期刊文献+
共找到4,881篇文章
< 1 2 245 >
每页显示 20 50 100
Sine-Polynomial Chaotic Map(SPCM):A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks
1
作者 David S.Bhatti Annas W.Malik +1 位作者 Haeung Choi Ki-Il Kim 《Computers, Materials & Continua》 2025年第10期2157-2177,共21页
Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a n... Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions,leveraging a piecewise function to achieve a broad chaotic range()and a high Lyapunov exponent(5.04).Validated through nine benchmarks,including standard randomness tests,Diehard tests,and Shannon entropy(3.883),SPCM demonstrates superior randomness and high sensitivity to initial conditions.Applied to image encryption,SPCM achieves 0.152582 s(39%faster than some techniques)and 433.42 KB/s throughput(134%higher than some techniques),setting new benchmarks for chaotic map-based methods in WSNs.Chaos-based permutation and exclusive or(XOR)diffusion yield near-zero correlation in encrypted images,ensuring strong resistance to Statistical Attacks(SA)and accurate recovery.SPCM also exhibits a strong avalanche effect(bit difference),making it an efficient,secure solution for WSNs in domains like healthcare and smart cities. 展开更多
关键词 Chaos theory chaotic system image encryption cryptography wireless sensor networks(WSNs)
在线阅读 下载PDF
Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms
2
作者 Ehan Sohn Sangmyung Lee +3 位作者 Sunggon Kim Kiwook Sohn Manish Kumar Yongseok Son 《Computer Modeling in Engineering & Sciences》 2025年第11期2761-2785,共25页
With the accelerated growth of the Internet of Things(IoT),real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local.Since these d... With the accelerated growth of the Internet of Things(IoT),real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local.Since these devices often handle personal information under limited resources,cryptographic algorithms must be executed efficiently.Their computational characteristics strongly affect system performance,making it necessary to analyze resource impact and predict usage under diverse configurations.In this paper,we analyze the phase-level resource usage of AES variants,ChaCha20,ECC,and RSA on an edge device and develop a prediction model.We apply these algorithms under varying parallelism levels and execution strategies across key generation,encryption,and decryption phases.Based on the analysis,we train a unified Random Forest model using execution context and temporal features,achieving R2 values up to 0.994 for power and 0.988 for temperature.Furthermore,the model maintains practical predictive performance even for cryptographic algorithms not included during training,demonstrating its ability to generalize across distinct computational characteristics.Our proposed approach reveals how execution characteristics and resource usage interacts,supporting proactive resource planning and efficient deployment of cryptographic workloads on edge devices.As our approach is grounded in phase-level computational characteristics rather than in any single algorithm,it provides generalizable insights that can be extended to a broader range of cryptographic algorithms that exhibit comparable phase-level execution patterns and to heterogeneous edge architectures. 展开更多
