期刊文献+
共找到1,468篇文章
< 1 2 74 >
每页显示 20 50 100
Hardware-Enabled Key Generation in Industry 4.0 Cryptosystems through Analog Hyperchaotic Signals
1
作者 Borja Bordel Sánchez Fernando Rodríguez-Sela +1 位作者 Ramón Alcarria Tomás Robles 《Computers, Materials & Continua》 2025年第5期1821-1853,共33页
The Industry 4.0 revolution is characterized by distributed infrastructures where data must be continuously communicated between hardware nodes and cloud servers.Specific lightweight cryptosystems are needed to protec... The Industry 4.0 revolution is characterized by distributed infrastructures where data must be continuously communicated between hardware nodes and cloud servers.Specific lightweight cryptosystems are needed to protect those links,as the hardware node tends to be resource-constrained.Then Pseudo Random Number Generators are employed to produce random keys,whose final behavior depends on the initial seed.To guarantee good mathematical behavior,most key generators need an unpredictable voltage signal as input.However,physical signals evolve slowly and have a significant autocorrelation,so they do not have enough entropy to support highrandomness seeds.Then,electronic mechanisms to generate those high-entropy signals artificially are required.This paper proposes a robust hyperchaotic circuit to obtain such unpredictable electric signals.The circuit is based on a hyperchaotic dynamic system,showing a large catalog of structures,four different secret parameters,and producing four high entropy voltage signals.Synchronization schemes for the correct secret key calculation and distribution among all remote communicating modules are also analyzed and discussed.Security risks and intruder and attacker models for the proposed solution are explored,too.An experimental validation based on circuit simulations and a real hardware implementation is provided.The results show that the random properties of PRNG improved by up to 11%when seeds were calculated through the proposed circuit. 展开更多
关键词 Hyperchaotic circuits chaos synchronization hardware-supported technologies chaotic cryptosystems Industry 4.0 adaptative control
在线阅读 下载PDF
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
2
作者 Zeric Tabekoueng Njitacke Louai A.Maghrabi +1 位作者 Musheer Ahmad Turki Althaqafi 《Computers, Materials & Continua》 2025年第4期917-933,共17页
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map.The map demonstrates remarkable chaotic dynamics over a wide range of parameters.We employ nonlinea... This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map.The map demonstrates remarkable chaotic dynamics over a wide range of parameters.We employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption process.Our findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective encryption.The encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit