期刊文献+
共找到313篇文章
< 1 2 16 >
每页显示 20 50 100
Performance Evaluation of TLS1.3 Based on Post-Quantum Cryptography
1
作者 SONG Zhen-Yu ZHENG Jie-Yu ZHAO Yun-Lei 《密码学报(中英文)》 北大核心 2026年第1期199-218,共20页
Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computat... Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computational overhead may result in a significant performance reduction compared with conventional TLS.In this paper,we present a systematic evaluation of PQ-TLS performance across diverse deployment scenarios to address the following critical research questions.(1)What is the performance behavior of PQ-TLS across different TLS modes?(2)How does PQ-TLS perform across varying client scales?(3)Which network topology is most suitable for PQ-TLS?(4)How does PQ-TLS perform on personal computers(PCs)compared to embedded IoT devices?To the best of our knowledge,this is the first work to comprehensively address these issues,offering implementers some insights into PQ-TLS performance and guidance for optimizing it across diverse scenarios. 展开更多
关键词 quantum security post-quantum cryptography transport layer security network emulation Internet measurement
在线阅读 下载PDF
Lightweight Hash-Based Post-Quantum Signature Scheme for Industrial Internet of Things
2
作者 Chia-Hui Liu 《Computers, Materials & Continua》 2026年第2期1041-1058,共18页
TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,th... TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection. 展开更多
关键词 Industrial Internet of Things(IIoT) post-quantum cryptography hash-based signatures SPHINCS+
在线阅读 下载PDF
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
3
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions
4
作者 Seo Yeon Moon Byung Hyun Jo +2 位作者 Abir El Azzaoui Sushil Kumar Singh Jong Hyuk Park 《Computers, Materials & Continua》 2025年第7期25-55,共31页
With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these t... With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these technologies face critical security challenges,exacerbated by the emergence of quantum computing,which threatens traditional encryption methods.The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust,quantum-resistant security solutions.To address these challenges,researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography,which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity.This paper reviews the current security practices in IoT and Edge/Fog environments,explores the latest advancements in QKD and PQC technologies,and discusses their integration into distributed computing systems.Additionally,this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations.Finally,we highlight future research directions aimed at improving the scalability,efficiency,and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats. 展开更多
关键词 Edge computing fog computing quantum key distribution security post-quantum cryptography cascade protocol
在线阅读 下载PDF