关键词 Internet of Things(IoT) cryptography power efficient computing performance modeling
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
3
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
4
作者 I.Nasurulla K.Hemalatha +1 位作者 P.Ramachandran S.Parvathi 《Journal of Harbin Institute of Technology(New Series)》 2025年第2期90-104,共15页
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we... Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we propose SecureCons Framework(SCF),a novel consensus-based cryptographic framework designed to enhance resilience against SCAs in cloud environments.SCF integrates a dual-layer approach combining lightweight cryptographic algorithms with a blockchain-inspired consensus mechanism to secure data exchanges and thwart potential side-channel exploits.The framework includes adaptive anomaly detection models,cryptographic obfuscation techniques,and real-time monitoring to identify and mitigate vulnerabilities proactively.Experimental evaluations demonstrate the framework's robustness,achieving over 95%resilience against advanced SCAs with minimal computational overhead.SCF provides a scalable,secure,and efficient solution,setting a new benchmark for side-channel attack mitigation in cloud ecosystems. 展开更多
关键词 Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography
在线阅读 下载PDF
格上基于零知识证明的可追踪环签名方案
5
作者 孟慧 桑梓鑫 +1 位作者 汤永利 闫玺玺 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期49-57,共9页
针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒... 针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒绝采样算法和追踪机制设计了一种可追踪环签名方案,签名算法中使用递归算法压缩了承诺的大小,进一步降低了签名尺寸,在随机预言机模型下证明方案满足可链接性、匿名性和抗陷害性。性能分析表明,签名尺寸与环成员数量为对数大小关系,在环成员数量较多时,公钥的存储开销和签名的通信开销具有明显优势。 展开更多
关键词 环签名 递归 格密码 零知识证明
在线阅读 下载PDF
OFD版式文档体系在智慧医疗中的创新应用与优化路径探讨
6
作者 张晓东 杨丰华 《中国数字医学》 2026年第2期66-71,共6页
探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出... 探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出优化策略,并展望未来发展前景。 展开更多
关键词 智慧医疗 OFD版式文档 国密算法
在线阅读 下载PDF
METHOD FOR CONSTRUCTING TAG-KEM SCHEMES WITH SHORT-MESSAGE PUBLIC-KEY ENCRYPTIONS 被引量:1
7
作者 陈原 陈丹 董庆宽 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期301-305,共5页
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ... Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one. 展开更多
关键词 information security public-key encryption chosen ciphertext security Tag-KEM scheme
在线阅读 下载PDF
格上困难问题量子求解算法综述
8
作者 曹金政 罗向阳 +1 位作者 陈晓峰 程庆丰 《软件学报》 北大核心 2026年第1期398-424,共27页
随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐... 随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐步引起关注.围绕后量子密码研究中涉及的格上困难问题,对格上困难问题量子求解算法给出综述.首先,分类整了格上困难问题量子求解算法研究现状.其次,梳理各类格上困难问题量子求解算法的设计思路和应用的量子计算技术,并总结各类格上困难问题量子求解算法的复杂度.最后,展望格上困难问题量子求解算法的未来发展趋势. 展开更多
关键词 格公钥密码 格上困难问题 量子算法
在线阅读 下载PDF
基于对抗网络的可配置加解密硬件优化设计
9
作者 涂江涛 张会红 张跃军 《宁波大学学报(理工版)》 2026年第1期1-7,共7页
