期刊文献+
共找到4,884篇文章
< 1 2 245 >
每页显示 20 50 100
Performance Evaluation of TLS1.3 Based on Post-Quantum Cryptography
1
作者 SONG Zhen-Yu ZHENG Jie-Yu ZHAO Yun-Lei 《密码学报(中英文)》 北大核心 2026年第1期199-218,共20页
Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computat... Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computational overhead may result in a significant performance reduction compared with conventional TLS.In this paper,we present a systematic evaluation of PQ-TLS performance across diverse deployment scenarios to address the following critical research questions.(1)What is the performance behavior of PQ-TLS across different TLS modes?(2)How does PQ-TLS perform across varying client scales?(3)Which network topology is most suitable for PQ-TLS?(4)How does PQ-TLS perform on personal computers(PCs)compared to embedded IoT devices?To the best of our knowledge,this is the first work to comprehensively address these issues,offering implementers some insights into PQ-TLS performance and guidance for optimizing it across diverse scenarios. 展开更多
关键词 quantum security post-quantum cryptography transport layer security network emulation Internet measurement
在线阅读 下载PDF
格上基于零知识证明的可追踪环签名方案
2
作者 孟慧 桑梓鑫 +1 位作者 汤永利 闫玺玺 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期49-57,共9页
针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒... 针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒绝采样算法和追踪机制设计了一种可追踪环签名方案,签名算法中使用递归算法压缩了承诺的大小,进一步降低了签名尺寸,在随机预言机模型下证明方案满足可链接性、匿名性和抗陷害性。性能分析表明,签名尺寸与环成员数量为对数大小关系,在环成员数量较多时,公钥的存储开销和签名的通信开销具有明显优势。 展开更多
关键词 环签名 递归 格密码 零知识证明
在线阅读 下载PDF
智能汽车基础地图众源更新安全合规技术探讨
3
作者 马照亭 章炜 +4 位作者 马小龙 方驰宇 潘忠凯 赵占杰 赵永坤 《测绘地理信息》 2026年第2期34-40,共7页
众源更新是当前阶段保持智能汽车基础地图动态更新的必要、可行手段,但其在安全合规方面一直没有得到充分认可。本文在分析众源更新模式下可能存在的安全风险基础上,设计了融合地理信息保密处理和商用密码技术的智能汽车基础地图众源更... 众源更新是当前阶段保持智能汽车基础地图动态更新的必要、可行手段,但其在安全合规方面一直没有得到充分认可。本文在分析众源更新模式下可能存在的安全风险基础上,设计了融合地理信息保密处理和商用密码技术的智能汽车基础地图众源更新安全合规技术框架,研究了车端测绘装备及云端地图平台可信身份核验、地理围栏白名单可控范围汇聚、车端坐标与敏感内容安全处理和车云数据流转监控等关键技术。实践与分析表明,本技术框架符合现行相关法律法规,可在保障地理信息安全的前提下满足智能汽车基础地图动态更新的迫切需求,为主管部门认可、规范智能汽车基础地图众源更新模式奠定了技术基础。 展开更多
关键词 智能汽车 众源更新 地理信息安全 商用密码
原文传递
产教协同视域下密码学课程OBE重构及效果实证
4
作者 杨恒伏 周聪 《计算机时代》 2026年第4期91-95,共5页
针对新工科背景下密码学课程与产业脱节、能力培养模糊的问题,本文研究以校企联合调研为基础,剖析教学短板,提取“卓越密码工程师”核心能力维度,融合行业认证标准与OBE理念,构建可量化、可落地的课程目标体系。通过引入整数规划模型设... 针对新工科背景下密码学课程与产业脱节、能力培养模糊的问题,本文研究以校企联合调研为基础,剖析教学短板,提取“卓越密码工程师”核心能力维度,融合行业认证标准与OBE理念,构建可量化、可落地的课程目标体系。通过引入整数规划模型设计课程结构,兼顾能力覆盖、产业动态变化与高校教学实际,优化课程内容、学时与产教融合模式。课程按“基础—核心—实战”三阶段设置,贯穿三年学习周期。准实验研究与测评结果表明,重构后的课程显著提升了学生的密码工程实践能力、知识综合运用能力与就业竞争力,为同类工科专业课程改革提供了可借鉴的示范路径。 展开更多
