期刊文献+
共找到643篇文章
< 1 2 33 >
每页显示 20 50 100
An Identity-Based Encryption Scheme with Compact Ciphertexts
1
作者 刘胜利 郭宝安 张庆胜 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期86-89,共4页
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key s... This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key system is that it can avoid public key certificates and certificate management. Our identity-based encryption scheme enjoys short ciphertexts and provable security against chosen-ciphertext attack (CCA). 展开更多
关键词 identity-based encryption compact ciphertext ehosen-ciphertext attack (CCA)
原文传递
A Fully Homomorphic Encryption Scheme Suitable for Ciphertext Retrieval
2
作者 Ronglei Hu ChuceHe +3 位作者 Sihui Liu Dong Yao Xiuying Li Xiaoyi Duan 《Computers, Materials & Continua》 2025年第7期937-956,共20页
Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To ... Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To address these problems,this paper proposes an enhanced Fully Homomorphic Encryption(FHE)algorithm based on an improved DGHV algorithm,coupled with an optimized ciphertext retrieval scheme.Our specific contributions are outlined as follows:First,we employ an authorization code to verify the user’s retrieval authority and perform hierarchical access control on cloud storage data.Second,a triple-key encryption mechanism,which separates the data encryption key,retrieval authorization key,and retrieval key,is designed.Different keys are provided to different entities to run corresponding system functions.The key separation architecture proves particularly advantageous in multi-verifier coexistence scenarios,environments involving untrusted third-party retrieval services.Finally,the enhanced DGHV-based retrieval mechanism extends conventional functionality by enabling multi-keyword queries with similarity-ranked results,thereby significantly improving both the functionality and usability of the FHE system. 展开更多
关键词 Cloud storage homomorphic encryption ciphertext retrieval identity authentication
在线阅读 下载PDF
基于密文混淆的不经意传输协议
3
作者 李晓东 朱晓鹏 +2 位作者 张健毅 吴庸 窦一萌 《计算机工程》 北大核心 2026年第1期293-302,共10页
不经意传输(OT)协议是一种保护隐私的两方通信协议,也是构建安全多方计算的重要模块。该协议通常基于RSA(Rivest—Shamir—Adleman)或DH(Diffie—Hellman)密码系统来交换对称密钥,在消息的加密阶段使用对称密钥进行加密。然而,在现有的O... 不经意传输(OT)协议是一种保护隐私的两方通信协议,也是构建安全多方计算的重要模块。该协议通常基于RSA(Rivest—Shamir—Adleman)或DH(Diffie—Hellman)密码系统来交换对称密钥,在消息的加密阶段使用对称密钥进行加密。然而,在现有的OT协议中,多对公私钥生成以及数据计算非常耗时。在同一密文域中,采用双射函数对密文进行变换,可以确保密文解密后的不可区分性,同时减少计算量。在半诚实模型上,提出一种基于密文混淆的OT协议框架,并在该框架下基于RSA和DH实例化OT协议。相较基于RSA的加密方案,所提协议只需要一对公私钥,同时,当公私钥减少为一对时,接收方可以利用发送方数字证书中的公钥,实现具有身份认证功能的OT协议。对比基于DH密钥交换的OT协议,该协议具有数据传输量小、计算复杂度低的优势。实验结果表明,与现有OT协议相比,实例化的协议在密钥交换阶段的效率至少可提高30%。此外,该协议还可以用于隐私集合求交、混淆电路和OT扩展协议中的基础协议。 展开更多
关键词 不经意传输 双射函数 密文混淆 身份认证 安全多方计算
在线阅读 下载PDF
面向长文本的通配符对称搜索加密方案
4
作者 张茜 王柳旭 +4 位作者 苏烨 杨海宁 李青茹 谷志斌 王长广 《河北师范大学学报(自然科学版)》 2026年第1期9-24,共16页
针对数据要素在生命周期使用过程中面临的安全检索问题,以能够准确描述多种数据类型的长文本为研究对象,聚焦对称加密场景下的长文本安全检索需求,围绕长文本密文搜索的问题建模、算法设计与安全模型构建等方面展开研究,设计了一种面向... 针对数据要素在生命周期使用过程中面临的安全检索问题,以能够准确描述多种数据类型的长文本为研究对象,聚焦对称加密场景下的长文本安全检索需求,围绕长文本密文搜索的问题建模、算法设计与安全模型构建等方面展开研究,设计了一种面向长文本的对称可搜索加密方案.针对长文本数据字符规模大、字符空间固定和位置特征显著等特点,提出了粒子化搜索思想,并构建了相应的实例化位图索引结构,进而设计出支持任意通配符的长文本密文搜索方案.该方案在基于模拟的框架下被证明满足L-适应性安全.为进一步评估方案的实际效率,首先在理论上与多个现有方案在存储、计算和通信开销方面进行了对比分析,证明了所提方案在理论上的高效性,进一步地,通过实验将所提方案与明文基线方案进行性能对比.结果表明,所提方案的索引构建时间约为基线方案的100倍,而搜索时间与基线方案处于同一量级,验证了方案在搜索阶段的实用性与高效性. 展开更多
关键词 可搜索加密 对称可搜索加密 通配符可搜索加密 适应性安全 长文本密文搜索