随着神经密码学的出现,越来越多研究使用神经网络来训练加解密算法,其中采用对抗网络可实现端到端的高安全加解密,但存在开销大、速度慢等问题。通过对运算单元核心、数据存储架构和数据流行为进行协同优化设计,提出一种面向神经网络的... 随着神经密码学的出现,越来越多研究使用神经网络来训练加解密算法,其中采用对抗网络可实现端到端的高安全加解密,但存在开销大、速度慢等问题。通过对运算单元核心、数据存储架构和数据流行为进行协同优化设计,提出一种面向神经网络的可配置加解密硬件设计方案。该方案首先对加解密模型进行硬件友好型优化,完成网络训练和量化;然后,采用Winograd+DSP48的卷积加速方法,将所需96个乘法器降低到32个;最后,设计CPU控制与调度系统架构,结合动态控制加速器的操作模式,实现高性能可配置加解密硬件电路。实验结果表明,所提方案最高工作频率为133 MHz,功耗为32.4 m W,吞吐量为17.06 GOPs。加解密网络的正确率达100%,破解网络正确率接近50%,硬件电路具备可配置和高安全特性。 展开更多
关键词 神经密码学 对抗神经网络 可配置 电路优化设计
在线阅读 下载PDF
基于BGV密码的密文模式匹配协议
10
作者 郭琦 张猛 《信息技术》 2026年第1期15-21,共7页
字符串搜索有着较为广泛的应用场景,在当前云计算环境下,将检索计算外包给第三方服务器存在数据安全问题。因此,文中设计了两种密文模式匹配协议,在保护用户隐私的同时实现高效的密文计算。协议基于BGV同态密码构建加密环境,并利用SIMD... 字符串搜索有着较为广泛的应用场景,在当前云计算环境下,将检索计算外包给第三方服务器存在数据安全问题。因此,文中设计了两种密文模式匹配协议,在保护用户隐私的同时实现高效的密文计算。协议基于BGV同态密码构建加密环境,并利用SIMD技术加快同态操作。设计高效的密文判等函数,采用朴素密文字符串搜索方式完成密态模式匹配协议的实现。实验结果表明,所提出的两种协议在加密时仅需较小的加密参数,且在密文计算效率上优于同类工作。 展开更多
关键词 密码学 隐私计算 模式匹配
在线阅读 下载PDF
面积高效的格密码多项式乘法硬件实现
11
作者 谢家兴 蒲金伟 +2 位作者 方伟钿 郑欣 熊晓明 《计算机工程》 北大核心 2026年第1期282-292,共11页
基于格的后量子密码算法在公钥密码领域具有广泛的应用前景,多项式乘法的计算复杂性是其硬件实现的主要性能瓶颈。针对多项式乘法实现存在的面积效率低和内存映射冲突等问题,提出一种基于部分数论变换(PNTT)和系数交叉运算(CCO)的多项... 基于格的后量子密码算法在公钥密码领域具有广泛的应用前景,多项式乘法的计算复杂性是其硬件实现的主要性能瓶颈。针对多项式乘法实现存在的面积效率低和内存映射冲突等问题,提出一种基于部分数论变换(PNTT)和系数交叉运算(CCO)的多项式乘法结构。首先,将数论变换(NTT)最后一轮、系数相乘和逆数论变换(INTT)第一轮融合成CCO,减少2轮蝶形运算和50%的旋转因子存储空间,降低内存访问开销;其次,采用轻量级硬件分别实现模加、模减、除2运算以及优化后的基于Barrett的模乘运算,有效减少逻辑资源开销,同时采用流水线、分时复用技术设计可重构运算单元(PE)阵列,使得各运算单元可以在不同变换下进行高效重组连接;此外,在内存映射方案上引入系数分组存储和特殊内存映射方法,利用地址映射规律对数据和旋转因子实现高效调度,避免内存映射冲突问题,以低成本实现内存访问;最后,采用先入先出(FIFO)结构实现数据重组,提升数据访问效率。实验结果显示,所提出的PM结构在Slices和数字信号处理器(DSP)的面积延时积(ATP)指标上相比于现有相关工作分别降低21.7%和61.1%以上,具有更高的面积效率。 展开更多
关键词 格密码 多项式乘法 数论变换 模约简 无冲突内存映射
在线阅读 下载PDF
低轨卫星互联网安全接入机制:认证算法与挑战
12
作者 吕政威 肖丽霞 +2 位作者 姚壮 曹越 周家喜 《移动通信》 2026年第1期146-154,共9页
随着星地一体化网络成为6G通信的关键推动力量,低轨卫星互联网凭借广覆盖、低成本及低时延优势,在偏远地区通信、全球无缝连接等场景中展现出重要价值。然而,低轨卫星网络高动态拓扑、长传播时延、资源受限及开放信道等特性,导致传统地... 随着星地一体化网络成为6G通信的关键推动力量,低轨卫星互联网凭借广覆盖、低成本及低时延优势,在偏远地区通信、全球无缝连接等场景中展现出重要价值。然而,低轨卫星网络高动态拓扑、长传播时延、资源受限及开放信道等特性,导致传统地面网络接入认证算法面临实时性不足、切换中断、安全风险高等挑战,构建适配的安全接入认证体系成为关键需求。基于此,总结了低轨卫星互联网接入认证算法,包括物理层认证、基于密码学的认证、基于区块链的认证、跨网络集成认证和轻量级身份认证,并探讨了低轨卫星互联网接入认证的未来研究方向。 展开更多
关键词 低轨卫星互联网 接入认证 密码学
在线阅读 下载PDF
探索整数格的拓扑图编码实现
13
作者 张明军 张玉婧 +1 位作者 张小慧 姚兵 《浙江大学学报(理学版)》 北大核心 2026年第1期47-56,62,共11页
在后量子时代,格密码具有多学科交叉性且研究方法多样性的特点,极有可能成为后量子密码。拓扑编码中的图格是多学科交叉的产物,其中的图通过矩阵进行存储并在计算机中运行,其主要理论来自离散数学、数论、代数学等数学学科。由于拓扑编... 在后量子时代,格密码具有多学科交叉性且研究方法多样性的特点,极有可能成为后量子密码。拓扑编码中的图格是多学科交叉的产物,其中的图通过矩阵进行存储并在计算机中运行,其主要理论来自离散数学、数论、代数学等数学学科。由于拓扑编码含有大量的数学猜想和计算NP-问题,因此其产生的数字串具有不可逆性和计算安全性。本文定义了新的标号和着色,并给出了实现这些标号和着色的算法,确定了承认这几种标号和着色的图类。同时,建立了毛毛虫树图格及其互补图格,探讨了这些图格与传统的整数格之间的关系。所用技术方法均基于有效且可行的算法实现。 展开更多
关键词 格密码 拓扑编码 全标号 全着色 图格 着色图格同态 非对称拓扑加密
在线阅读 下载PDF
An Efficient Certificateless Authentication Scheme with Enhanced Security for NDN-IoT Environments
14
作者 Feihong Xu Jianbo Wu +3 位作者 Qing An Fei Zhu Zhaoyang Han Saru Kumari 《Computers, Materials & Continua》 2026年第4期1788-1801,共14页