关键词 OBE理念 密码学课程 新工科 整数规划模型
在线阅读 下载PDF
OFD版式文档体系在智慧医疗中的创新应用与优化路径探讨
5
作者 张晓东 杨丰华 《中国数字医学》 2026年第2期66-71,共6页
探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出... 探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出优化策略,并展望未来发展前景。 展开更多
关键词 智慧医疗 OFD版式文档 国密算法
在线阅读 下载PDF
针对格密码算法Kyber与Dilithium的能耗侧信道防护技术
6
作者 李延斌 郭奕康 +3 位作者 张舒琪 唐明 葛春鹏 徐秋亮 《计算机学报》 北大核心 2026年第4期952-978,共27页
随着量子计算技术的迅猛发展,传统公钥密码体系面临重大安全威胁,后量子密码(PQC)成为新一代密码标准化的核心方向。美国国家标准与技术研究院(NIST)于2024年将基于模块化格上学习问题的Kyber算法和Dilithium算法分别确立为FIPS203密钥... 随着量子计算技术的迅猛发展,传统公钥密码体系面临重大安全威胁,后量子密码(PQC)成为新一代密码标准化的核心方向。美国国家标准与技术研究院(NIST)于2024年将基于模块化格上学习问题的Kyber算法和Dilithium算法分别确立为FIPS203密钥封装机制标准和FIPS204数字签名算法标准。在后量子密码的过渡过程中,实际环境中的物理安全性也逐渐被关注。格密码特有的多项式环运算、数论变换、消息编解码、边界检查、FO变换等操作导致其能耗侧信道泄露模式与传统密码存在显著差异,格密码泄露面广、算子种类多、运算复杂等特点对防护实现带来了巨大挑战。本文重点以Kyber和Dilithium为研究对象,系统梳理其侧信道脆弱点与防护目标,并对现有防护技术进行深入分析与评估:(1)揭示格密码侧信道攻击的脆弱性分布,进行泄露机理分析,归纳关键泄露点;(2)提出涵盖不同脆弱点的整体防护架构,对算子(如NTT、编解码等)的防护思路、实现难点进行分析,构建覆盖Kyber与Dilithium的防护全景图;(3)从设计思想、实现代价及优化方向评估现有方案,对防护方案给出实现建议,指出开销瓶颈与未来挑战。本研究为格密码侧信道防护提供理论参考与技术路线支撑,助力后量子密码在实际密码设备中的高效安全部署。 展开更多
关键词 格密码 后量子密码 侧信道分析 侧信道防护 Kyber Dilithium
在线阅读 下载PDF
基于SM2算法的无证书多重签名及其在区块链交易中的应用
7
作者 朱炳丞 周凤 +3 位作者 田有亮 向阿新 熊伟 彭长根 《计算机工程》 北大核心 2026年第4期290-301,共12页
多重签名广泛应用于区块链交易方案,随着区块链应用国产化需求的不断增长,安全高效的SM2算法日益缺少多重签名方面的研究。此外,现有方案大多依赖公钥基础设施(PKI)体系来实现证书管理,存在效率和可扩展性问题。为此,提出一种基于SM2算... 多重签名广泛应用于区块链交易方案,随着区块链应用国产化需求的不断增长,安全高效的SM2算法日益缺少多重签名方面的研究。此外,现有方案大多依赖公钥基础设施(PKI)体系来实现证书管理,存在效率和可扩展性问题。为此,提出一种基于SM2算法的无证书多重签名方案。首先,在SM2密钥生成阶段引入无证书密码机制,避免代价高昂的证书管理,设计密钥持有证明,抵御恶意密钥攻击;其次,通过引入树形结构,设计"线上-线下"的SM2多重签名算法,实现签名生成的高效性和高可扩展性,并在随机预言机模型(ROM)下证明该方案满足选择消息攻击下的存在性不可伪造性(EUF-CMA);最后,将所提方案应用于Hyperledger Fabric联盟链,优化区块链交易流程。性能分析结果表明,与现有签名方案相比,所提方案在保证安全性的前提下,有效降低了计算开销和通信开销。 展开更多
关键词 区块链 多重签名 SM2算法 无证书密码 随机预言机模型
在线阅读 下载PDF
格上困难问题量子求解算法综述
8
作者 曹金政 罗向阳 +1 位作者 陈晓峰 程庆丰 《软件学报》 北大核心 2026年第1期398-424,共27页
随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐... 随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐步引起关注.围绕后量子密码研究中涉及的格上困难问题,对格上困难问题量子求解算法给出综述.首先,分类整了格上困难问题量子求解算法研究现状.其次,梳理各类格上困难问题量子求解算法的设计思路和应用的量子计算技术,并总结各类格上困难问题量子求解算法的复杂度.最后,展望格上困难问题量子求解算法的未来发展趋势. 展开更多
关键词 格公钥密码 格上困难问题 量子算法
在线阅读 下载PDF
一种保持库表结构的矢量数据字段级加解密技术
9
作者 樊泽宇 马照亭 +3 位作者 雍琦 王旭 丁剑 刘冬 《地理与地理信息科学》 北大核心 2026年第2期18-24,共7页
