期刊文献+
共找到1,303篇文章
< 1 2 66 >
每页显示 20 50 100
High-speed all-optical speckle decryption empowered by a physics-informed diffractive neural network
1
作者 Jiaan Gan Yong Yang +2 位作者 Siwei Zhu Shengjiang Chang Xiaocong Yuan 《Advanced Photonics Nexus》 2026年第1期150-157,共8页
Speckle-based optical cryptosystems are promising technologies for information security.However,existing techniques mostly rely on digital decryption,resulting in computational delay and undermining the high-speed adv... Speckle-based optical cryptosystems are promising technologies for information security.However,existing techniques mostly rely on digital decryption,resulting in computational delay and undermining the high-speed advantage of optical encryption.Moreover,conventional neural networks are typically effective only on images from the same distribution as the training datasets,limiting their general applicability.In this paper,we propose an all-optical high-speed decryption scheme for real-time recovery of speckle-encoded ciphertexts.By constructing a physics-informed diffractive neural network that approximates the inverse transmission matrix of the scattering medium,secret images can be directly reconstructed from speckle fields without optoelectronic conversion or post-processing.The network is trained with only 2048 samples from the MNIST dataset.Its transfer learning capability is validated across three out-of-distribution datasets,with decrypted images achieving a Pearson correlation coefficient of 0.82 and a structural similarity index measure of 0.75,demonstrating excellent transfer learning capability.For the first time,to our knowledge,this scheme simultaneously overcomes the bottlenecks of decryption delay and limited network generalizability in conventional speckle-based cryptosystems,achieving real-time image decryption with strong transferability.It provides a new pathway for developing low-power,real-time,and broadly applicable optical encryption systems,demonstrating significant potential for applications in high-speed security optical communications. 展开更多
关键词 SPECKLE all-optical decryption diffractive neural network transmission matrix transfer learning real time
在线阅读 下载PDF
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
2
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
A Recursive Method to Encryption-Decryption-Based Distributed Set-Membership Filtering for Time-Varying Saturated Systems Over Sensor Networks
3
作者 Jun Hu Jiaxing Li +2 位作者 Chaoqing Jia Xiaojian Yi Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期1047-1049,共3页
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt... Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided. 展开更多
关键词 time varying saturated systems signal transmission processspecificallya encryption decryption mechanism sensor networks recursive method distributed set membership filtering
在线阅读 下载PDF
Femtosecond laser subtractive/additive-integrated biomimetic manufacturing for visible/infrared encryption and stimuli-responsive infrared decryption