planes.These planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant ones.The subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance security.An auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted image.Experimental results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical images.As a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted images.Additionally,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,respectively.Furthermore,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach. 展开更多
关键词 Image cryptosystem robust chaos sine-cosine map nonlinear analysis tools medical images
在线阅读 下载PDF
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
3
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
原文传递
针对物联网设备的旁路攻击及防御方法的研究 被引量:4
4
作者 何乐生 冯毅 +2 位作者 岳远康 杨崇宇 胡崇辉 《通信学报》 北大核心 2025年第2期166-175,共10页
物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提... 物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提出了安全密钥管理方案及改进的S盒设计,作为旁路攻击防御方法。验证平台由两级差分放大器和抗干扰有限冲激响应(FIR)滤波器构成,能够捕捉微弱的功耗变化,并设计了针对轻量级加密算法的两轮相关能量攻击。通过获取正确密钥相关系数置信度的评估方法,在对PRESENT算法的3 000条功耗曲线进行10 000次攻击后,成功率超过96%,正确密钥的相关性均值均超过0.6,在95%的置信水平下,拥有狭窄的置信区间,而采用改进后的算法进行相同实验时,攻击成功率仅为9.12%。 展开更多
关键词 物联网安全 轻量级密码 旁路攻击 相关能量分析
在线阅读 下载PDF
Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
5
作者 Mugaruka Buduge Gulain Jeremie Ndikumagenge +2 位作者 Buhendwa Nyenyezi Justin Bulonza Masumbuko Alexis Katho Seba Jacques 《Journal of Information Security》 2024年第3期299-307,共9页
In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any mod... In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any modern company. A companys operational and historical data contains strategic and operational knowledge of ever-increasing added value. The emergence of a new paradigm: big data. Today, the value of the data scattered throughout this mother of knowledge is calculated in billions of dollars, depending on its size, scope and area of intervention. With the rise of computer networks and distributed systems, the threats to these sensitive resources have steadily increased, jeopardizing the existence of the company itself by drying up production and losing the interest of customers and suppliers. These threats range from sabotage to bankruptcy. For several decades now, most companies have been using encryption algorithms to protect and secure their information systems against the threats and dangers posed by the inherent vulnerabilities of their infrastructure and the current economic climate. This vulnerability requires companies to make the right choice of algorithms to implement in their management systems. For this reason, the present work aims to carry out a comparative study of the reliability and effectiveness of symmetrical and asymmetrical cryptosystems, in order to identify one or more suitable for securing academic data in the DRC. The analysis of the robustness of commonly used symmetric and asymmetric cryptosystems will be the subject of simulations in this article. 展开更多