针对传统字段级加密技术应用于空间数据库矢量字段时因密文扩展导致的库表结构破坏、存储异常等问题,提出一种保持库表结构的矢量数据字段级加密扩展框架。以WKB格式的geometry字段为基础,在加密空间坐标的同时嵌入加密填充和摘要值,通... 针对传统字段级加密技术应用于空间数据库矢量字段时因密文扩展导致的库表结构破坏、存储异常等问题,提出一种保持库表结构的矢量数据字段级加密扩展框架。以WKB格式的geometry字段为基础,在加密空间坐标的同时嵌入加密填充和摘要值,通过差异化修改和扩展WKB节点适应密文数据扩张,形成适用点、线、面等多种类型的加密扩展框架,并设计面向几何字段的结构化加解密方法,有效保障几何字段的机密性和完整性。实验结果表明:加密后的几何字段密文完全兼容数据库矢量字段解析规范,能保持库表结构不变;加密效率与传统字段级加密效率相近,少量记录查询场景下,密文解密查询效率与明文查询效率相当。该方法可为矢量数据在空间数据库中的安全存储提供实用化解决方案。 展开更多
关键词 空间数据库 库表结构保持 矢量数据 商用密码 字段级加密
在线阅读 下载PDF
车联网中基于证书的指定验证者聚合认证方案
10
作者 夏学志 吕文杰 +1 位作者 张明武 夏喆 《信息安全研究》 北大核心 2026年第4期376-382,共7页
车联网显著提高了交通安全性与出行效率,但是开放的网络环境与结构特点使其面临身份伪造、隐私泄露、恶意攻击等安全威胁.如何在资源受限的场景下实现高效安全的身份认证,同时兼顾验证权限可控和用户隐私保护,成为车联网安全领域亟待解... 车联网显著提高了交通安全性与出行效率,但是开放的网络环境与结构特点使其面临身份伪造、隐私泄露、恶意攻击等安全威胁.如何在资源受限的场景下实现高效安全的身份认证,同时兼顾验证权限可控和用户隐私保护,成为车联网安全领域亟待解决的关键问题.提出一种基于证书的指定验证者聚合认证方案,在实现车辆之间的高效身份认证的同时,通过引入指定验证者签名和条件隐私保护机制,解决车联网通信中存在的验证权限控制问题与隐私泄露风险.完整的安全性证明表明该方案在随机预言机模型下可规约于CDH(computational Diffie-Hellman)问题,满足自适应选择消息攻击下的存在不可伪造性.实验分析验证了该方案的高效性与实用性,适用于资源受限的车联网应用环境. 展开更多
关键词 指定验证者签名 身份认证 聚合签名 基于证书密码学 车联网
在线阅读 下载PDF
Secret Sharing Using Visual Cryptography
11
作者 Chin-Chen Chang Bo Li Jung-San Lee 《Journal of Electronic Science and Technology》 CAS 2010年第4期289-299,共11页
Compared with the traditional crypto- graphy, visual cryptography (VC) decrypts secret images referring to the characteristics of human vision, rather than the cryptography knowledge or complex computations. Further... Compared with the traditional crypto- graphy, visual cryptography (VC) decrypts secret images referring to the characteristics of human vision, rather than the cryptography knowledge or complex computations. Furthermore, seeing to the freeness of the secret key, the whole process of encryption as well as deeryption for the visual cryptography meets a fast dealing course. As to the security concern, it is able to guarantee that no one can have access to any clues about the content of a secret image from individual cover images. Thus, owing to the studies on this area, the target of light-weighted cryptography is reached. Now the visual cryptography has been developed from the meaningless shadows to the meaningful ones. Seeing to the highly developed technique, some advanced VC techniques are introduced in this survey, respectively. 展开更多
关键词 Light-weighted meaningful shares meaningless shares PROGRESSIVE visual cryptography.
