期刊文献+
共找到4,811篇文章
< 1 2 241 >
每页显示 20 50 100
Sine-Polynomial Chaotic Map(SPCM):A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks
1
作者 David S.Bhatti Annas W.Malik +1 位作者 Haeung Choi Ki-Il Kim 《Computers, Materials & Continua》 2025年第10期2157-2177,共21页
Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a n... Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions,leveraging a piecewise function to achieve a broad chaotic range()and a high Lyapunov exponent(5.04).Validated through nine benchmarks,including standard randomness tests,Diehard tests,and Shannon entropy(3.883),SPCM demonstrates superior randomness and high sensitivity to initial conditions.Applied to image encryption,SPCM achieves 0.152582 s(39%faster than some techniques)and 433.42 KB/s throughput(134%higher than some techniques),setting new benchmarks for chaotic map-based methods in WSNs.Chaos-based permutation and exclusive or(XOR)diffusion yield near-zero correlation in encrypted images,ensuring strong resistance to Statistical Attacks(SA)and accurate recovery.SPCM also exhibits a strong avalanche effect(bit difference),making it an efficient,secure solution for WSNs in domains like healthcare and smart cities. 展开更多
关键词 Chaos theory chaotic system image encryption cryptography wireless sensor networks(WSNs)
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
2
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
3
作者 I.Nasurulla K.Hemalatha +1 位作者 P.Ramachandran S.Parvathi 《Journal of Harbin Institute of Technology(New Series)》 2025年第2期90-104,共15页
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we... Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we propose SecureCons Framework(SCF),a novel consensus-based cryptographic framework designed to enhance resilience against SCAs in cloud environments.SCF integrates a dual-layer approach combining lightweight cryptographic algorithms with a blockchain-inspired consensus mechanism to secure data exchanges and thwart potential side-channel exploits.The framework includes adaptive anomaly detection models,cryptographic obfuscation techniques,and real-time monitoring to identify and mitigate vulnerabilities proactively.Experimental evaluations demonstrate the framework's robustness,achieving over 95%resilience against advanced SCAs with minimal computational overhead.SCF provides a scalable,secure,and efficient solution,setting a new benchmark for side-channel attack mitigation in cloud ecosystems. 展开更多
关键词 Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography
在线阅读 下载PDF
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks 被引量:1
4
作者 Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita 《Digital Communications and Networks》 SCIE CSCD 2024年第4期989-1000,共12页
The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to secur... The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment. 展开更多
关键词 Internet of things AUTHENTICATION Post-quantum cryptography Lattice-based cryptography Cloud computing Fog computing FAIL-SAFE
在线阅读 下载PDF
Hash-Based Signature for Flexibility Authentication of IoT Devices
5