在线阅读 下载PDF
基于RSA同态加密的联邦学习隐私保护方案
5
作者 管桂林 蔡惠民 +4 位作者 支婷 曹扬 丁洪鑫 黄江 代杨 《电子科技》 2026年第2期96-104,共9页
针对现有联邦学习安全聚合方案存在梯度信息泄露、参与方计算开销较大以及缺乏对模型的完整性保护等问题,文中提出一种基于RSA(Rivest-Shamir-Adleman)同态加密的联邦学习隐私保护方案。采用构建高效且安全的RSA同态加密算法解决梯度数... 针对现有联邦学习安全聚合方案存在梯度信息泄露、参与方计算开销较大以及缺乏对模型的完整性保护等问题,文中提出一种基于RSA(Rivest-Shamir-Adleman)同态加密的联邦学习隐私保护方案。采用构建高效且安全的RSA同态加密算法解决梯度数据泄露问题,利用中央服务器实现解密计算以降低参与方的计算开销。基于区块链的不可篡改性、存证保护等特性将数据训练过程中关键数据进行上链存证,实现对模型数据的全生命周期维护。通过安全性分析可知,所提方案具有抗合谋攻击以及密文不可区分性。由性能以及效率方面分析对比结果可知,所提方案较传统方案具有一定优势。 展开更多
关键词 联邦学习 隐私保护 同态加密 区块链 RSA 安全聚合 存证保护 密文不可去分性
在线阅读 下载PDF
Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing 被引量:16
6
作者 CHEN Yanli SONG Lingling YANG Geng 《China Communications》 SCIE CSCD 2016年第2期146-162,共17页
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an... In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations. 展开更多
关键词 cloud computing attribute-basedencryption access control multi-authority constant ciphertext length attribute revocation
在线阅读 下载PDF
An Improved Ciphertext Retrieval Scheme Based on Fully Homomorphic Encryption 被引量:1
7
作者 LI Xinyan MOU Huajian LU Dianjun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第3期218-222,共5页
In order to guarantee the user's privacy and the integrity of data when retrieving ciphertext in an untrusted cloud environment, an improved ciphertext retrieval scheme was proposed based on full homomorphic encry... In order to guarantee the user's privacy and the integrity of data when retrieving ciphertext in an untrusted cloud environment, an improved ciphertext retrieval scheme was proposed based on full homomorphic encryption. This scheme can encrypt two bits one time and improve the efficiency of retrieval. Moreover, it has small key space and reduces the storage space. Meanwhile, the homomorphic property of this scheme was proved in detail. The experimental results and comparisons show that the proposed scheme is characterized by increased security, high efficiency and low cost. 展开更多
关键词 fully homomorphic ENCRYPTION PUBLIC key size the GREATEST common divisor(GCD) problem ciphertext RETRIEVAL
原文传递
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model 被引量:1
8
作者 孙瑾 胡予濮 张乐友 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第6期672-676,共5页
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chos... To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained simultaneously.The reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable assumption.So the security level is improved,and it is suitable for higher security environment. 展开更多
关键词 the standard model provably secure broadcast encryption the chosen ciphertext security the self-adaptive chosen identity security
原文传递
The Cloud Storage Ciphertext Retrieval Scheme Based on ORAM 被引量:1
9
作者 SONG Ningning SUN Yan 《China Communications》 SCIE CSCD 2014年第A02期156-165,共10页
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi... Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level. 展开更多
关键词 cloud storage ciphertext retrieval scheme ORAM index map
在线阅读 下载PDF
Ciphertext-Policy Attribute-Based Encryption for General Circuits from Bilinear Maps 被引量:2
10
作者 HU Peng GAO Haiying 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期171-177,共7页