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
5
作者 Fatima Asiri Wajdan Al Malwi 《Computer Modeling in Engineering & Sciences》 2025年第5期2053-2077,共25页
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica... Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications. 展开更多
关键词 Information security chaotic map modeling post-quantum security quantum image encryption chaotic map image encryption
在线阅读 下载PDF
A Novel Post-Quantum Blind Signature for Log System in Blockchain 被引量:5
6
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Ke Xiao Xin Liu Xiubo Chen Mianxiong Dong 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期945-958,共14页
In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In... In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In orderto ensure the integrity of the log in the current system, many researchers havedesigned it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attackerequipped with a quantum computer can extract the user's private key from thepublic key to generate a forged signature, destroy the structure of the blockchain,and threaten the security of the log system. Thus, blind signature on the lattice inpost-quantum blockchain brings new security features for log systems. In ourpaper, to address these, firstly, we propose a novel log system based on post-quantum blockchain that can resist quantum computing attacks. Secondly, we utilize apost-quantum blind signature on the lattice to ensure both security and blindnessof log system, which makes the privacy of log information to a large extent.Lastly, we enhance the security level of lattice-based blind signature under therandom oracle model, and the signature size grows slowly compared with others.We also implement our protocol and conduct an extensive analysis to prove theideas. The results show that our scheme signature size edges up subtly comparedwith others with the improvement of security level. 展开更多
关键词 Log system post-quantum blockchain LATTICE blind signature privacy protection
在线阅读 下载PDF
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
7
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers ALGORITHM post-quantum Cryptography
暂未订购
Implementation Scheme of Two-Photon Post-Quantum Correlations
8
作者 Cuo-Zhu Pan, Wen-Jing Chu +3 位作者 Ming Yang Qing Yang Gang Zhang Zhuo-Liang Cao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第6期687-693,共7页
The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a ph... The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a physical implementation of such a correlation with the help of quantum non-demolition measurement, which is realized via the cross-Kerr nonlinear interaction between the signal photon and a probe coherent beam. The indirect measurement on the polarization state of photon is realized by the direct measurement on the phase shift of the probe coherent beam, which enhances the detection efficiency greatly and leaves the signal photon