期刊文献+
共找到4,835篇文章
< 1 2 242 >
每页显示 20 50 100
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
1
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
在线阅读 下载PDF
A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation 被引量:1
2
作者 Yong-Woon Hwang Im-Yeong Lee 《Computers, Materials & Continua》 SCIE EI 2021年第11期1747-1764,共18页
Recently,with the advancement of Information and Communications Technology(ICT),Internet of Things(IoT)has been connected to the cloud and used in industrial sectors,medical environments,and smart grids.However,if dat... Recently,with the advancement of Information and Communications Technology(ICT),Internet of Things(IoT)has been connected to the cloud and used in industrial sectors,medical environments,and smart grids.However,if data is transmitted in plain text when collecting data in an IoTcloud environment,it can be exposed to various security threats such as replay attacks and data forgery.Thus,digital signatures are required.Data integrity is ensured when a user(or a device)transmits data using a signature.In addition,the concept of data aggregation is important to efficiently collect data transmitted from multiple users(or a devices)in an industrial IoT environment.However,signatures based on pairing during aggregation compromise efficiency as the number of signatories increases.Aggregate signature methods(e.g.,identity-based and certificateless cryptography)have been studied.Both methods pose key escrow and key distribution problems.In order to solve these problems,the use of aggregate signatures in certificate-based cryptography is being studied,and studies to satisfy the prevention of forgery of signatures and other security problems are being conducted.In this paper,we propose a new lightweight signature scheme that uses a certificate-based aggregate signature and can generate and verify signed messages from IoT devices in an IoT-cloud environment.In this proposed method,by providing key insulation,security threats that occur when keys are exposed due to physical attacks such as side channels can be solved.This can be applied to create an environment in which data is collected safely and efficiently in IoT-cloud is environments. 展开更多
关键词 Internet of things certificate-based aggregate signature key insulation cloud LIGHTWEIGHT physical attack
在线阅读 下载PDF
Sine-Polynomial Chaotic Map(SPCM):A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks
3
作者 David S.Bhatti Annas W.Malik +1 位作者 Haeung Choi Ki-Il Kim 《Computers, Materials & Continua》 2025年第10期2157-2177,共21页
Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a n... Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions,leveraging a piecewise function to achieve a broad chaotic range()and a high Lyapunov exponent(5.04).Validated through nine benchmarks,including standard randomness tests,Diehard tests,and Shannon entropy(3.883),SPCM demonstrates superior randomness and high sensitivity to initial conditions.Applied to image encryption,SPCM achieves 0.152582 s(39%faster than some techniques)and 433.42 KB/s throughput(134%higher than some techniques),setting new benchmarks for chaotic map-based methods in WSNs.Chaos-based permutation and exclusive or(XOR)diffusion yield near-zero correlation in encrypted images,ensuring strong resistance to Statistical Attacks(SA)and accurate recovery.SPCM also exhibits a strong avalanche effect(bit difference),making it an efficient,secure solution for WSNs in domains like healthcare and smart cities. 展开更多
关键词 Chaos theory chaotic system image encryption cryptography wireless sensor networks(WSNs)
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
4
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
5
作者 I.Nasurulla K.Hemalatha +1 位作者 P.Ramachandran S.Parvathi 《Journal of Harbin Institute of Technology(New Series)》 2025年第2期90-104,共15页
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we... Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we propose SecureCons Framework(SCF),a novel consensus-based cryptographic framework designed to enhance resilience against SCAs in cloud environments.SCF integrates a dual-layer approach combining lightweight cryptographic algorithms with a blockchain-inspired consensus mechanism to secure data exchanges and thwart potential side-channel exploits.The framework includes adaptive anomaly detection models,cryptographic obfuscation techniques,and real-time monitoring to identify and mitigate vulnerabilities proactively.Experimental evaluations demonstrate the framework's robustness,achieving over 95%resilience against advanced SCAs with minimal computational overhead.SCF provides a scalable,secure,and efficient solution,setting a new benchmark for side-channel attack mitigation in cloud ecosystems. 展开更多
关键词 Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography
在线阅读 下载PDF
探索整数格的拓扑图编码实现
6
作者 张明军 张玉婧 +1 位作者 张小慧 姚兵 《浙江大学学报(理学版)》 北大核心 2026年第1期47-56,62,共11页
在后量子时代,格密码具有多学科交叉性且研究方法多样性的特点,极有可能成为后量子密码。拓扑编码中的图格是多学科交叉的产物,其中的图通过矩阵进行存储并在计算机中运行,其主要理论来自离散数学、数论、代数学等数学学科。由于拓扑编... 在后量子时代,格密码具有多学科交叉性且研究方法多样性的特点,极有可能成为后量子密码。拓扑编码中的图格是多学科交叉的产物,其中的图通过矩阵进行存储并在计算机中运行,其主要理论来自离散数学、数论、代数学等数学学科。由于拓扑编码含有大量的数学猜想和计算NP-问题,因此其产生的数字串具有不可逆性和计算安全性。本文定义了新的标号和着色,并给出了实现这些标号和着色的算法,确定了承认这几种标号和着色的图类。同时,建立了毛毛虫树图格及其互补图格,探讨了这些图格与传统的整数格之间的关系。所用技术方法均基于有效且可行的算法实现。 展开更多