在线阅读 下载PDF
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
12
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
典型密码算法的优化研究
13
作者 许佳杰 倪文清 +2 位作者 蔡应强 雷国伟 廖文良 《佳木斯大学学报(自然科学版)》 2026年第3期34-37,42,共5页
面对日益严峻的信息安全挑战,聚焦典型密码算法的优化研究,通过理论解析、性能优化与方案对比,为实际场景的加密决策提供理论支撑。深入分析DES,AES,SM4等对称密码与RSA,ElGamal,NTRU等非对称密码的运行机理,提出两阶段优化策略,一是基... 面对日益严峻的信息安全挑战,聚焦典型密码算法的优化研究,通过理论解析、性能优化与方案对比,为实际场景的加密决策提供理论支撑。深入分析DES,AES,SM4等对称密码与RSA,ElGamal,NTRU等非对称密码的运行机理,提出两阶段优化策略,一是基于AES算法的预计算查表技术(T表),将轮函数运算转化为内存访问操作,实现加解密吞吐量倍增;二是构建AES-NTRU混合加密架构,通过量子安全密钥封装机制(KEM)实现传输效率与抗攻击能力的双重提升。实验表明,传统算法与后量子密码的协同部署能有效应对新型威胁,可以为密码体系平滑过渡至量子计算时代提供技术储备。 展开更多
关键词 对称密码 非对称密码 混合加密系统 后量子密码
在线阅读 下载PDF
A Robust Image Encryption Method Based on the Randomness Properties of DNA Nucleotides
14
作者 Bassam Al-Shargabi Mohammed Abbas Fadhil Al-Husainy +1 位作者 Abdelrahman Abuarqoub Omar Albahbouh Aldabbas 《Computers, Materials & Continua》 2026年第4期391-415,共25页
The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently... The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently,the protection of sensitive data has become increasingly critical.Regardless of the complexity of the encryption algorithm used,a robust and highly secure encryption key is essential,with randomness and key space being crucial factors.This paper proposes a new Robust Deoxyribonucleic Acid(RDNA)nucleotide-based encryption method.The RDNA encryption method leverages the unique properties of DNA nucleotides,including their inherent randomness and extensive key space,to generate a highly secure encryption key.By employing transposition and substitution operations,the RDNA method ensures significant diffusion and confusion in the encrypted images.Additionally,it utilises a pseudorandom generation technique based on the random sequence of nucleotides in the DNA secret key.The performance of the RDNA encryption method is evaluated through various statistical and visual tests,and compared against established encryption methods such as 3DES,AES,and a DNA-based method.Experimental results demonstrate that the RDNA encryption method outperforms its rivals in the literature,and achieves superior performance in terms of information entropy,avalanche effect,encryption execution time,and correlation reduction,while maintaining competitive values for NMAE,PSNR,NPCR,and UACI.The high degree of randomness and sensitivity to key changes inherent in the RDNA method offers enhanced security,making it highly resistant to brute force and differential attacks. 展开更多
关键词 Security analysis image protection randomness in cryptography DNA nucleotides DNA-based encryption
在线阅读 下载PDF
A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city
15
作者 Hongjun Li Debiao He +2 位作者 P.Vijayakumar Fayez Alqahtani Amr Tolba 《Digital Communications and Networks》 2026年第1期198-209,共12页