The large-scale deployment of Internet of Things(IoT)technology across various aspects of daily life has significantly propelled the intelligent development of society.Among them,the integration of IoT and named data ... The large-scale deployment of Internet of Things(IoT)technology across various aspects of daily life has significantly propelled the intelligent development of society.Among them,the integration of IoT and named data networks(NDNs)reduces network complexity and provides practical directions for content-oriented network design.However,ensuring data integrity in NDN-IoT applications remains a challenging issue.Very recently,Wang et al.(Entropy,27(5),471(2025))designed a certificateless aggregate signature(CLAS)scheme for NDN-IoT environments.Wang et al.stated that their construction was provably secure under various types of security attacks.Using theoretical analysis methods,in this work,we reveal that their CLAS design fails to meet unforgeability,a core security requirement for CLAS schemes.In particular,we demonstrate that their scheme is vulnerable to amalicious public-key replacement attack,enabling an adversary to produce authentic signatures for arbitrary fraudulent messages.Therefore,Wang et al.’s design cannot achieve its goal.To address the issue,we systematically examine the root causes behind the vulnerability and propose a security-enhanced CLAS construction for NDN-IoT environments.We prove the security ofour improveddesignunder the standard security assumptionandalsoanalyze its practicalperformanceby comparing the computational and communication costs with several related works.The comparison results show the practicality of our design. 展开更多
关键词 IOT certificateless signature public-key replacement attack data integrity AGGREGATION
在线阅读 下载PDF
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
15
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
A Robust Image Encryption Method Based on the Randomness Properties of DNA Nucleotides
16
作者 Bassam Al-Shargabi Mohammed Abbas Fadhil Al-Husainy +1 位作者 Abdelrahman Abuarqoub Omar Albahbouh Aldabbas 《Computers, Materials & Continua》 2026年第4期391-415,共25页
The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently... The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently,the protection of sensitive data has become increasingly critical.Regardless of the complexity of the encryption algorithm used,a robust and highly secure encryption key is essential,with randomness and key space being crucial factors.This paper proposes a new Robust Deoxyribonucleic Acid(RDNA)nucleotide-based encryption method.The RDNA encryption method leverages the unique properties of DNA nucleotides,including their inherent randomness and extensive key space,to generate a highly secure encryption key.By employing transposition and substitution operations,the RDNA method ensures significant diffusion and confusion in the encrypted images.Additionally,it utilises a pseudorandom generation technique based on the random sequence of nucleotides in the DNA secret key.The performance of the RDNA encryption method is evaluated through various statistical and visual tests,and compared against established encryption methods such as 3DES,AES,and a DNA-based method.Experimental