unabsorbed. The maximal violation of the CHSH inequality 4 can be achieved by pre-and post-selecting maximally entangled states. The reason why we can get the post-quantum correlation is that the selection of the results after measurement opens fair-sampling loophole. The fair-sampling loophole opened here is different from the one usually used in the currently existing simulation schemes for post-quantum correlations,which are simulated by selecting the states to be measured or enlarging the Hilbert space. So, our results present an alternative way to mimic post-quantum correlations. 展开更多
关键词 post-quantum correlation two-state vector formalism fair-sampling loophole linear optics
原文传递
针对格密码算法Kyber与Dilithium的能耗侧信道防护技术
9
作者 李延斌 郭奕康 +3 位作者 张舒琪 唐明 葛春鹏 徐秋亮 《计算机学报》 北大核心 2026年第4期952-978,共27页
随着量子计算技术的迅猛发展,传统公钥密码体系面临重大安全威胁,后量子密码(PQC)成为新一代密码标准化的核心方向。美国国家标准与技术研究院(NIST)于2024年将基于模块化格上学习问题的Kyber算法和Dilithium算法分别确立为FIPS203密钥... 随着量子计算技术的迅猛发展,传统公钥密码体系面临重大安全威胁,后量子密码(PQC)成为新一代密码标准化的核心方向。美国国家标准与技术研究院(NIST)于2024年将基于模块化格上学习问题的Kyber算法和Dilithium算法分别确立为FIPS203密钥封装机制标准和FIPS204数字签名算法标准。在后量子密码的过渡过程中,实际环境中的物理安全性也逐渐被关注。格密码特有的多项式环运算、数论变换、消息编解码、边界检查、FO变换等操作导致其能耗侧信道泄露模式与传统密码存在显著差异,格密码泄露面广、算子种类多、运算复杂等特点对防护实现带来了巨大挑战。本文重点以Kyber和Dilithium为研究对象,系统梳理其侧信道脆弱点与防护目标,并对现有防护技术进行深入分析与评估:(1)揭示格密码侧信道攻击的脆弱性分布,进行泄露机理分析,归纳关键泄露点;(2)提出涵盖不同脆弱点的整体防护架构,对算子(如NTT、编解码等)的防护思路、实现难点进行分析,构建覆盖Kyber与Dilithium的防护全景图;(3)从设计思想、实现代价及优化方向评估现有方案,对防护方案给出实现建议,指出开销瓶颈与未来挑战。本研究为格密码侧信道防护提供理论参考与技术路线支撑,助力后量子密码在实际密码设备中的高效安全部署。 展开更多
关键词 格密码 后量子密码 侧信道分析 侧信道防护 Kyber Dilithium
在线阅读 下载PDF
典型密码算法的优化研究
10
作者 许佳杰 倪文清 +2 位作者 蔡应强 雷国伟 廖文良 《佳木斯大学学报(自然科学版)》 2026年第3期34-37,42,共5页
面对日益严峻的信息安全挑战,聚焦典型密码算法的优化研究,通过理论解析、性能优化与方案对比,为实际场景的加密决策提供理论支撑。深入分析DES,AES,SM4等对称密码与RSA,ElGamal,NTRU等非对称密码的运行机理,提出两阶段优化策略,一是基... 面对日益严峻的信息安全挑战,聚焦典型密码算法的优化研究,通过理论解析、性能优化与方案对比,为实际场景的加密决策提供理论支撑。深入分析DES,AES,SM4等对称密码与RSA,ElGamal,NTRU等非对称密码的运行机理,提出两阶段优化策略,一是基于AES算法的预计算查表技术(T表),将轮函数运算转化为内存访问操作,实现加解密吞吐量倍增;二是构建AES-NTRU混合加密架构,通过量子安全密钥封装机制(KEM)实现传输效率与抗攻击能力的双重提升。实验表明,传统算法与后量子密码的协同部署能有效应对新型威胁,可以为密码体系平滑过渡至量子计算时代提供技术储备。 展开更多
关键词 对称密码 非对称密码 混合加密系统 后量子密码
在线阅读 下载PDF
Post-quantum blind signcryption scheme from lattice 被引量:4
11
作者 Huifang YU Lu BAI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第6期891-901,共11页
Blind signcryption(BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous unforgeability and confidentiality. Most traditional BSC schemes are based on the ... Blind signcryption(BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous unforgeability and confidentiality. Most traditional BSC schemes are based on the number theory. However, with the rapid development of quantum computing, traditional BSC systems are faced with severe security threats. As promising candidate cryptosystems with the ability to resist attacks from quantum computing, lattice-based cryptosystems have attracted increasing attention in academic fields. In this paper, a post-quantum blind signcryption scheme from lattice(PQ-LBSCS) is