In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficien... In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficient than multilinear maps. Our scheme uses a top-down secret sharing and FANOUT gate to resist the "backtracking attack" which is the main barrier expending access tree to general circuit. In the standard model, selective security of our scheme is proved. Comparing with current scheme for general circuits from bilinear maps, our work is more efficient. 展开更多
关键词 ciphertext-policy attribute-based encryption general circuits bilinear maps selective security
原文传递
Broadcast group-oriented encryption secure against chosen ciphertext attack
11
作者 Ma Chunbo Ao Jun Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期811-817,共7页
A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in... A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in the designated group has the ability to independently decrypt a ciphertext. In contrast to traditional broadcast encryption, all the valid receivers in the proposed scheme compose the designated group. To take advantage of this property, a tab for the group is set and the matching private key for each member is generated. In addition, before decrypting a ciphertext, anyone in the scheme can verify the ciphertext, to ensure that the ciphertext is correct. This property is very important for large-scale group communication, as the gateway can filter incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given, to show that the proposed scheme is secure against the adaptively chosen ciphertext attack. 展开更多
关键词 BROADCAST group-oriented encryption chosen ciphertext attack public verification
在线阅读 下载PDF
A Practical Approach to Attaining Chosen Ciphertext Security
12
作者 LI Jun CUI Guohua YANG Muxiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1601-1604,共4页
Strong security in public key cryptography is not enongh; the encryption has to be achieved in an efficient way. OAEP or SAEP is only suitable for special applications (e. g. key transport), and securely transportin... Strong security in public key cryptography is not enongh; the encryption has to be achieved in an efficient way. OAEP or SAEP is only suitable for special applications (e. g. key transport), and securely transporting message of any length is a challenge. Motivated by the hybrid encryption, we present a practical approach to achieve the (adaptively) chosen eiphertext security. The time cost of encryption/decryption of proposed scheme is similar to OAEP and the bandwidth of message recovery is 92% for standard security parameter, while RSA-OAEP is 84%. The scheme is also provably secure against adaptively chosen ciphertext attacks in the random oracle model. We conclude that the approach is practical in more extensive application. 展开更多
关键词 public-key encryption chosen ciphertext security random oracle model bandwidth of message recovery
在线阅读 下载PDF
Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
13
作者 Hyun Sook Rhee 《Computers, Materials & Continua》 SCIE EI 2022年第10期69-85,共17页