关键词 Comparative Study cryptosystemS Symmetric Encryption Asymmetric Encryption
在线阅读 下载PDF
基于代数关系的轻量级密码DEFAULT统计故障分析
6
作者 李玮 秦梦洋 +2 位作者 谷大武 连晟 温云华 《软件学报》 北大核心 2025年第5期2270-2287,共18页
DEFAULT是于2021年亚洲密码学年会中提出的一种新型轻量级密码算法,适用于保护物联网中的微型芯片、微控制器和传感器等设备的信息安全.基于唯密文的基本假设,针对DEFAULT密码提出了一种基于代数关系的统计故障分析方法.该方法使用随机... DEFAULT是于2021年亚洲密码学年会中提出的一种新型轻量级密码算法,适用于保护物联网中的微型芯片、微控制器和传感器等设备的信息安全.基于唯密文的基本假设,针对DEFAULT密码提出了一种基于代数关系的统计故障分析方法.该方法使用随机半字节故障模型,通过对代数关系的构造分析并结合故障注入前后中间状态的统计分布变化来破译密码.此外,采用AD检验-平方欧氏距离(AD-SEI)、AD检验-极大似然估计(ADMLE)和AD检验-汉明重量(AD-HW)等新型区分器,最少仅需1344个故障即可以99%及以上的成功率破解该算法的128比特原始密钥.理论分析和实验结果表明,DEFAULT密码不能抵抗基于代数关系的统计故障分析的攻击.该研究为其他轻量级分组密码算法的安全性分析提供了有价值的参考. 展开更多
关键词 DEFAULT 轻量级密码系统 密码分析 统计故障分析 代数关系
在线阅读 下载PDF
多接收者多消息自适应广播签密机制
7
作者 李颖 方光伟 王前莉 《信息安全研究》 北大核心 2025年第7期636-644,共9页
针对多接收者广播签密中用户隐私保护和消息数量自适应等问题,提出一种无证书多接收者多消息自适应广播签密机制.接收者身份ID输入拉格朗日插值多项式计算密文索引,接收者唯一定位签密密文,解决广播签密中消息数量自适应问题;基于椭圆... 针对多接收者广播签密中用户隐私保护和消息数量自适应等问题,提出一种无证书多接收者多消息自适应广播签密机制.接收者身份ID输入拉格朗日插值多项式计算密文索引,接收者唯一定位签密密文,解决广播签密中消息数量自适应问题;基于椭圆曲线密码体制,将用户解密密钥关联群上1个随机元素,解决多接收者用户的隐私保护问题;在随机Oracle模型下,基于椭圆曲线加法循环群上离散对数假设和计算性Diffie-Hellman假设,证明方案满足机密性和不可伪造性.功能效率分析表明,该方案优于传统多接收者签密方案. 展开更多
关键词 椭圆曲线密码体制 多接收者 签密 随机Oracle模型 无证书
在线阅读 下载PDF
轻量级密码TweGIFT的中间相错统计故障分析研究
8
作者 李玮 刘源 +2 位作者 谷大武 黄佳音 陆海宁 《计算机学报》 北大核心 2025年第7期1696-1713,共18页
TweGIFT算法是Chakraborti等学者于2021年提出的轻量级可调分组密码算法,旨在保护智慧城市、智能制造、智联农业等领域中物联网设备的数据安全。本文基于唯密文基本假设,采取随机半字节故障,提出了一种新型唯密文故障分析方法,即中间相... TweGIFT算法是Chakraborti等学者于2021年提出的轻量级可调分组密码算法,旨在保护智慧城市、智能制造、智联农业等领域中物联网设备的数据安全。本文基于唯密文基本假设,采取随机半字节故障,提出了一种新型唯密文故障分析方法,即中间相错统计故障分析。该方法基于中间相错策略和统计故障分析,通过随机注入半字节故障,获取故障密文并进行统计学分析,设计余弦距离-汉明重量(COS-HW)和余弦距离-极大似然估计(COS-MLE)两种新型区分器,最少以184个故障破译TweGIFT算法全部版本的128比特主密钥。相较于传统统计故障分析和经典的平方欧氏距离、汉明重量、极大似然估计以及Wasserstein距离-极大似然估计区分器,本文提出的中间相错统计故障分析,使故障注入轮数更深一轮,两种新型区分器COS-HW、COS-MLE,使所需故障数减少77.77%,成功率达到99%以上。该结果聚焦于新型唯密文分析,有助于推动轻量级密码算法的进一步研究。 展开更多
关键词 轻量级密码 TweGIFT 中间相错策略 统计故障分析 唯密文故障分析
在线阅读 下载PDF
基于R-LWE密码体制的RFID三方认证协议
9
作者 邹同浩 《计算机应用与软件》 北大核心 2025年第4期353-357,380,共6页
针对现有大多数协议无法实现服务器、电子标签及读写器三方之间相互认证的缺陷,提出一种基于R-LWE(Learning with Errors over Ring)密码体制下可实现三方认证的协议。协议采用理想格对重要隐私信息进行加密,且加密同时混入不同随机数,... 针对现有大多数协议无法实现服务器、电子标签及读写器三方之间相互认证的缺陷,提出一种基于R-LWE(Learning with Errors over Ring)密码体制下可实现三方认证的协议。协议采用理想格对重要隐私信息进行加密,且加密同时混入不同随机数,既可保障隐私信息安全,亦可使得消息具备新鲜性和不确定性。对所设计协议进行安全性分析、基于GNY逻辑形式化证明、性能分析,结果表明该协议具备良好的安全要求、严谨的推理、性能优于其他对比协议。 展开更多
关键词 射频识别技术 三方认证 R-LWE密码 新鲜性 穷举攻击
在线阅读 下载PDF
基于三因子的UWSN身份认证方案
10
作者 陈浩章 杜秀娟 +1 位作者 张帅亮 汪永菊 《计算机应用与软件》 北大核心 2025年第4期83-91,99,共10页
由于水声信道是一个开放的环境,水下无线传感器网络(Underwater Wireless Sensor Network,UWSN)很容易遭受各种攻击和威胁。为了解决UWSN身份认证的安全性问题,该文提出水下椭圆曲线密码身份认证协议(Underwater ECC Identity Authentic... 由于水声信道是一个开放的环境,水下无线传感器网络(Underwater Wireless Sensor Network,UWSN)很容易遭受各种攻击和威胁。为了解决UWSN身份认证的安全性问题,该文提出水下椭圆曲线密码身份认证协议(Underwater ECC Identity Authentication Protocol,UEIAP)。UEIAP实现了三因子的双向身份认证,使得匿名身份动态化,为了未来安全通信,协商了临时会话密钥。严格的BAN逻辑形式化证明和AVISPA仿真实验表明,该协议以相对较小的开销满足安全与功能需求,适用于UWSN。 展开更多