devised by applying BSC to lattice-based cryptosystems. PQ-LBSCS inherits the advantages of the lattice-based cryptosystem and blind signcryption technique. PQ-LBSCS is provably secure under the hard assumptions of the learning with error problem and small integer solution problem in the standard model. Simulations are carried out using the Matlab tool to analyze the computational efficiency, and the simulation results show that PQ-LBSCS is more efficient than previous schemes. PQ-LBSCS has extensive application prospects in e-commerce, mobile communication, and smart cards. 展开更多
关键词 Lattice-based cryptosystem Blind signcryption post-quantum computing Learning with error assumption Small integer solution assumption
原文传递
基于国产深度计算单元的SPHINCS^(+)-SM3高性能优化
12
作者 宁祎静 董建阔 +4 位作者 周思源 林璟锵 孙思维 郑昉昱 葛春鹏 《计算机研究与发展》 北大核心 2026年第2期405-418,共14页
数字签名在信息安全中扮演着至关重要的角色,但传统的数字签名算法在后量子时代面临失效的风险。SPHINCS^(+)作为一种能够抵抗量子计算攻击的数字签名框架,将在后量子时代发挥越来越重要的作用。然而,SPHINCS^(+)的计算速度较慢,难以满... 数字签名在信息安全中扮演着至关重要的角色,但传统的数字签名算法在后量子时代面临失效的风险。SPHINCS^(+)作为一种能够抵抗量子计算攻击的数字签名框架,将在后量子时代发挥越来越重要的作用。然而,SPHINCS^(+)的计算速度较慢,难以满足现代密码算法对于高吞吐量和低延时的需求,极大地限制了其实用性。提出了一种基于国产深度计算单元(deep computing unit,DCU)的高效优化方案,以加速由国产哈希算法SM3实例化的SPHINCS^(+)算法。通过提高内存拷贝效率、优化SM3、改进SPHINCS^(+)的计算流程以及采用最佳计算并行度,在DCU上实现了SPHINCS^(+)-SM3的128-f模式。实验结果表明,与传统CPU实现相比,DCU上的实现显著提高了签名生成和验证的吞吐量,分别达到了2603.87倍和1281.98倍的提升,极大地增强了SPHINCS^(+)的计算效率和实用性,并推进了后量子密码算法的国产化进程。在数据流量和大量签名请求的场景下,DCU实现展现出显著优于CPU实现的性能优势。 展开更多
关键词 SPHINCS^(+) SM3 后量子密码 并行计算 DCU加速
在线阅读 下载PDF
面向格密码的高面积效率基-4快速数论变换硬件架构与无访存冲突优化设计
13
作者 郑集文 赵石磊 +3 位作者 张子悦 刘志伟 于斌 黄海 《电子与信息学报》 北大核心 2026年第2期855-865,共11页
针对格基后量子密码(PQC)算法中基-2数论变换(NTT)计算效率较低以及原位计算内存访问模式复杂的问题,该文提出一种高面积效率的基-4 NTT硬件设计。首先,介绍了负包裹卷积方法的运算流程及适用条件,在此基础上提出了一种恒定几何(CG)结... 针对格基后量子密码(PQC)算法中基-2数论变换(NTT)计算效率较低以及原位计算内存访问模式复杂的问题,该文提出一种高面积效率的基-4 NTT硬件设计。首先,介绍了负包裹卷积方法的运算流程及适用条件,在此基础上提出了一种恒定几何(CG)结构的低计算复杂度基-4 NTT/INTT算法。其次,深入分析不同PQC算法中模数的共性特征,设计了基于K^(2)-RED约简的可扩展模乘单元。最后,通过优化存储器与蝶形单元之间的数据分解与重组,提出一种基于顺序循环和阶梯循环访存的读写地址生成方案,实现了高效的无访存冲突。与传统的乒乓存储模式相比,该方案可减少12.5%的存储空间。实验结果表明,在(项数,模数位宽)分别为(256,13),(256,23)和(1024,14)的3种配置下,该设计的面积-时间积(ATP)较现有方案分别降低56.4%,69.8%和50.3%以上,具有更高的面积效率。 展开更多
关键词 格基后量子密码 数论变换 恒定几何结构 K^(2)-RED约简 无访存冲突
在线阅读 下载PDF
2025年国外网络安全新兴技术进展及发展趋势研究
14
作者 郝志超 王旨思虹 《信息安全与通信保密》 2026年第1期14-24,共11页
2025年,全球网络防御体系正经历以人工智能、零信任与抗量子密码为代表的新兴技术重塑。通过系统梳理2025年国外网络安全新兴技术的政策规划重点及应用进展,揭示美、英等国借助国家级战略,将人工智能确立为网络攻防的核心工具,加速推动... 2025年,全球网络防御体系正经历以人工智能、零信任与抗量子密码为代表的新兴技术重塑。通过系统梳理2025年国外网络安全新兴技术的政策规划重点及应用进展,揭示美、英等国借助国家级战略,将人工智能确立为网络攻防的核心工具,加速推动零信任升级为国家级、多领域的强制安全要求,并推进抗量子密码实现硬件级集成。最后,进一步展望了新兴技术的发展趋势,指出未来网络防御将围绕智能对抗、技术融合与弹性安全的方向演进。 展开更多
关键词 人工智能 零信任 抗量子密码 网络安全
在线阅读 下载PDF
基于CSIDH的AKE协议研究综述
15
作者 王洋 薛海洋 +2 位作者 周国庆 曹越 黄宝盛 《通信技术》 2026年第1期1-8,共8页
认证密钥交换(AKE)协议可以使得在不安全信道通信的双方安全地协商一个共享的会话密钥。随着量子计算技术的迅速发展,基于Diffie-Hellman等经典数论假设设计的AKE协议受到严峻挑战。与之相对的,基于同源的密码学,特别是基于交换超奇异同... 认证密钥交换(AKE)协议可以使得在不安全信道通信的双方安全地协商一个共享的会话密钥。随着量子计算技术的迅速发展,基于Diffie-Hellman等经典数论假设设计的AKE协议受到严峻挑战。与之相对的,基于同源的密码学,特别是基于交换超奇异同源Diffie-Hellman(CSIDH)假设设计的认证密钥交换协议成为后量子时代AKE协议的备选算法之一。为厘清基于CSIDH相关问题设计AKE协议的主流方法,通过整理文献并分类总结等方式,给出了基于CSIDH相关假设设计的、包括显式认证和隐式认证两条技术路线的AKE协议的研究综述,并分析了不同协议的优缺点。研究结论可以为我国未来抗量子AKE相关协议的设计及标准化工作提供指导。 展开更多