作者 HAN Songshen XU Kaiyong +3 位作者 ZHU Zhiqiang GUO Songhui LIU Haidong LI Zuohui 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2022年第1期1-10,共10页
5G provides a unified authentication architecture and access management for IoT(Internet of Things)devices.But existing authentication services cannot cover massive IoT devices with various computing capabilities.In a... 5G provides a unified authentication architecture and access management for IoT(Internet of Things)devices.But existing authentication services cannot cover massive IoT devices with various computing capabilities.In addition,with the development of quantum computing,authentication schemes based on traditional digital signature technology may not be as secure as we expected.This paper studies the authentication mechanism from the user equipment to the external data network in 5G and proposed an authentication protocol prototype that conforms to the Third Generation Partnership Program(3GPP)standard.This prototype can accommodate various Hash-based signature technologies,applying their advantages in resource consumption to meet the authentication requirements of multiple types of IoT devices.The operation of the proposed authentication scheme is mainly based on the Hash function,which is more efficient than the traditional authentication scheme.It provides flexible and high-quality authentication services for IoT devices cluster in the 5G environment combining the advantages of Hash-based signature technology and 5G architecture. 展开更多
关键词 hash-based signature secondary authentication IoT device cluster 5G
原文传递
Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives
6
作者 Maher Alharby 《Computers, Materials & Continua》 SCIE EI 2024年第5期2449-2463,共15页
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This a... Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various benefits.However,the adoption of cloud storage poses significant risks to data secrecy and integrity.This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic primitives.The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data.To preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing it.An extensive performance analysis is conducted to illustrate the efficiency of the proposed mechanism.Additionally,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running costs.The security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious entities.The proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems. 展开更多
关键词 Cloud storage data secrecy data integrity smart contracts cryptography
在线阅读 下载PDF
Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography
7
作者 Zainatul Yushaniza Mohamed Yusoff Mohamad Khairi Ishak +1 位作者 Lukman A.B.Rahim Mohd Shahrimie Mohd Asaari 《Computer Systems Science & Engineering》 2024年第6期1669-1697,共29页