4
作者 Ruijie Liu Dongshi Zhang Zhuguo Li 《International Journal of Extreme Manufacturing》 2025年第4期387-404,共18页
Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,... Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension. 展开更多
关键词 femtosecond laser biomimetic manufacturing black particle aggregates subtractive/additive-integrated manufacturing intrinsic visible-infrared encryption stimuli responsive decrypted IR display
在线阅读 下载PDF
基于PUF的TPM架构设计与应用研究
5
作者 施江勇 高志远 +4 位作者 刘天祎 刘威 郭振斌 张咏鼎 李少青 《计算机工程与科学》 北大核心 2026年第1期51-60,共10页
现有的可信平台模块TPM主要依赖单一RSA公私钥对作为安全的可信根基础,该RSA密钥对固定不变地存储于TPM芯片中。因此,此种设计架构可能使得系统面临着物理分析与侧信道分析等物理层面攻击的威胁,进而导致系统的安全性难以得到有效保障... 现有的可信平台模块TPM主要依赖单一RSA公私钥对作为安全的可信根基础,该RSA密钥对固定不变地存储于TPM芯片中。因此,此种设计架构可能使得系统面临着物理分析与侧信道分析等物理层面攻击的威胁,进而导致系统的安全性难以得到有效保障。为此,提出采用物理不可克隆函数PUF作为可信根,利用PUF具有的物理不可篡改性、随机性和不可预测性等安全特性,设计并实现了基于PUF的TPM架构。此外,还针对现有研究中密钥生成算法存在的安全漏洞以及认证机制的不完善等问题进行了有效的改进,并将改进后的设计应用于可信启动验证及固件的安全更新中,从而有效提升了可信计算环境面临安全威胁的防御能力。通过BAN逻辑和协议自动化验证工具AVISPA对所提协议的安全性进行了深入分析,并在Zynq^(TM)7000系列开发板上实现了可信启动的相关实验,结果表明了所提出的方法可增强密钥生成算法的安全性,并有效降低了对引导程序和固件更新数据进行篡改等攻击的威胁。性能评估结果显示,所提协议整个认证过程平均时长仅0.06 s,展现出了其在性能上的优越性。 展开更多
关键词 加解密 PUF 可信启动 固件更新 认证协议
在线阅读 下载PDF
基于Arnold变换的数字音频解密信号质量评判方法
6
作者 黄丽娜 李江华 《现代电子技术》 北大核心 2026年第2期121-125,共5页
数字音频解密信号在评判过程中忽略了普遍存在的压缩、噪声干扰及数据传输过程中的丢包问题,使数字音频解密信号波形与原始音频形态不一致,导致评判结果的PCC值较低,RMSE结果较高,影响评判精度。为此提出一种基于Arnold变换的数字音频... 数字音频解密信号在评判过程中忽略了普遍存在的压缩、噪声干扰及数据传输过程中的丢包问题,使数字音频解密信号波形与原始音频形态不一致,导致评判结果的PCC值较低,RMSE结果较高,影响评判精度。为此提出一种基于Arnold变换的数字音频解密信号质量评判方法。首先设计基于Arnold变换的数字音频解密过程,根据Arnold变换的加密过程的逆变换,得到解密后的数字音频信号;其次构建基于波形的数字音频信号质量评判模型,将数字音频解密信号码流作为模型输入,完全解码波形分析模块获取信号波形,在此基础上提取数字音频解码信号中的发音特征;然后利用压缩与噪声失真评判模块,基于上述发音特征评估压缩与噪声环境下数字音频解密信号的质量,同时统计音频包数量及丢包数量,以此评判信号的丢包失真状况;最后综合压缩与噪声失真评判结果、丢包失真评判结果,即可获得数字音频解密信号整体评判结果。实验结果显示,所提方法处理后的数字音频解密信号波形与原始音频在整体形态上保持一致,评判结果的PCC均达到0.8以上,RMSE均控制在0.3以内,验证该方法评判结果具有较高精度。 展开更多
关键词 ARNOLD变换 数字音频 解密信号 质量评判 波形分析 丢包失真
在线阅读 下载PDF
基于琼脂糖凝胶电泳的二进制加密综合实验
7
作者 段金伟 马蕾 +5 位作者 赵倩 仵倩倩 辛博宇 杨佳桦 李垚 王其召 《色谱》 北大核心 2026年第4期486-495,共10页
本实验基于一个4位(4-bit)脱氧核糖核酸(DNA)纳米开关,通过特定DNA单链触发“线性-环状”构象转换,利用二者在凝胶电泳中的迁移差异实现数字的二进制编码。当不同构象开关组合时,这些组合可表示不同信息。本实验受有机化学“保护-脱保... 本实验基于一个4位(4-bit)脱氧核糖核酸(DNA)纳米开关,通过特定DNA单链触发“线性-环状”构象转换,利用二者在凝胶电泳中的迁移差异实现数字的二进制编码。当不同构象开关组合时,这些组合可表示不同信息。本实验受有机化学“保护-脱保护”策略启发,引入核糖核酸(RNA)保护链以阻止环状结构形成,构建了信息加密系统。该系统利用核糖核酸酶A特异性酶切脱保护,恢复信息读取,构建了RNA调控的加密系统。本实验通过整合DNA纳米技术、二进制编码与化学保护策略,使琼脂糖凝胶电泳贯穿整个实验,实现了从分子构建到信息读写的全程可视化。这不仅使学生掌握了凝胶电泳操作,深化了对电泳分离机制与分子构效关系的理解,而且通过接触分子信息编码、DNA纳米技术等前沿领域,有效激发了学生的创新思维与跨学科问题的解决能力。 展开更多
关键词 脱氧核糖核酸纳米开关 琼脂糖凝胶电泳 核糖核酸调控保护 核糖核酸酶A 信息加密与解密
在线阅读 下载PDF
支持属性更新和撤销的文件安全共享方案
8
作者 李莉 朱江文 +2 位作者 杨春艳 史国振 董秀则 《计算机应用与软件》 北大核心 2026年第2期55-63,99,共10页
属性基加密(Attribute-based Encryption,ABE)方案多用于文件安全共享应用场景下的文件访问控制。如何实现用户属性动态变化下数据文件的高效安全共享是研究的热点问题之一。针对此问题,提出一种支持属性更新和撤销的属性基加密文件安... 属性基加密(Attribute-based Encryption,ABE)方案多用于文件安全共享应用场景下的文件访问控制。如何实现用户属性动态变化下数据文件的高效安全共享是研究的热点问题之一。针对此问题,提出一种支持属性更新和撤销的属性基加密文件安全共享方案。该方案围绕文件安全共享问题,设计可实时撤销和动态更新用户属性的ABE方案。在密钥生成中心和用户之间使用安全的密钥分发协议,密钥生成中心无法计算完整的解密密钥,解决密钥托管问题。通过将加解密过程中的部分运算外包给代理服务器,用户只需一次指数运算就能获得明文。通过与已有方案的比较可知,该方案的加解密开销、私钥存储开销更低,且无须更新密文,具有更高的撤销效率。 展开更多