results demonstrate that the RDNA encryption method outperforms its rivals in the literature,and achieves superior performance in terms of information entropy,avalanche effect,encryption execution time,and correlation reduction,while maintaining competitive values for NMAE,PSNR,NPCR,and UACI.The high degree of randomness and sensitivity to key changes inherent in the RDNA method offers enhanced security,making it highly resistant to brute force and differential attacks. 展开更多
关键词 Security analysis image protection randomness in cryptography DNA nucleotides DNA-based encryption
在线阅读 下载PDF
基于国产深度计算单元的SPHINCS^(+)-SM3高性能优化
17
作者 宁祎静 董建阔 +4 位作者 周思源 林璟锵 孙思维 郑昉昱 葛春鹏 《计算机研究与发展》 北大核心 2026年第2期405-418,共14页
数字签名在信息安全中扮演着至关重要的角色,但传统的数字签名算法在后量子时代面临失效的风险。SPHINCS^(+)作为一种能够抵抗量子计算攻击的数字签名框架,将在后量子时代发挥越来越重要的作用。然而,SPHINCS^(+)的计算速度较慢,难以满... 数字签名在信息安全中扮演着至关重要的角色,但传统的数字签名算法在后量子时代面临失效的风险。SPHINCS^(+)作为一种能够抵抗量子计算攻击的数字签名框架,将在后量子时代发挥越来越重要的作用。然而,SPHINCS^(+)的计算速度较慢,难以满足现代密码算法对于高吞吐量和低延时的需求,极大地限制了其实用性。提出了一种基于国产深度计算单元(deep computing unit,DCU)的高效优化方案,以加速由国产哈希算法SM3实例化的SPHINCS^(+)算法。通过提高内存拷贝效率、优化SM3、改进SPHINCS^(+)的计算流程以及采用最佳计算并行度,在DCU上实现了SPHINCS^(+)-SM3的128-f模式。实验结果表明,与传统CPU实现相比,DCU上的实现显著提高了签名生成和验证的吞吐量,分别达到了2603.87倍和1281.98倍的提升,极大地增强了SPHINCS^(+)的计算效率和实用性,并推进了后量子密码算法的国产化进程。在数据流量和大量签名请求的场景下,DCU实现展现出显著优于CPU实现的性能优势。 展开更多
关键词 SPHINCS^(+) SM3 后量子密码 并行计算 DCU加速
在线阅读 下载PDF
基于ChatGPT实现格密码与全同态加密
18
作者 陈智罡 宋新霞 CHEN Liqun 《计算机工程与应用》 北大核心 2026年第3期303-312,共10页
基于ChatGPT实现了环LWE上的格密码以及BFV全同态加密。这是使用ChatGPT来实现这两种加密算法。全同态加密曾经是密码学界的一个开放难题,有广泛的理论与实际应用。当前的全同态加密实现仍然面临挑战,尤其是在计算复杂度和计算效率上。C... 基于ChatGPT实现了环LWE上的格密码以及BFV全同态加密。这是使用ChatGPT来实现这两种加密算法。全同态加密曾经是密码学界的一个开放难题,有广泛的理论与实际应用。当前的全同态加密实现仍然面临挑战,尤其是在计算复杂度和计算效率上。ChatGPT能够根据用户的具体要求生成加密算法的源代码。然而,使用ChatGPT实现高度复杂的程序仍具有挑战性,尤其是全同态加密算法,其以复杂性著称。提出一种新颖的方法,从算法层次和代码层次来设计ChatGPT对格加密和全同态加密的实现方法。从算法层次来说,ChatGPT准确掌握了环LWE格加密算法,但是没有完全掌握BFV全同态加密算法。从代码层次来说,ChatGPT都能完整给出两种加密算法的C++实现代码,而且无需人工编写代码,但是都需要进一步调试和改错才能够正确运行。由于BFV全同态加密算法要比格加密算法复杂,因此所花费的调试工作更多。ChatGPT为实现密码算法提供了新思路,这方面值得进行深入而广泛的研究。该研究结果为ChatGPT在密码算法代码实现方面提供指南。 展开更多
关键词 ChatGPT 全同态加密 格密码 代码实现
在线阅读 下载PDF
一种基于商用密码的核电DCS过程监控层内生网络安全数据存储和传输设计
19
作者 邓泽凡 刘松 石桂连 《核动力工程》 北大核心 2026年第1期151-158,共8页
随着信息技术在关键基础设施核电数字化控制系统(DCS)中的进一步应用,在核电DCS起到操作监视和管理作用的过程监控层内生网络安全需求日益凸显。本文首先分析了核电DCS过程监控层的内生网络安全需求,并开展技术调研,以商用密码技术为基... 随着信息技术在关键基础设施核电数字化控制系统(DCS)中的进一步应用,在核电DCS起到操作监视和管理作用的过程监控层内生网络安全需求日益凸显。本文首先分析了核电DCS过程监控层的内生网络安全需求,并开展技术调研,以商用密码技术为基础,提出一种内生网络安全设计以实现关键数据存储和传输的完整性和机密性保护。该设计选用合适的商用密码算法和设备,开发存储安全组件和传输安全组件。在此基础上部署原型进行了性能验证。验证结果表明此设计实现了核电DCS过程监控层的数据存储和传输内生网络安全防护功能,满足原系统性能要求的同时对原系统性能影响较小。 展开更多
关键词 核电数字化控制系统(DCS) 商用密码 内生网络安全
原文传递
基于弹性秘密共享的多方部分洗牌协议
20
作者 张艳硕 满子琪 +2 位作者 周幸妤 杨亚涛 胡荣磊 《计算机工程与设计》 北大核心 2026年第2期452-458,共7页
为解决数据共享下隐私保护的问题,设计了一种基于弹性秘密共享的多方部分洗牌协议。针对现有研究效率低下及应用性不足等问题,将弹性秘密共享与洗牌协议相结合以增强协议的容错能力和抵抗合谋攻击的能力;同时设计了一种具备较高的效率... 为解决数据共享下隐私保护的问题,设计了一种基于弹性秘密共享的多方部分洗牌协议。针对现有研究效率低下及应用性不足等问题,将弹性秘密共享与洗牌协议相结合以增强协议的容错能力和抵抗合谋攻击的能力;同时设计了一种具备较高的效率和良好的适用性的部分洗牌协议。通过对该协议的正确性、安全性分析以及与现有文献的对比分析,该协议在满足安全性的前提下,展现出较优的运算效率和较低的资源消耗,为协议的推广应用提供了可行的途径。 展开更多
关键词 弹性秘密共享 洗牌协议 隐私保护 安全多方计算 秘密共享 密码学 安全协议
在线阅读 下载PDF
上一页 1 2 245 下一页 到第
使用帮助 返回顶部