Smart cities,as a typical application in the field of the Internet of Things,can combine cloud computing to realize the intelligent control of objects and process massive data.While cloud computing brings convenience ... Smart cities,as a typical application in the field of the Internet of Things,can combine cloud computing to realize the intelligent control of objects and process massive data.While cloud computing brings convenience to smart city services,a serious problem is ensuring that confidential data cannot be leaked to malicious adversaries.Considering the security and privacy of data,data owners transmit sensitive data in its encrypted form to cloud server,which seriously hinders the improvements of potential utilization and efficient sharing.Public key searchable encryption ensures that users can securely retrieve the encrypted data without decryption.However,most existing schemes cannot resist keyword guessing attacks or the size of trapdoors linearly increases with the number of data owners.In this work,by utilizing certificateless encryption and proxy re-encryption,we design an authenticated searchable encryption scheme with constant trapdoors.The designed scheme preserves the privacy of index ciphertexts and keyword trapdoors,and can resist keyword guessing attacks.In addition,data users can generate and upload trapdoors with lower computation and communication overheads.We show that the proposed scheme is suitable for smart city implementations and applications by experimentally evaluating its performance. 展开更多
关键词 Smart city Data retrieval Privacy protection Certificateless cryptography
在线阅读 下载PDF
Quantum-Resistant Secure Aggregation for Healthcare Federated Learning
16
作者 Chia-Hui Liu Zhen-Yu Wu 《Computers, Materials & Continua》 2026年第5期2116-2137,共22页
ABSTRACT:Federated Learning(FL)enables collaborative medical model training without sharing sensitive patient data.However,existing FL systems face increasing security risks from post quantum adversaries and often inc... ABSTRACT:Federated Learning(FL)enables collaborative medical model training without sharing sensitive patient data.However,existing FL systems face increasing security risks from post quantum adversaries and often incur nonnegligible computational and communication overhead when encryption is applied.At the same time,training high performance AI models requires large volumes of high quality data,while medical data such as patient information,clinical records,and diagnostic reports are highly sensitive and subject to strict privacy regulations,including HIPAA and GDPR.Traditional centralized machine learning approaches therefore pose significant challenges for cross institutional collaboration in healthcare.To address these limitations,Federated Learning was introduced to allow multiple institutions to jointly train a global model while keeping local data private.Nevertheless,conventional cryptographicmechanisms,such as RSA,are increasingly inadequate for privacy sensitive FL deployments,particularly in the presence of emerging quantum computing threats.Homomorphic encryption,which enables computations to be performed directly on encrypted data,provides an effective solution for preserving data privacy in federated learning systems.This capability allows healthcare institutions to securely perform collaborative model training while remaining compliant with regulatory requirements.Among homomorphic encryption techniques,NTRU,a lattice based cryptographic scheme defined over polynomial rings,offers strong resistance against