关键词 属性基加密 属性更新和撤销 密钥托管 解密外包
在线阅读 下载PDF
基于安全通信的水下油水分离器控制系统
9
作者 孙瀚轩 左信 +1 位作者 余曦冉 岳元龙 《仪表技术与传感器》 北大核心 2026年第2期30-39,45,共11页
针对水下油水分离器传感器数据传输带宽有限及通信数据易泄露的问题,提出了一种结合动态事件触发机制和加/解密算法的水下油水分离器控制系统设计方法。首先,基于分离器的数学模型,提出了一种自适应多速率采样方法,通过动态调整传感器... 针对水下油水分离器传感器数据传输带宽有限及通信数据易泄露的问题,提出了一种结合动态事件触发机制和加/解密算法的水下油水分离器控制系统设计方法。首先,基于分离器的数学模型,提出了一种自适应多速率采样方法,通过动态调整传感器采样频率,有效解决了因采样频率适应性差而造成的通信资源浪费。其次,设计了动态事件触发机制,通过引入动态阈值和触发函数,根据压力和液位的变化率动态调整触发条件,显著降低了控制系统通信负担。最后,提出了一种基于概率量化函数的加/解密算法,增强了数据传输的安全性。实验结果验证了所提出方法的有效性,为水下生产控制系统的工程应用提供了技术支持。 展开更多
关键词 水下油水分离器 自适应多速率采样 动态事件触发机制 数据加/解密 数据安全
在线阅读 下载PDF
Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT
10
作者 He Duan Shi Zhang Dayu Li 《Computers, Materials & Continua》 2026年第2期872-896,共25页
Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudass... Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost. 展开更多
关键词 Cloud computing Internet of Things ABSE multi-keyword fuzzy matching outsourcing decryption
在线阅读 下载PDF
网络安全中的数据加密与解密技术研究
11
作者 林明亮 《移动信息》 2026年第1期122-124,共3页
随着数字化时代的到来,数据加密与解密技术在网络安全领域得到了极大发展。文中针对网络安全领域的数据加密与解密技术进行了研究,深入分析了其中的关键技术,探讨了加密算法分类及其核心机制,阐述了数据完整性验证技术、密钥全生命周期... 随着数字化时代的到来,数据加密与解密技术在网络安全领域得到了极大发展。文中针对网络安全领域的数据加密与解密技术进行了研究,深入分析了其中的关键技术,探讨了加密算法分类及其核心机制,阐述了数据完整性验证技术、密钥全生命周期管理机制以及传输层加密与协议优化相关内容。研究表明,当前网络安全的数据加密与解密技术已构建多层次技术体系,为网络通信的数据安全提供了可靠保障。 展开更多
关键词 网络安全 数据加密 解密技术 解密算法原理
在线阅读 下载PDF
基于UltraScale架构的数据加密方法研究
12
作者 唐李杨 《电子技术应用》 2026年第1期38-42,共5页
针对航空通信机载设备核心功能以及知识产权的保护,结合UltraScale芯片的架构特点,研究并提出了一种基于UltraScale架构的数据加密方法。该方法将UltraScale芯片的PS和PL的DNA序列号以及用户自定义信息进行联合加密,并设计了一种明文信... 针对航空通信机载设备核心功能以及知识产权的保护,结合UltraScale芯片的架构特点,研究并提出了一种基于UltraScale架构的数据加密方法。该方法将UltraScale芯片的PS和PL的DNA序列号以及用户自定义信息进行联合加密,并设计了一种明文信息校验格式,采用离线加密和在线解密的方式完成设备加解密功能。实验结果表明,提出的设计方法有效可行,设备加解密功能正常,提高了设备的安全性,有效保护了用户知识产权。目前,该技术已在航空通信多型设备中得到应用,具有较强的实用性。 展开更多
关键词 UltraScale架构 数据加密 DNA获取 密钥存储 加解密算法
在线阅读 下载PDF
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
13
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
在线阅读 下载PDF
Decryption of pure-position permutation algorithms 被引量:3
14
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 decryption Image encryption FUZZY Position permutation
在线阅读 下载PDF
基于MongoDB数据库与Blowfish+CBC模式算法加密后的涉诈聊天数据解密1例
15
作者 林钱沛 漏燕娣 +3 位作者 陈琛 计超豪 宋瑞坤 程昇 《刑事技术》 2026年第1期97-101,共5页
随着近年来电信网络诈骗案件的日益高发,公安机关对于电信网络诈骗技术开发环节的打击力度不断增强,犯罪团伙的反侦查意识也不断提升。为了更好地逃避打击,很多犯罪团伙选择在服务器上自行搭建IM即时通信服务并进行加密,以防止公安机关... 随着近年来电信网络诈骗案件的日益高发,公安机关对于电信网络诈骗技术开发环节的打击力度不断增强,犯罪团伙的反侦查意识也不断提升。为了更好地逃避打击,很多犯罪团伙选择在服务器上自行搭建IM即时通信服务并进行加密,以防止公安机关通过向第三方公司调取证据的方式获取其作案时留下的注册信息、聊天信息等数据线索。因此,本文介绍了一起基于MongoDB数据库、Blowfish+CBC模式算法加密后的聊天数据的解密案例,旨在为类似电信网络诈骗案件的侦办提供方法参考。 展开更多
关键词 电子物证 电信网络诈骗 IM即时通信 MongoDB数据库 Blowfish解密 CBC模式
在线阅读 下载PDF
A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption 被引量:2
16
作者 李世群 吴永东 +1 位作者 周建英 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期67-70,共4页
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa... The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4. 展开更多
