCIE EI 2021年第12期3033-3046,共14页
In the most recent decades,a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level;however,their moderate speeds because of their complicated processes... In the most recent decades,a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level;however,their moderate speeds because of their complicated processes made them of no use in real-time applications.Inspired by this,we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide.In contrast to the most of current plans,we utilize this basic map to create just a couple of arbitrary rows and columns.Moreover,to additionally speed up,we raise the processing unit from the pixel level to the row/column level.The security of the new plot is accomplished through a substitution permutation network,where we apply a circular shift of rows and columns to break the solid connection of neighboring pixels.At that point,we join the XOR operation with modulo function to cover the pixels values and forestall any leaking of data.High-security tests and simulation analyses are carried out to exhibit that the scheme is very secure and exceptionally quick for real-time image processing at 80 fps(frames per second). 展开更多
关键词 Double image encryption target image random image trigonometric chaotic map
在线阅读 下载PDF
Image Encryption Scheme Based on Filter Bank and Lifting 被引量:1
8
作者 Saleh Saraireh Yazeed Al-Sbou +1 位作者 Ja’afer Al-Saraireh Othman Alsmadi 《International Journal of Communications, Network and System Sciences》 2014年第1期43-52,共10页
In this paper, the quality of image encryption using filter bank with lifting scheme has been studied and evaluated. Many extensive techniques have been applied to examine the security of the image encryption using th... In this paper, the quality of image encryption using filter bank with lifting scheme has been studied and evaluated. Many extensive techniques have been applied to examine the security of the image encryption using the filter bank cipher with one or two rounds. To analyze and evaluate the proposed scheme, many parameters have been employed, such as, histogram analysis, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), compression friendliness, exhaustive key analysis, and key sensitivity test. The simulation results showed that, the quality of the image encryption passes all these tests. Moreover, it reaches or excels the current state-of-the-arts. So that, the proposed image encryption process produces random-like output from the statistical point of views. 展开更多
关键词 randomNESS Test Image encryption encryption Quality FILTER BANK ENTROPY
暂未订购
Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing 被引量:2
9
作者 王亮亮 陈克非 +1 位作者 毛贤平 王永涛 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期398-405,共8页
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry... In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography. 展开更多
关键词 cloud computing secure data sharing proxy re-encryption(PRE) certificateless encryption key escrow computational Diffie-Hellman(CDH) problem random oracle
原文传递
Optical Image Encryption Based on Mixed Chaotic Maps and Single-Shot Digital Holography 被引量:3