As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage... As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage,the data to be stored needs to be encrypted for this reason.Since“searchable encryption”is enable to search on the encrypted data without any decryption,it is one of convenient solutions for secure data management.A public key encryption with keyword search(for short,PEKS)is one of searchable encryptions.Abdalla et al.firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the“robust”ANO-CCA secure identity-based encryption(IBE).In this paper,we propose two generic constructions of consistent IND-CCA secure PEKS combining(1)a hierarchical identity based encryption(for short,HIBE)and a signature scheme or(2)a HIBE,an encapsulation,and a message authentication code(for short,MAC)scheme.Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker“ANO-CPA security(resp.,IND-CPA security)”of HIBE than“ANOCCA security(resp.,IND-CCA security)”of IBE required in for achieving IND-CCA secure(resp.,consistent)PEKS.Finally,we prove that our generic constructions satisfy IND-CCA security and consistency under the security models. 展开更多
关键词 Searchable encryption public-key encryption with keyword search chosen ciphertext security data privacy
在线阅读 下载PDF
Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
14
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1079-1092,共14页
The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t... The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of their data when the data is outsourced to the cloud.Therefore,access control mechanisms will become a significant challenging problem.The Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is an essential solution in which the user can control data access.CP-ABE encrypts the data under a limited access policy after the user sets some access policies.The user can decrypt the data if they satisfy the limited access policy.Although CP-ABE is an effective access control program,the privacy of the policy might be compromised by the attackers.Namely,the attackers can gather important information from plain text policy.To address this issue,the SHA-512 algorithm is presented to create a hash code for the user’s attributes in this paper.Depending on the created hash codes,an access policy will be formed.It leads to protecting the access policy against attacks.The effectiveness of the proposed scheme is assessed based on decryption time,private key generation time,ciphertext generation time,and data verification time. 展开更多
关键词 Cloud computing access policy CP-ABE hash code SHA-512 ATTRIBUTE ciphertext encryption DECRYPTION
在线阅读 下载PDF
The Gap between Intractable Problem and Adaptive Chosen Ciphertext Security
15
作者 路献辉 来学嘉 何大可 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期90-93,共4页
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a... To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security are studied. This paper points out that the construction of IND-CCA2 secure schemes is essentially to bridge these gaps. These gaps are categorized, analyzed and measured. Finally the methods to bridge these gaps are described. This explains the existing design approaches and gives an intuition about the difficulty of designing IND-CCA2 secure public key encryption schemes based on different types of assumptions. 展开更多
关键词 public key encryption adaptive chosen ciphertext security intractable vroblem
原文传递
Novel dynamic anti-collusion ciphertext policy attribute-based encryption scheme in 5G D2D environment
16
作者 Xu Xiangjie Jiang Rui 《Journal of Southeast University(English Edition)》 EI CAS 2021年第3期251-257,共7页