The rapid adoption of Internet of Things(IoT)technologies has introduced significant security challenges across the physical,network,and application layers,particularly with the widespread use of the Message Queue Tel... The rapid adoption of Internet of Things(IoT)technologies has introduced significant security challenges across the physical,network,and application layers,particularly with the widespread use of the Message Queue Telemetry Transport(MQTT)protocol,which,while efficient in bandwidth consumption,lacks inherent security features,making it vulnerable to various cyber threats.This research addresses these challenges by presenting a secure,lightweight communication proxy that enhances the scalability and security of MQTT-based Internet of Things(IoT)networks.The proposed solution builds upon the Dang-Scheme,a mutual authentication protocol designed explicitly for resource-constrained environments and enhances it using Elliptic Curve Cryptography(ECC).This integration significantly improves device authentication,data confidentiality,and energy efficiency,achieving an 87.68%increase in data confidentiality and up to 77.04%energy savings during publish/subscribe communications in smart homes.The Middleware Broker System dynamically manages transaction keys and session IDs,offering robust defences against common cyber threats like impersonation and brute-force attacks.Penetration testing with tools such as Hydra and Nmap further validated the system’s security,demonstrating its potential to significantly improve the security and efficiency of IoT networks while underscoring the need for ongoing research to combat emerging threats. 展开更多
关键词 Smart home CONFIDENTIALITY ECC SECURITY lightweight cryptography AUTHENTICATION integrity efficiency
在线阅读 下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
8
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation cryptography keys trusted certified auditors data security
在线阅读 下载PDF
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
9
作者 Pawan Kumar Vipin Saxena 《Journal of Computer and Communications》 2024年第2期201-210,共10页
Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an expone... Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an exponential manner. Hybrid cryptography provides a better solution than a single type of cryptographical technique. In this paper, nested levels of hybrid cryptographical techniques are investigated with the help of Deoxyribonucleic Acid (DNA) and Paillier cryptographical techniques. In the first level, information will be encrypted by DNA and at the second level, the ciphertext of DNA will be encrypted by Paillier cryptography. At the decryption time, firstly Paillier cryptography will be processed, and then DAN cryptography will be processed to get the original text. The proposed algorithm follows the concept of Last Encryption First Decryption (LEFD) at the time of decryption. The computed results are depicted in terms of tables and graphs. 展开更多
关键词 ENCRYPTION DECRYPTION DNA Paillier cryptography Nested Levels Hybrid cryptography
在线阅读 下载PDF
Utilizing Certificateless Cryptography for IoT Device Identity Authentication Protocols in Web3
10
作者 WU Zhihui HONG Yuxuan +2 位作者 ZHOU Enyuan LIU Lei PEI Qingqi 《ZTE Communications》 2024年第2期30-38,共9页
Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approac... Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approach by distributing authentication services to edge authentication gateways and servers,facilitated by blockchain technology,thus aligning with the decentralized ethos of Web3 infrastructure.Additionally,we enhance device security against physical and cloning attacks by integrating physical unclonable functions with certificateless cryptography,bolstering the integrity of Internet of Thins(IoT)devices within the evolving landscape of the metaverse.To achieve dynamic anonymity and ensure privacy within Web3 environments,we employ fuzzy extractor technology,allowing for updates to pseudonymous identity identifiers while maintaining key consistency.The proposed protocol ensures continuous and secure identity authentication for IoT devices in practical applications,effectively addressing the pressing security concerns inherent in IoT network environments and contributing to the development of robust security infrastructure essential for the proliferation of IoT devices across diverse settings. 展开更多
关键词 blockchain certificateless cryptography identity authentication IOT
在线阅读 下载PDF
基于区块链的版权保护研究综述 被引量:1
11
作者 赵楷 胡煜环 +2 位作者 闫俊桥 毕雪华 张琳琳 《计算机工程》 北大核心 2025年第8期1-15,共15页
区块链作为一种分布式可信数据库,在数字版权保护领域得到有效应用,引起学术界和工业界的广泛关注。传统数字版权保护技术存在侵权追踪难、版权交易复杂、合法权益保护不足等问题,严重制约数字版权保护研究的发展。区块链的防篡改、可... 区块链作为一种分布式可信数据库,在数字版权保护领域得到有效应用,引起学术界和工业界的广泛关注。传统数字版权保护技术存在侵权追踪难、版权交易复杂、合法权益保护不足等问题,严重制约数字版权保护研究的发展。区块链的防篡改、可追溯和去中心化等特性为解决数字版权侵权风险提供了可信、透明和安全的解决思路。首先介绍了区块链技术的基本原理;然后针对传统版权保护方案存在的问题,介绍了区块链结合传统版权保护技术的最新研究成果;接着评估了区块链在实际应用中的效果和潜力,强调其对版权保护体系的积极影响;最后探讨了区块链版权保护面临的挑战和未来发展趋势,以实现更加完善和可持续的区块链版权保护体系。 展开更多
关键词 区块链 数字版权保护 智能合约 密码学 侵权溯源
在线阅读 下载PDF
基于格上身份认证密钥协商的OPC UA握手机制 被引量:1
12
作者 倪亮 谷威力 +2 位作者 王念平 周恒昇 张亚伟 《计算机应用与软件》 北大核心 2025年第5期341-349,共9页
由于量子计算技术的飞速发展,传统工业通信基础OPC统一架构(OPC UA)协议面临着严峻的潜在安全威胁。依据OPC UA的安全模型,设计一个基于格上身份认证密钥协商的OPC UA握手机制,安全性基于格上困难问题的难解性,可以抵抗量子计算攻击。... 由于量子计算技术的飞速发展,传统工业通信基础OPC统一架构(OPC UA)协议面临着严峻的潜在安全威胁。依据OPC UA的安全模型,设计一个基于格上身份认证密钥协商的OPC UA握手机制,安全性基于格上困难问题的难解性,可以抵抗量子计算攻击。密钥协商的过程由一个高效的格上身份加密方案所构造,没有使用开销大的公钥签名算法,实现了隐式认证。利用基于身份的密码机制,所提OPC UA方案还可以消除公钥证书,不再依赖复杂的公钥基础设施(PKI)。利用仿真实验验证了方案的可行性,通过性能分析从理论上证明了方案的安全性和执行效率。 展开更多
关键词 工业通信 OPC统一架构 认证密钥协商 基于格的密码 基于身份的密码
在线阅读 下载PDF
快速数论变换算法硬件实现研究综述 被引量:1
13
作者 董秀则 于庚辰 +1 位作者 杨鸿刚 高献伟 《北京电子科技学院学报》 2025年第1期26-36,共11页
随着量子计算机的迅速发展,传统密码方案面临严重的安全威胁。在后量子密码方案中,格密码因其高安全性、广泛用途和强灵活性,成为最具潜力的一类。多项式乘法是格密码理论中的关键模块,快速数论变换算法能够显著提升多项式乘法的计算速... 随着量子计算机的迅速发展,传统密码方案面临严重的安全威胁。在后量子密码方案中,格密码因其高安全性、广泛用途和强灵活性,成为最具潜力的一类。多项式乘法是格密码理论中的关键模块,快速数论变换算法能够显著提升多项式乘法的计算速度,从而提高格密码算法的整体效率。这种算法在大规模并行计算和资源受限的环境中表现尤为出色,高性能的快速数论变换硬件实现可以带来显著的计算加速、功耗降低和并行化处理能力,快速数论变换算法的设计直接决定了格密码算法的安全性和高效性。本文简要介绍了格密码理论及其面临的困难问题,探讨了快速数论变换算法的基本概念与结构,并对近年来其在硬件实现方面的进展进行了研究。最后,从公钥加密、数字签名和密钥交换三个方面对相关研究进行了总结与概括。 展开更多
关键词 格密码体制 后量子密码 快速数论变换 多项式乘法
在线阅读 下载PDF
标准模型安全的线性同态聚合签名
14
作者 韩益亮 李瑞峰 +2 位作者 周潭平 汪晶晶 杨晓元 《通信学报》 北大核心 2025年第10期75-86,共12页
现有格基线性同态签名方案难以兼顾多用户聚合与标准模型下的可证安全,限制了其在实际分布式场景中的应用。基于此,提出一种标准模型下可证安全的线性同态聚合签名方案。该方案采用格基左扩展(Left‐Ext)算法将多用户独立公钥整合为统... 现有格基线性同态签名方案难以兼顾多用户聚合与标准模型下的可证安全,限制了其在实际分布式场景中的应用。基于此,提出一种标准模型下可证安全的线性同态聚合签名方案。该方案采用格基左扩展(Left‐Ext)算法将多用户独立公钥整合为统一全局公钥矩阵,提供了聚合签名所需的密钥同态性;引入满秩差分哈希函数与格基右扩展(RightExt)算法,实现了标准模型下的签名模拟。所提方案可抵抗适应性选择消息攻击,将敌手的攻击优势严格规约至格上短整数解问题的困难性,为多源数据协同计算提供了更安全的保障。 展开更多
关键词 格密码 同态签名 聚合签名 标准模型
在线阅读 下载PDF
Olithium:基于格的无陷门在线/离线签名方案
15