10
作者 Yonggang Su Chen Tang +3 位作者 Xia Chen Biyuan Li Wenjun Xu Zhenkun Lei 《Transactions of Tianjin University》 EI CAS 2017年第2期184-191,共8页
Random phase masks play a key role in optical image encryption schemes based on double random phase technique. In this paper, a mixed chaotic method is proposed, which can efficiently solve some weaknesses that one-di... Random phase masks play a key role in optical image encryption schemes based on double random phase technique. In this paper, a mixed chaotic method is proposed, which can efficiently solve some weaknesses that one-dimensional (1-D) single chaotic maps encounter to generate random phase masks. Based on the chaotic random phase masks, optical image encryption and decryption are realized with a single-shot digital holographic technique. In the proposed encryption scheme, the initial value and parameters of mixed chaotic maps serve as secret keys, which is convenient for the key management and transmission. Moreover, it also possesses high resistance against statistical attack, brute-force attack, noise attack and shear attack. Simulation results and security analysis verify the validity and security of the proposed encryption scheme. © 2017, Tianjin University and Springer-Verlag Berlin Heidelberg. 展开更多
关键词 Chaotic systems Geometrical optics HOLOGRAPHY Image processing Lyapunov methods Optical data processing
在线阅读 下载PDF
Secure Proxy Re-Encryption from CBE to IBE
11
作者 CHEN Yan ZHANG Futai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期657-661,共5页
In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. Th... In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. The scheme is non-interactive, unidirectional and collude "safe". Furthermore, it is compatible with current IBE (identity-based encryption) deployments. The scheme has chosen ciphertext security in the random oracle model assuming the hardness of the Decisional Bilinear Diffie-Hellman problem. 展开更多
关键词 proxy re-encryption traditional public key encryption identity-based public key encryption Decisional Bilinear Diffie-Hellman problem random oracle model
原文传递
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
12
作者 Muhammad Fahad Khan Khalid Saleem +4 位作者 Mohammed Alotaibi Mohammad Mazyad Hazzazi Eid Rehman Aaqif Afzaal Abbasi Muhammad Asif Gondal 《Computers, Materials & Continua》 SCIE EI 2022年第11期2679-2696,共18页
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them suscept... Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them susceptible to various kinds of security threats.These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field.In this regard,block cipher has been one of the most reliable options through which data security is accomplished.The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes.For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques.On the other side,literature endorse the true random numbers for information security due to the reason that,true random numbers are purely non-deterministic.In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes.Secondly,a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes.Based on the outcome of Systematic Literature Review(SLR),genetic algorithm is chosen for the optimization of s-boxes.The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers.Moreover,our results showed that the proposed substitution boxes achieve better cryptographic strength as compared with state-of-the-art techniques. 展开更多