关键词 batch decryption secure socket layer (SSL) server public key algorithm
在线阅读 下载PDF
New Constructions of Identity-Based Threshold Decryption 被引量:1
17
作者 ZHANG Leyou HU Yupu +1 位作者 TIAN Xu'an YANG Yang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期222-226,共5页
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive c... In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously. 展开更多
关键词 ID-Based threshold decryption verifiable pair computational bilinear Diffie-Hellman (CBDH) problem provable security
原文传递
ECC Based Threshold Decryption Scheme and Its Application in Web Security 被引量:2
18
作者 张险峰 张峰 +1 位作者 秦志光 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第4期41-46,共6页
The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test appro... The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test approach based on elliptic curve cryptography is designed. The application of these techniques in Web security is studied. Performance analysis shows that our scheme is characterized by excellent security as well as high efficiency. 展开更多
关键词 intrusion tolerance elliptic curve cryptography threshold decryption web security
在线阅读 下载PDF
Identity-Based Threshold Decryption on Access Structure
19
作者 秦华旺 朱晓华 戴跃伟 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期485-489,共5页
For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig... For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible. 展开更多
关键词 threshold decryption access structure IDENTITY CRYPTOGRAPHY information security
原文传递
Practical Privacy-Preserving ROI Encryption System for Surveillance Videos Supporting Selective Decryption
20
作者 Chan Hyeong Cho Hyun Min Song Taek-Young Youn 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第12期1911-1931,共21页
With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recor... With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recorded surveillance videos to enhance efficiency and security.The proposed method leverages Dlib’s CNN-based facial recognition technology to identify Regions of Interest(ROIs)within the video,linking these ROIs to generate unique IDs.These IDs are then combined with a master key to create entity-specific keys,which are used to encrypt the ROIs within the video.This system supports selective decryption,effectively protecting personal information using surveillance footage.Additionally,the system overcomes the limitations of existing ROI recognition technologies by predicting unrecognized frames through post-processing.This research validates the proposed technology through experimental evaluations of execution time and post-processing techniques,ensuring comprehensive personal information protection.Guidelines for setting the thresholds used in this process are also provided.Implementing the proposed method could serve as an effective solution to security vulnerabilities that traditional approaches fail to address. 展开更多
关键词 Privacy de-identification selective decryption surveillance video
在线阅读 下载PDF
上一页 1 2 66 下一页 到第
使用帮助 返回顶部