作者 王后珍 段小超 +2 位作者 文嘉明 王亚辉 张焕国 《计算机学报》 北大核心 2025年第4期877-892,共16页
随着互联网和大数据时代的到来,数据在传输过程中的安全性和效率问题日益凸显。作为保障数据完整性并验证发送者身份的核心技术,数字签名显得尤为重要。与此同时,量子计算机的发展对传统的签名方案构成了巨大威胁。在这一背景下,美国国... 随着互联网和大数据时代的到来,数据在传输过程中的安全性和效率问题日益凸显。作为保障数据完整性并验证发送者身份的核心技术,数字签名显得尤为重要。与此同时,量子计算机的发展对传统的签名方案构成了巨大威胁。在这一背景下,美国国家标准与技术研究院于2023年公布了基于CRYSTALS-Dilithium算法的抗量子签名标准ML-DSA的草案。为了使其能更好地应用于海量的数据传输等场景,本文在此基础上设计了一个无陷门在线/离线签名方案,称之为Olithium。该方案允许签名者在未收到消息时(离线阶段)产生签名的一部分,并在收到消息后(在线阶段)继续完成签名。最终,能在存储空间小幅增加的前提下,将在线签名时间缩短约50%。本文还以数字证书颁发场景为例,说明该方案的现实有效性。 展开更多
关键词 后量子密码 在线/离线签名 数字证书 基于格的密码学 优化实现
在线阅读 下载PDF
基于后量子密码改进算法的FPGA设计优化 被引量:2
16
作者 田洪亮 王馨语 张海武 《粘接》 2025年第2期155-157,共3页
为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构... 为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构。与之前其他的设计相比较,基于Crystals-Kyber算法的可编程门阵列(FPGA)优化实现了高效的NTT多项式乘法。实验结果表明,所提方案优化算法使用了较快的计算速度和较少的计算周期,以及较小的面积时间乘积(Area Time,AT),改进的Crystals-Kyber算法与其他算法相比,至少缩短了39.13%的NTT计算周期,并缩短了47.50%计算时间,优化了基于格密码的执行时间和硬件资源开销。 展开更多
关键词 后量子密码 NTT算法 FPGA
在线阅读 下载PDF
基于逻辑χ态的三方半量子密钥协商协议 被引量:1
17
作者 何业锋 蔡明月 梁熙媛 《信息网络安全》 北大核心 2025年第1期27-35,共9页
半量子密钥协商适用于参与者能力较低或承担不起昂贵设备的情况,比传统的量子密钥协商更符合实际需求。然而,目前三方半量子密钥协商协议的研究较少且普遍存在效率较低的问题。为此,文章提出一种基于逻辑六比特χ型态的三方半量子密钥... 半量子密钥协商适用于参与者能力较低或承担不起昂贵设备的情况,比传统的量子密钥协商更符合实际需求。然而,目前三方半量子密钥协商协议的研究较少且普遍存在效率较低的问题。为此,文章提出一种基于逻辑六比特χ型态的三方半量子密钥协商协议,该协议充分利用了逻辑六比特χ型态的纠缠特性,通过简单的幺正操作和粒子测量,实现了在无需可信第三方介入的情况下两个半量子方与一个全量子方之间公平的密钥协商。该协议不仅提高了量子比特效率还具备抵御参与者攻击和外部攻击的能力。 展开更多
关键词 量子密码 半量子密钥协商 χ型态 BELL态 量子比特效率
在线阅读 下载PDF
k-阶旋转对称2-弹性函数的构造
18
作者 刘春红 李龙飞 +3 位作者 高强 王天银 杜蛟 庞善起 《电子学报》 北大核心 2025年第5期1445-1452,共8页
基于支撑集交换技术,通过对k-阶旋转对称轨道的分析,给出了一个由n元1-阶旋转对称轨道,得到nk元k-阶旋转对称轨道的方法.进一步,通过改变定义在F_(2)^(nk)上的旋转对称弹性函数的支撑集,构造出新的k-阶旋转对称2-弹性函数,且至少能得到k... 基于支撑集交换技术,通过对k-阶旋转对称轨道的分析,给出了一个由n元1-阶旋转对称轨道,得到nk元k-阶旋转对称轨道的方法.进一步,通过改变定义在F_(2)^(nk)上的旋转对称弹性函数的支撑集,构造出新的k-阶旋转对称2-弹性函数,且至少能得到k·2^(k)个不同的nk(n≥3,k≥2)元k-阶旋转对称2-弹性函数. 展开更多
关键词 密码学 弹性函数 旋转对称函数 支撑矩阵 非线性度 代数次数
在线阅读 下载PDF
基于量子密钥分发技术的物联网信息端到端加密传输算法 被引量:2
19
作者 张继飞 张春红 林超 《黑龙江工程学院学报》 2025年第1期22-28,共7页
根据量子不可克隆定理,未经授权的第三方无法复制或准确测量正在传输的量子态,因为任何测量操作都会不可避免地改变量子态,从而被合法的通信双方检测到。因此,提出一种基于量子密钥分发技术的物联网信息端到端加密传输算法。利用量子密... 根据量子不可克隆定理,未经授权的第三方无法复制或准确测量正在传输的量子态,因为任何测量操作都会不可避免地改变量子态,从而被合法的通信双方检测到。因此,提出一种基于量子密钥分发技术的物联网信息端到端加密传输算法。利用量子密钥分发技术生成安全初始密钥,并通过量子密码传输协议进行密钥分发,量子密码传输协议通过单向量子信息通道和双向公共信息通道,确保用户与传感节点间信息加密传输。在握手过程中,完成用户与传感节点的双向认证,建立安全连接,进行数据加密与完整性封装,实现端到端加密传输。实验结果显示,该算法在物联网端到端数据传输的完整性与安全性方面表现出色,且在传输延时控制方面具有显著优势。 展开更多
关键词 量子密钥分发技术 物联网信息 端到端 加密传输 量子密码传输协议 安全认证
在线阅读 下载PDF
适用于智能医疗的匿名基于身份的认证密钥协商协议
20
作者 倪亮 刘笑颜 +3 位作者 谷兵珂 张亚伟 周恒昇 王念平 《计算机应用研究》 北大核心 2025年第1期282-287,共6页
在智能医疗场景中,病人需佩戴各种传感医疗设备,传感医疗设备会在检测过程中收集病人的心率、呼吸频率、脉搏等生理和医疗信息,并将这些医疗信息传输到云服务器,但日益增长的数据量在传输过程中必会带来额外的通信开销和传输时延,若发... 在智能医疗场景中,病人需佩戴各种传感医疗设备,传感医疗设备会在检测过程中收集病人的心率、呼吸频率、脉搏等生理和医疗信息,并将这些医疗信息传输到云服务器,但日益增长的数据量在传输过程中必会带来额外的通信开销和传输时延,若发生数据窃取和窜改,将会造成难以控制的后果。除此之外,近年来量子计算技术飞速发展,基于经典公钥密码体系的公共网络基础设施的安全性面临巨大挑战,保障量子安全已具有现实意义。由此,提出了一个能够抵抗量子计算攻击并适用于智能医疗的基于身份认证密钥协商协议,避免部署公钥基础设施(public key infrastructure,PKI),并证明其在改进的ID-BJM模型下是安全的,其安全性可以归约到环上带误差学习(ring learning with errors,RLWE)问题的难解性。所提协议通过两轮信息交互实现了隐式认证,且可保护自身设备的身份信息,并可抵抗信号泄露攻击,保证在数据传输过程中的安全性,与其他相关的格上基于身份认证密钥协商协议方案相比,在安全性或执行效率方面更具优势。 展开更多
关键词 基于身份密码 环上带误差学习 认证密钥协商协议 后量子密码 隐私保护 智能医疗
在线阅读 下载PDF
上一页 1 2 241 下一页 到第
使用帮助 返回顶部