关键词 IoT security sensors data encryption substitution box generation True random Number Generators(TRNG) heuristic optimization genetic algorithm
在线阅读 下载PDF
基于不经意随机访问机的对称可搜索加密技术研究进展
13
作者 樊松林 陈兰香 《福建师范大学学报(自然科学版)》 北大核心 2026年第2期43-53,共11页
对称可搜索加密(symmetric searchable encryption,SSE)技术允许用户将加密数据安全地存储于“诚实但好奇”的云服务器上,同时保留对密文的搜索查询能力。尽管数据被加密,用户与服务器的查询交互仍会泄露访问模式、搜索模式等敏感信息,... 对称可搜索加密(symmetric searchable encryption,SSE)技术允许用户将加密数据安全地存储于“诚实但好奇”的云服务器上,同时保留对密文的搜索查询能力。尽管数据被加密,用户与服务器的查询交互仍会泄露访问模式、搜索模式等敏感信息,严重威胁SSE的安全性。不经意随机访问机(oblivious random access machine,ORAM)可通过混淆内存访问的方式隐藏数据访问行为,已经被多种SSE方案用于隐藏泄露,但其存在计算复杂度与通信开销偏高的问题。从SSE与ORAM的底层实现机制出发,探讨二者融合方案在安全性与查询效率间的权衡策略,同时系统梳理了基于ORAM的SSE技术研究进展,并对该领域的未来研究方向进行展望。 展开更多
关键词 对称可搜索加密 访问模式 搜索模式 不经意随机访问机 隐藏泄漏
在线阅读 下载PDF
Instantiate Random Oracles in OAEP with Pseudorandom Functions
14
作者 JIA Xiaoying LI Hongda LI Bao 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期651-656,共6页
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti... This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes. 展开更多
关键词 random oracle(RO) model INSTANTIATION optimal asymmetric encryption padding(OAEP) indistinguishable securitity against adaptive chosen ciphertext attack (IND-CCA2)
原文传递
An Efficient Image Cipher Based on 2D Scrambled Image and Random Numbers
15
作者 Asghar Ali Sammia Ansar +2 位作者 Ashwag Albakri Nadeem Iqbal Shahid Yousaf 《Journal of Cyber Security》 2022年第3期169-183,共15页
Security of images plays an import role in communication in current era due to the popularity and high usage ofmultimedia content in the Internet.Image security is described as applying an encryption algorithm over th... Security of images plays an import role in communication in current era due to the popularity and high usage ofmultimedia content in the Internet.Image security is described as applying an encryption algorithm over the given plaintext images to produce cipher images that can be transmitted safely over the open channel,the Internet.The problem which plagues these image ciphers is that they are too much time consuming,and that do not meet the dictates of the present times.In this paper,we aim to provide an efficient image cipher.The previous studies employed many constructs like Langton’s Ant,15 puzzle game and Castle in the 2D scrambled image based image ciphers,which had grave implications related to the high execution time of the ciphers.The current study directly made use of the 2D scrambled image to realize the purpose.Moreover,no compromise has been made over the security of the proposed image cipher.Random numbers have been generated by triggering the Intertwining Logistic Chaotic map.The cipher has been subjected to many important validation metrics like key space,information entropy,correlation coefficient,crop attack and lastly time complexity to demonstrate its immunity to the various attacks,and its realworld application.In this paper,our proposed image cipher exhibits an encryption speed of 0.1797 s,which is far better than many of the existing encryption ciphers. 展开更多