关键词 格密码 拓扑编码 全标号 全着色 图格 着色图格同态 非对称拓扑加密
在线阅读 下载PDF
Public Key Cryptography Based on Ergodic Matrices over Finite Field 被引量:8
7
作者 PEI Shihui ZHAO Hongwei ZHAO Yongzhe 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1525-1528,共4页
A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over fini... A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can't be solved with polynomial time algorithm. 展开更多
关键词 ergodic matrix strong matrix public key cryptography
在线阅读 下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
8
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
在线阅读 下载PDF
Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability 被引量:3
9
作者 张盛 王剑 唐朝京 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期33-40,共8页
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-sp... Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency. 展开更多
关键词 quantum cryptography quantum counterfactuality quantum information
原文传递
RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography 被引量:1
10
作者 K.Shankar P.Eswaran 《China Communications》 SCIE CSCD 2017年第2期118-130,共13页
In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual ... In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual secret sharing scheme is to encrypt a secret image into n illogical share images. It is unable to reveal any data on the original image if at least one of the shares is not achieved. The original image, in fact, is realized by overlapping the entire shares directly, in order that the human visual system is competent to identify the collective secret image without employing any complicated computational tools. Therefore, they are communicated steadily as number of shares. The elliptic curve cryptography approach, in turn, is employed to augment the privacy and safety of the image. The new.fangled technique is utilized to generate the multiple shares which are subjected to encryption and decryption by means of the elliptic curve cryptography technique. The test outcomes have revealed the fact that the peak signal to noise ratio is 58.0025, Mean square error value is 0.1164 and the correlation coefficient is 1 for the decrypted image without any sort of distortion of the original image. 展开更多
关键词 visual cryptography PIXEL SHARES elliptic curve cryptography ENCRYPTION PSNR mean square error
在线阅读 下载PDF
Quantum Cryptography for Internet of Things Security 被引量:1
11
作者 Alekha Parimal Bhatt Anand Sharma 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第3期213-220,共8页
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security thr... Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security. 展开更多
关键词 INTERNET of THINGS QUANTUM COMPUTING QUANTUM cryptography SECURITY
在线阅读 下载PDF
Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems 被引量:9
12
作者 Srinath Doss Jothi Paranthaman +5 位作者 Suseendran Gopalakrishnan Akila Duraisamy Souvik Pal Balaganesh Duraisamy Chung Le Van Dac-Nhuong Le 《Computers, Materials & Continua》 SCIE EI 2021年第2期1577-1594,共18页
In the healthcare system,the Internet of Things(IoT)based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medica... In the healthcare system,the Internet of Things(IoT)based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests.This datum is sensitive,and hence security is a must in transforming the sensational contents.In this paper,an Evolutionary Algorithm,namely the Memetic Algorithm is used for encrypting the text messages.The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels.The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the encoded letter.To show its precision,equivalent to five RGB images and five Grayscale images are used to test the proposed algorithm.The results of the proposed algorithm were analyzed using statistical methods,and the proposed algorithm showed the importance of data transfer in healthcare systems in a stable environment.In the future,to embed the privacy-preserving of medical data,it can be extended with blockchain technology. 展开更多
关键词 Internet of Things medical images cryptography memetic algorithm STEGANOGRAPHY
在线阅读 下载PDF
A Visual Cryptography Based Digital Image Copyright Protection 被引量:6
13
作者 Adel Hammad Abusitta 《Journal of Information Security》 2012年第2期96-104,共9页
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selec... A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image. 展开更多
关键词 IMAGE WATERMARK PATTERN Visual cryptography Digital IMAGE COPYRIGHT
在线阅读 下载PDF
Construction of General (k, n) Probabilistic Visual Cryptography Scheme 被引量:1
14
作者 Ching-Nung Yang Chih-Cheng Wu Feng Liu 《Journal of Electronic Science and Technology》 CAS 2011年第4期317-324,共8页
Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS... Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS) and the probabilistie VCS (PVCS). For the DVCS, we use m (known as the pixel expansion) subpixels to represent a secret pixel. The PVCS uses only one subpixel to represent a secret pixel, while the quality of reconstructed image is degraded. A well-known construction of (k, n)-PVCS is obtained from the (k, n)-DVCS. In this paper, we show another construction of (k, n)-PVCS by extending the (k, k)-PVCS. 展开更多
关键词 Probabilistic visual cryptography visual cryptography visual secret sharing.