关键词 认证密钥交换(AKE) CSIDH 后量子密码学 综述
在线阅读 下载PDF
2025年全球网络安全态势全景扫描
16
作者 吕玮 《信息安全与通信保密》 2026年第1期1-13,共13页
2025年,人工智能与地缘冲突叠加,推动全球网络安全进入体系对抗新阶段。网络攻击呈现智能化、政治化趋势,关键基础设施成为重点目标。主要国家通过加强法规建设、推动跨域协同与技术治理构建弹性防御体系,零信任、抗量子密码等技术范式... 2025年,人工智能与地缘冲突叠加,推动全球网络安全进入体系对抗新阶段。网络攻击呈现智能化、政治化趋势,关键基础设施成为重点目标。主要国家通过加强法规建设、推动跨域协同与技术治理构建弹性防御体系,零信任、抗量子密码等技术范式正经历根本性重构。通过对2025年全球网络威胁、国家应对及技术演进的全景扫描与深度剖析,系统梳理了网络空间安全态势的发展现状与核心挑战,并对未来走向进行了研判,为理解当前复杂危局下的网络安全态势提供参考。 展开更多
关键词 网络安全态势 人工智能 零信任 抗量子密码
在线阅读 下载PDF
快速数论变换算法硬件实现研究综述 被引量:1
17
作者 董秀则 于庚辰 +1 位作者 杨鸿刚 高献伟 《北京电子科技学院学报》 2025年第1期26-36,共11页
随着量子计算机的迅速发展,传统密码方案面临严重的安全威胁。在后量子密码方案中,格密码因其高安全性、广泛用途和强灵活性,成为最具潜力的一类。多项式乘法是格密码理论中的关键模块,快速数论变换算法能够显著提升多项式乘法的计算速... 随着量子计算机的迅速发展,传统密码方案面临严重的安全威胁。在后量子密码方案中,格密码因其高安全性、广泛用途和强灵活性,成为最具潜力的一类。多项式乘法是格密码理论中的关键模块,快速数论变换算法能够显著提升多项式乘法的计算速度,从而提高格密码算法的整体效率。这种算法在大规模并行计算和资源受限的环境中表现尤为出色,高性能的快速数论变换硬件实现可以带来显著的计算加速、功耗降低和并行化处理能力,快速数论变换算法的设计直接决定了格密码算法的安全性和高效性。本文简要介绍了格密码理论及其面临的困难问题,探讨了快速数论变换算法的基本概念与结构,并对近年来其在硬件实现方面的进展进行了研究。最后,从公钥加密、数字签名和密钥交换三个方面对相关研究进行了总结与概括。 展开更多
关键词 格密码体制 后量子密码 快速数论变换 多项式乘法
在线阅读 下载PDF
基于后量子密码改进算法的FPGA设计优化 被引量:2
18
作者 田洪亮 王馨语 张海武 《粘接》 2025年第2期155-157,共3页
为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构... 为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构。与之前其他的设计相比较,基于Crystals-Kyber算法的可编程门阵列(FPGA)优化实现了高效的NTT多项式乘法。实验结果表明,所提方案优化算法使用了较快的计算速度和较少的计算周期,以及较小的面积时间乘积(Area Time,AT),改进的Crystals-Kyber算法与其他算法相比,至少缩短了39.13%的NTT计算周期,并缩短了47.50%计算时间,优化了基于格密码的执行时间和硬件资源开销。 展开更多
关键词 后量子密码 NTT算法 FPGA
在线阅读 下载PDF
Crystals-Dilithium数字签名技术硬件实现综述
19
作者 崔益军 李梦雪 +2 位作者 王辈 王成华 刘伟强 《电子学报》 北大核心 2025年第7期2558-2578,共21页
随着量子计算技术的不断发展,依赖传统公钥密码体制三大功能(密钥协商/数字签名/公钥加密)的各种应用系统将不再安全.为应对量子威胁,以美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)为首的国际标准... 随着量子计算技术的不断发展,依赖传统公钥密码体制三大功能(密钥协商/数字签名/公钥加密)的各种应用系统将不再安全.为应对量子威胁,以美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)为首的国际标准组织积极征集与部署后量子密码(Post Quantum Cryptography,PQC)算法的标准化工作,致力于在真正实用型量子计算机问世之前,提前完成传统公钥密码算法到PQC算法的迁移过渡.Crystals-Dilithium是NIST-PQC标准中的一种基于格的数字签名算法,其安全性高,运算速度快,是实现抵抗量子攻击数字签名算法的重要路径之一.本文从主流Crystals-Dilithium数字签名算法的理论基础出发,从底层关键组件的优化方法和整体硬件构架设计方法着手,围绕硬件资源优化和性能优化等现有方法和成果对比展开分析介绍,为研究者们后续研究探明方向,希望为设计性能与硬件资源均衡的后量子数字签名密码芯片提供有力参考. 展开更多
关键词 后量子密码 格密码 Crystals-Dilithium数字签名 硬件实现 优化方案
在线阅读 下载PDF
具有用户自主链接及验证者条件撤销的格基群签名
20
作者 陈颖 何德彪 +1 位作者 彭聪 罗敏 《软件学报》 北大核心 2025年第10期4444-4460,共17页
群签名作为一种隐私保护的重要技术,为用户匿名性提供良好的保障.然而,普通群签名方案存在可追溯签名者身份的群管理员,与区块链去中心化的特性相悖,难以满足对于隐私性要求更严格的应用场景.结合防双重认证签名技术,提出一种具有用户... 群签名作为一种隐私保护的重要技术,为用户匿名性提供良好的保障.然而,普通群签名方案存在可追溯签名者身份的群管理员,与区块链去中心化的特性相悖,难以满足对于隐私性要求更严格的应用场景.结合防双重认证签名技术,提出一种具有用户自主链接及验证者条件撤销的群签名,较好地实现了用户隐私与平台管理之间的平衡,并给出了格上实例化方案.通过随机谕言机模型下的安全性分析,方案满足无私匿名性、可追溯性和不可诽谤性.通过性能分析,方案的时间开销和通信开销均在可接受范围内.最后,设计了一种基于区块链的后量子安全医疗数据共享条件隐私保护系统,给出方案的具体应用实例. 展开更多
关键词 群签名 后量子密码 区块链 条件隐私保护 格密码
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部