关键词 encryption CIPHER random numbers image processing secret key chaotic map
在线阅读 下载PDF
同态加密PIR中查询请求带宽优化的通用构造与实例
16
作者 田海博 李奕彤 杜育松 《信息网络安全》 北大核心 2025年第7期1092-1102,共11页
同态加密PIR利用同态加密技术使用户能够在不泄露检索内容的前提下从数据库中检索数据,一直备受学术界关注。针对服务器高吞吐量的同态加密PIR中查询请求带宽较大的问题,文章在随机同态流密码的框架下,设计了基于Regev同态加密的随机同... 同态加密PIR利用同态加密技术使用户能够在不泄露检索内容的前提下从数据库中检索数据,一直备受学术界关注。针对服务器高吞吐量的同态加密PIR中查询请求带宽较大的问题,文章在随机同态流密码的框架下,设计了基于Regev同态加密的随机同态流密码算法,提出了查询请求带宽更优的同态加密PIR通用构造方法,实现了基于SimplePIR协议的PIR实例,分析了该实例的正确性和安全性,测试了该实例在不同数据库大小时的实际查询请求带宽。测试结果表明,查询规模为64 MB的数据库时,该实例的查询请求带宽下降约36.6%。 展开更多
关键词 隐私信息检索 随机同态流密码 Regev同态加密
在线阅读 下载PDF
基于语义标注和随机性密文的光纤传感通信信息加密
17
作者 边璐 段永刚 《传感技术学报》 北大核心 2025年第12期2206-2211,共6页
由于光纤传感网络拓扑的复杂性、设备的多样性和分布范围的广泛性,未经加密的数据在传输过程中容易被截获,降低光纤传感网络的安全性。为此,研究光纤传感通信信息加密方法。通过语义标注方式描述光纤传感通信信息,建立标准光纤传感通信... 由于光纤传感网络拓扑的复杂性、设备的多样性和分布范围的广泛性,未经加密的数据在传输过程中容易被截获,降低光纤传感网络的安全性。为此,研究光纤传感通信信息加密方法。通过语义标注方式描述光纤传感通信信息,建立标准光纤传感通信信息数据集。采用概率算法处理光纤传感信息数据集,以公钥加密方案生成随机性加密密文。基于深度学习构建目标函数,在数据高速传输的过程中,快速加密光纤传感通信信息,提高光纤传感网络的安全性。仿真结果表明:对于大规模的光纤传感通信信息,所提方法的加速比都在8以上,平均自相关系数差值从0.18逐步下降到0.07,具有较强的抗破解能力。 展开更多
关键词 光纤传感通信 信息加密 语义标注 随机性密文 深度学习
在线阅读 下载PDF
基于截断表的保留格式加密算法TT-FPE 被引量:2
18
作者 杨庆 田有亮 熊金波 《福建师范大学学报(自然科学版)》 北大核心 2025年第1期68-76,共9页
保留格式加密算法可以在加密的同时保证明文和密文格式相同,解决了信用卡号、电话号码、身份证号等敏感数据明文存储易造成隐私泄露等问题。当前保留格式加密方案大多基于Prefix、Cycle-Walking和Generalized-Feistel算法进行扩展和改进... 保留格式加密算法可以在加密的同时保证明文和密文格式相同,解决了信用卡号、电话号码、身份证号等敏感数据明文存储易造成隐私泄露等问题。当前保留格式加密方案大多基于Prefix、Cycle-Walking和Generalized-Feistel算法进行扩展和改进,存在多次调用Cycle-Walking结构的不确定性问题,同时,现有保留格式加密算法处理的问题域有一定的局限性。提出一种新型的基于截断表的保留格式加密算法,仅需调用一次Cycle-Walking结构,使加密结果落入问题域,以及在截断表算法基础上提出分段处理方案,进一步扩大了保留格式加密算法处理的问题域。并且通过安全性分析,证明了所提算法是安全的,能够抵御恶意敌手攻击。实验结果表明所提算法具有高效性,可将保留格式加密过程重复调用Cycle-Walking结构的次数降至0。且与先前保留格式加密算法相比,平均每字节加密开销相当。 展开更多
关键词 敏感信息 保留格式加密 FEISTEL结构 Cycle-Walking 截断表 随机函数
在线阅读 下载PDF
基于GAN密钥生成模型的数字图像加密算法优化 被引量:1
19
作者 夏群 丁小峰 夏珍 《计算机仿真》 2025年第1期229-232,334,共5页
针对目前数字图像加密领域中存在的图像加密效果不佳、解密后图像清晰度降低等问题,提出基于GAN密钥生成模型的数字图像加密算法优化方法。通过细胞神经网络超混沌系统生成随机混沌序列,通过Wasserstien距离和惩罚梯度对生成对抗网络模... 针对目前数字图像加密领域中存在的图像加密效果不佳、解密后图像清晰度降低等问题,提出基于GAN密钥生成模型的数字图像加密算法优化方法。通过细胞神经网络超混沌系统生成随机混沌序列,通过Wasserstien距离和惩罚梯度对生成对抗网络模型实行优化处理;将随机混沌序列输入至改进后的生成对抗网络中获取密钥,并结合实时动态置乱方法和随机相位傅里叶变换方法实现数字图像的加密处理。实验结果表明,所提算法的数字图像加解密效果更好、安全系数更高,是一种适用于实际应用的图像处理方法。 展开更多
关键词 改进生成对抗网络 秘钥生成 随机混沌序列 随机相位傅里叶变换方法 图像加密算法
在线阅读 下载PDF
去中心化随机信标研究
20
作者 李增鹏 赵子硕 +1 位作者 王梅 王瑞锦 《密码学报(中英文)》 北大核心 2025年第1期1-18,共18页
高效、可靠随机数的应用广泛且要求严格,例如在当下的智能合约中如果使用中心化的随机数来源,将难以解决中心节点宕机、作恶等问题,导致各种各样的攻击隐患.研究者通过将生成随机数的来源作分布式构建,采用去中心化的思想,逐渐避免依赖... 高效、可靠随机数的应用广泛且要求严格,例如在当下的智能合约中如果使用中心化的随机数来源,将难以解决中心节点宕机、作恶等问题,导致各种各样的攻击隐患.研究者通过将生成随机数的来源作分布式构建,采用去中心化的思想,逐渐避免依赖于第三方的生成,构建去中心化随机信标(decentralized randomness beacon,DRB).然而这也提出一系列诸如随机数的一致性认同、恶意节点作弊、分布式节点宕机等新的挑战与困难.本文按照DRB方案通常所基于的秘密共享、可验证延迟函数、可验证随机函数、同态加密等四种技术路线分类,分析、比较、总结了国内外DRB相关的研究成果,提出了在复杂网络环境下以及面对量子计算威胁,DRB研究和应用需要解决的四个问题. 展开更多
关键词 去中心化随机信标 可验证秘密共享 可验证延迟函数 可验证随机函数 同态加密
在线阅读 下载PDF
上一页 1 2 25 下一页 到第
使用帮助 返回顶部