To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption... To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE)scheme in the 5G D2D environment is proposed.On the basis of the ciphertext policy attribute-based encryption algorithm,fine-grained access control and secure attribute revocation are realized,and the confidentiality of data is guaranteed.A polynomial function is adopted in the ciphertext generation phase to realize dynamic user management.A random number is used to prevent a collusion attack among the legitimate user equipment(UE),revoked UE,and external network attackers.Finally,on the basis of the Diffie-Hellman problem,the NDA-CP-ABE scheme is formally proved,and the simulation performances are compared with those of similar schemes.The results show that data can be securely shared through a D2D channel with secure attribute revocation,anti-collusion,and dynamic user management.Moreover,compared with similar schemes,the NDA-CP-ABE scheme has higher efficiency in encryption,decryption,and storage. 展开更多
关键词 device-to-device(D2D) attribute revocation user management dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE) access control
在线阅读 下载PDF
轻量级密码TweGIFT的中间相错统计故障分析研究
17
作者 李玮 刘源 +2 位作者 谷大武 黄佳音 陆海宁 《计算机学报》 北大核心 2025年第7期1696-1713,共18页
TweGIFT算法是Chakraborti等学者于2021年提出的轻量级可调分组密码算法,旨在保护智慧城市、智能制造、智联农业等领域中物联网设备的数据安全。本文基于唯密文基本假设,采取随机半字节故障,提出了一种新型唯密文故障分析方法,即中间相... TweGIFT算法是Chakraborti等学者于2021年提出的轻量级可调分组密码算法,旨在保护智慧城市、智能制造、智联农业等领域中物联网设备的数据安全。本文基于唯密文基本假设,采取随机半字节故障,提出了一种新型唯密文故障分析方法,即中间相错统计故障分析。该方法基于中间相错策略和统计故障分析,通过随机注入半字节故障,获取故障密文并进行统计学分析,设计余弦距离-汉明重量(COS-HW)和余弦距离-极大似然估计(COS-MLE)两种新型区分器,最少以184个故障破译TweGIFT算法全部版本的128比特主密钥。相较于传统统计故障分析和经典的平方欧氏距离、汉明重量、极大似然估计以及Wasserstein距离-极大似然估计区分器,本文提出的中间相错统计故障分析,使故障注入轮数更深一轮,两种新型区分器COS-HW、COS-MLE,使所需故障数减少77.77%,成功率达到99%以上。该结果聚焦于新型唯密文分析,有助于推动轻量级密码算法的进一步研究。 展开更多
关键词 轻量级密码 TweGIFT 中间相错策略 统计故障分析 唯密文故障分析
在线阅读 下载PDF
基于Paillier同态加密的隐私保护排序方案
18
作者 王后珍 江皓朗 +1 位作者 刘继辰 涂航 《信息网络安全》 北大核心 2025年第12期1975-1989,共15页
在大数据时代背景下,数据共享已成为释放数据潜力、提升业务价值的关键途径。金融机构通过与通信运营商合作,对用户的通信数据进行联合建模与分析,可提升其在精准营销、欺诈检测及风险管理方面的能力。然而,如何在数据共享过程中保护用... 在大数据时代背景下,数据共享已成为释放数据潜力、提升业务价值的关键途径。金融机构通过与通信运营商合作,对用户的通信数据进行联合建模与分析,可提升其在精准营销、欺诈检测及风险管理方面的能力。然而,如何在数据共享过程中保护用户隐私是一个亟待解决的问题。文章提出一种基于Paillier同态加密的隐私保护排序方案,并对其正确性和安全性进行了证明。该方案不仅支持密文下的加权求和运算,还支持高效的密文排序,从而实现了共享数据的可用不可见。与现有方案相比,该方案在密文排序效率方面更具优势,适用于大规模的隐私数据保护排序场景。此外,文章以银行优质客户推荐应用场景为例,通过仿真实验验证了方案的正确性与可用性。 展开更多
关键词 Paillier加密算法 同态加密 密文排序 隐私保护 安全多方计算
在线阅读 下载PDF
面向无线传感网络深度防御的密文数据去重方法
19
作者 高俊杰 杨帆 《传感技术学报》 北大核心 2025年第10期1886-1891,共6页
无线传感网络中,重复的密文数据在传输和存储过程中会增加网络负荷和资源消耗,降低网络性能。因此提出了一种面向无线传感网络深度防御的密文数据去重方法,首先利用压缩感知方法采集无线传感网络中的密文数据;其次将密文数据映射到特征... 无线传感网络中,重复的密文数据在传输和存储过程中会增加网络负荷和资源消耗,降低网络性能。因此提出了一种面向无线传感网络深度防御的密文数据去重方法,首先利用压缩感知方法采集无线传感网络中的密文数据;其次将密文数据映射到特征空间,获取密文数据特征;基于特征属性的动态权值计算密文数据特征间的相似度,通过相似度计算实现重复数据的去除。仿真结果表明,随着数据去重时间的增长,所提方法的网络剩余能量可达到85%以上,网络吞吐量可达3.5Mb/s以上,且网络空间压缩率可达60%以上,表明所提方法的密文数据去重效率高,可以实现无线传感网络的深度防御。 展开更多
关键词 无线传感网络 密文数据去重 网络防御 压缩感知方法 相似度计算
在线阅读 下载PDF
基于语义标注和随机性密文的光纤传感通信信息加密
20
作者 边璐 段永刚 《传感技术学报》 北大核心 2025年第12期2206-2211,共6页
由于光纤传感网络拓扑的复杂性、设备的多样性和分布范围的广泛性,未经加密的数据在传输过程中容易被截获,降低光纤传感网络的安全性。为此,研究光纤传感通信信息加密方法。通过语义标注方式描述光纤传感通信信息,建立标准光纤传感通信... 由于光纤传感网络拓扑的复杂性、设备的多样性和分布范围的广泛性,未经加密的数据在传输过程中容易被截获,降低光纤传感网络的安全性。为此,研究光纤传感通信信息加密方法。通过语义标注方式描述光纤传感通信信息,建立标准光纤传感通信信息数据集。采用概率算法处理光纤传感信息数据集,以公钥加密方案生成随机性加密密文。基于深度学习构建目标函数,在数据高速传输的过程中,快速加密光纤传感通信信息,提高光纤传感网络的安全性。仿真结果表明:对于大规模的光纤传感通信信息,所提方法的加速比都在8以上,平均自相关系数差值从0.18逐步下降到0.07,具有较强的抗破解能力。 展开更多
关键词 光纤传感通信 信息加密 语义标注 随机性密文 深度学习
在线阅读 下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部