quantum attacks by relying on the hardness of the Shortest Vector Problem(SVP).Moreover,NTRU supports limited homomorphic operations that are sufficient for secure aggregation in federated learning.In this work,we propose an NTRU enhanced federated learning framework specifically designed for medical and healthcare applications.Experimental results demonstrate that the proposed approach achieves classification performance comparable to standard federated learning,with final accuracy consistently exceeding 0.93.The framework introduces predictable encryption latency on the order of hundreds of milliseconds per training round and a fixed ciphertext communication overhead per client under practical deployment settings.In addition,the proposed systemeffectivelymitigatesmultiple security threats,including quantum computing attacks,by ensuring robust encryption throughout the training process.By integrating the security and homomorphic properties of NTRU,this study establishes a privacy preserving and quantumresistant federated learning framework that supports the secure,legal,and efficient deployment of AI technologies in healthcare,thereby laying a solid foundation for future intelligent healthcare systems. 展开更多
关键词 Federated learning(FL) homomorphic encryption NTRU cryptography healthcare data privacy quantum-resistant security
在线阅读 下载PDF
Lightweight Hash-Based Post-Quantum Signature Scheme for Industrial Internet of Things
17
作者 Chia-Hui Liu 《Computers, Materials & Continua》 2026年第2期1041-1058,共18页
TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,th... TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection. 展开更多
关键词 Industrial Internet of Things(IIoT) post-quantum cryptography hash-based signatures SPHINCS+
在线阅读 下载PDF
基于对抗网络的可配置加解密硬件优化设计
18
作者 涂江涛 张会红 张跃军 《宁波大学学报(理工版)》 2026年第1期1-7,共7页
随着神经密码学的出现,越来越多研究使用神经网络来训练加解密算法,其中采用对抗网络可实现端到端的高安全加解密,但存在开销大、速度慢等问题。通过对运算单元核心、数据存储架构和数据流行为进行协同优化设计,提出一种面向神经网络的... 随着神经密码学的出现,越来越多研究使用神经网络来训练加解密算法,其中采用对抗网络可实现端到端的高安全加解密,但存在开销大、速度慢等问题。通过对运算单元核心、数据存储架构和数据流行为进行协同优化设计,提出一种面向神经网络的可配置加解密硬件设计方案。该方案首先对加解密模型进行硬件友好型优化,完成网络训练和量化;然后,采用Winograd+DSP48的卷积加速方法,将所需96个乘法器降低到32个;最后,设计CPU控制与调度系统架构,结合动态控制加速器的操作模式,实现高性能可配置加解密硬件电路。实验结果表明,所提方案最高工作频率为133 MHz,功耗为32.4 m W,吞吐量为17.06 GOPs。加解密网络的正确率达100%,破解网络正确率接近50%,硬件电路具备可配置和高安全特性。 展开更多
关键词 神经密码学 对抗神经网络 可配置 电路优化设计
在线阅读 下载PDF
智慧民航背景下应用密码学课程教学思路探索
19
作者 杨文 华漫 《信息与电脑》 2026年第5期176-179,共4页
在智慧民航背景下,密码技术应用的重要性愈发凸显。应用密码学课程面临理论与实践失衡、学生学习动力不足、行业场景缺失等问题。文章以中国民用航空飞行学院为例,提出“理论筑基、场景赋能、实践创新”三位一体的教学思路。该思路以密... 在智慧民航背景下,密码技术应用的重要性愈发凸显。应用密码学课程面临理论与实践失衡、学生学习动力不足、行业场景缺失等问题。文章以中国民用航空飞行学院为例,提出“理论筑基、场景赋能、实践创新”三位一体的教学思路。该思路以密码学基础理论与工程实践为核心,通过重构课程体系、创新教学方法、引入民航典型案例与实战项目,打造实践平台,着力培养精通密码技术且熟悉民航安全需求的复合型人才,从而更好地服务国家网络安全战略需求。 展开更多
关键词 应用密码学 教学思路 民航 网络安全 复合型人才
在线阅读 下载PDF
基于BGV密码的密文模式匹配协议
20
作者 郭琦 张猛 《信息技术》 2026年第1期15-21,共7页
字符串搜索有着较为广泛的应用场景,在当前云计算环境下,将检索计算外包给第三方服务器存在数据安全问题。因此,文中设计了两种密文模式匹配协议,在保护用户隐私的同时实现高效的密文计算。协议基于BGV同态密码构建加密环境,并利用SIMD... 字符串搜索有着较为广泛的应用场景,在当前云计算环境下,将检索计算外包给第三方服务器存在数据安全问题。因此,文中设计了两种密文模式匹配协议,在保护用户隐私的同时实现高效的密文计算。协议基于BGV同态密码构建加密环境,并利用SIMD技术加快同态操作。设计高效的密文判等函数,采用朴素密文字符串搜索方式完成密态模式匹配协议的实现。实验结果表明,所提出的两种协议在加密时仅需较小的加密参数,且在密文计算效率上优于同类工作。 展开更多
关键词 密码学 隐私计算 模式匹配
在线阅读 下载PDF
上一页 1 2 245 下一页 到第
使用帮助 返回顶部