在线阅读 下载PDF
A New Fast Modular Arithmetic Method in Public Key Cryptography 被引量:1
15
作者 WANG Bangju ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1645-1648,共4页
Modular arithmetic is a fundamental operation and plays an important role in public key cryptosystem. A new method and its theory evidence on the basis of modular arithmetic with large integer modulus-changeable modul... Modular arithmetic is a fundamental operation and plays an important role in public key cryptosystem. A new method and its theory evidence on the basis of modular arithmetic with large integer modulus-changeable modulus algorithm is proposed to improve the speed of the modular arithmetic in the presented paper. For changeable modulus algorithm, when modular computation of modulo n is difficult, it can be realized by computation of modulo n-1 and n-2 on the perquisite of easy modular computations of modulo n-1 and modulo n-2. The conclusion is that the new method is better than the direct method by computing the modular arithmetic operation with large modulus. Especially, when computations of modulo n-1 and modulo n-2 are easy and computation of modulo n is difficult, this new method will be faster and has more advantages than other algorithms on modular arithmetic. Lastly, it is suggested that the proposed method be applied in public key cryptography based on modular multiplication and modular exponentiation with large integer modulus effectively 展开更多
关键词 public key cryptography modular arithmetic modular multiplication modular exponentiation
在线阅读 下载PDF
Quantum Cryptography via Satellite 被引量:2
16
作者 Mitch Leslie 《Engineering》 SCIE EI 2019年第3期353-354,共2页
As it circled the Earth one night in 2017, the Chinese satellite Mozi, also called Micius, aimed a laser at a ground station in northeastern China (Fig. 1). Then, as it traveled toward Europe and into range, it direct... As it circled the Earth one night in 2017, the Chinese satellite Mozi, also called Micius, aimed a laser at a ground station in northeastern China (Fig. 1). Then, as it traveled toward Europe and into range, it directed a beam at a different receiver in Austria. These transmissions, delivered to sites 7600 km apart, were noteworthy because they marked the first time a satellite had relayed secret quantum keys for decrypting and viewing messages. With the keys, scientists in China and Austria were able to exchange and decipher encrypted images. And on 29 September 2017, the researchers used the system to set up an encrypted 75-minute video conference between members of the Chinese Academy of Sciences in Beijing and their counterparts at the Austrian Academy of Sciences in Vienna [1]. 展开更多
关键词 QUANTUM cryptography SATELLITE
在线阅读 下载PDF
Dual Visual Cryptography Using the Interference Color of Birefringent Material 被引量:1
17
作者 Huangyi Qin Toshiki Matsusaki +1 位作者 Yusuke Momoi Kenji Harada 《Journal of Software Engineering and Applications》 2017年第8期754-763,共10页
Visual cryptography is a method of encrypting an image into several encrypted images. Conventional visual cryptography can display only monochrome images. We previously proposed a color visual cryptography method that... Visual cryptography is a method of encrypting an image into several encrypted images. Conventional visual cryptography can display only monochrome images. We previously proposed a color visual cryptography method that uses the interference color of high-order retarder films and encrypts one secret image into two encrypted images. In other words, this method can only encrypt one image at a time. In this paper, we propose a new method that encrypts two color images using interference color. 展开更多
关键词 VISUAL cryptography POLARIZER INTERFERENCE COLOR Birefringent Material
在线阅读 下载PDF
Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography 被引量:2
18
作者 Lein Harn Changlu Lin 《International Journal of Communications, Network and System Sciences》 2014年第1期22-29,共8页
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor... In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well. 展开更多
关键词 Shamir’s(t n)Secret Sharing Scheme SECRET RECONSTRUCTION THRESHOLD cryptography THRESHOLD DECRYPTION ASYNCHRONOUS Networks
暂未订购
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks 被引量:1
19
作者 Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita 《Digital Communications and Networks》 SCIE CSCD 2024年第4期989-1000,共12页
The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to secur... The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment. 展开更多
关键词 Internet of things AUTHENTICATION Post-quantum cryptography Lattice-based cryptography Cloud computing Fog computing FAIL-SAFE
在线阅读 下载PDF
A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes 被引量:2
20
作者 Rola I. Al-Khalid Randa A. Al-Dallah +2 位作者 Aseel M. Al-Anani Raghad M. Barham Salam I. Hajir 《Journal of Software Engineering and Applications》 2017年第1期1-10,共10页
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptogra... Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed. In this paper we proposed a method that is based on the concept of visual cryptography for color images and without any pixel expansion which requires less space. The proposed method is used to encrypt halftone color images by generating two shares, random and key shares which are the same size as the secret color image. The two shares are generated based on a private key. At the receiving side, the secret color image is revealed by stacking the two shares and exploiting the human vision system. In this paper, we produce an enhanced form of the proposed method by modifying the encryption technique used to generate the random and the key shares. Experimental results have shown that the proposed and the enhanced methods suggest an efficient way to encrypt a secret color image with better level of security, less storage space, less time of computation and with a better value of PSNR. 展开更多
关键词 Visual cryptography (VC) HALFTONE Color Images Pixel Expansion PSNR PRIVATE Key
在线阅读 下载PDF
上一页 1 2 242 下一页 到第
使用帮助 返回顶部