关键词 水下无线传感器网络 安全 椭圆曲线密码体制 身份认证
在线阅读 下载PDF
基于无证书的动态云存储审计技术研究
11
作者 薛鑫靓 赵海春 《内蒙古民族大学学报(自然科学版)》 2025年第5期61-70,共10页
由于数据量较大且用户失去对数据的物理控制,云存储中大规模数据的动态操作面临效率与安全性的双重挑战。为此,基于无证书公钥密码体制,提出了一个能够灵活并高效地支持动态操作的云存储审计方案,从而避免了复杂的证书管理和密钥托管问... 由于数据量较大且用户失去对数据的物理控制,云存储中大规模数据的动态操作面临效率与安全性的双重挑战。为此,基于无证书公钥密码体制,提出了一个能够灵活并高效地支持动态操作的云存储审计方案,从而避免了复杂的证书管理和密钥托管问题。方案中设计了一个基于跳跃表的默克尔哈希树(SL-MHT)结构,该结构将跳跃表的概率平衡特点与满二叉树的完美平衡性有机地结合在一起,以支持高效地完成大规模数据的动态操作和完整性验证。同时,为了防止第三方审计者在审计过程中获取数据内容,引入了随机掩码技术,实现了数据的隐私保护。安全分析和实验结果表明,该方案是安全和高效的。 展开更多
关键词 云存储审计 无证书公钥密码体制 动态操作 隐私保护
在线阅读 下载PDF
公钥密码系统的VHDL代码自动生成技术
12
作者 宋积满 《无线互联科技》 2025年第17期90-93,共4页
针对VHDL代码自动生成过程中存在冗余逻辑多、耗时长的问题,文章研究了公钥密码系统的VHDL代码自动生成技术。该技术先将输入的明文通过IP变换,再利用公钥密码机制对传输数据进行加密与解密。将公钥密码系统中的重复代码片段封装为可配... 针对VHDL代码自动生成过程中存在冗余逻辑多、耗时长的问题,文章研究了公钥密码系统的VHDL代码自动生成技术。该技术先将输入的明文通过IP变换,再利用公钥密码机制对传输数据进行加密与解密。将公钥密码系统中的重复代码片段封装为可配置模板并基于VHDL2XML工具生成系统配置文件。代码生成时,采用单一模块实现一次迭代,重复执行16次,完成整个加密流程。通过读取模块信息,依据简单与多元映射规则,实现中间模型到目标模型的映射,提取出对应的数据,完成动态部分的替换操作,最终输出高质量的VHDL代码。实验结果表明,该方法可以生成语义功能正确、质量高的VHDL代码且生成代码错误数为0,生成时间约为320 s,能极大地节省编码的时间。 展开更多
关键词 公钥密码系统 VHDL 代码自动生成 模板化 迭代优化
在线阅读 下载PDF
基于区块链的无证书代理重加密医疗数据共享方案
13
作者 何利平 杜红珍 刘珂 《宝鸡文理学院学报(自然科学版)》 2025年第3期10-16,44,共8页
目的为解决医疗数据共享、患者隐私易被泄露等问题,在保护用户隐私的前提下实现对医疗数据的动态共享以及患者对数据的访问控制。方法将无证书密码体制与代理重加密算法结合,数据拥有者生成访问权限参数列表,通过与区块链中访问权限管... 目的为解决医疗数据共享、患者隐私易被泄露等问题,在保护用户隐私的前提下实现对医疗数据的动态共享以及患者对数据的访问控制。方法将无证书密码体制与代理重加密算法结合,数据拥有者生成访问权限参数列表,通过与区块链中访问权限管理节点交互更新访问权限参数列表实现数据的动态共享。结果构造了基于区块链的医疗数据动态共享模型,通过安全性分析得出,本方案在实现数据动态共享的同时,可抵抗合谋攻击及篡改攻击。结论与其他同类型方案相比,本方案运算效率更具有优势。 展开更多
关键词 无证书密码体制 代理重加密 区块链 数据共享 医疗数据
在线阅读 下载PDF
支持后量子与商密的混合密码系统设计与实现
14
作者 王翊存 严国忠 +3 位作者 李骁 杨柳依依 黄明浩 冷昌琦 《通信技术》 2025年第5期568-578,共11页
为应对量子威胁并确保商用合规,研究了一种支持后量子与商密混合运行的密码系统。系统采用多层协同架构,应用层融合SM2与后量子密码(如Kyber/Dilithium),通过混合加密、签名、密钥协商构建双重防护,兼容国密设施;平台层部署动态调度引擎... 为应对量子威胁并确保商用合规,研究了一种支持后量子与商密混合运行的密码系统。系统采用多层协同架构,应用层融合SM2与后量子密码(如Kyber/Dilithium),通过混合加密、签名、密钥协商构建双重防护,兼容国密设施;平台层部署动态调度引擎,优化算法调用与资源分配;硬件层采用现场可编程门阵列(Field-Programmable Gate Array,FPGA)+安全芯片异构架构加速运算,集成物理防护及抗侧信道机制。测试表明,系统在政务、金融等场景中可以兼顾抗量子安全与运行效率,可以作为自主可控密码设施升级的实践方案。 展开更多
关键词 后量子密码算法 商用密码算法:混合密码系统 信息安全
在线阅读 下载PDF
New Constructions of Dynamic Threshold Cryptosystem 被引量:4
15
作者 龙宇 陈克非 毛贤平 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期431-435,共5页
This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. ... This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. We first introduce an identity based dynamic threshold cryptosystem, and then use the CanettiHalevi-Katz(CHK) transformation to transform it into a fully secure system in the traditional public key setting.Finally, the elegant dual system encryption technique is applied to constructing a fully secure dynamic threshold cryptosystem with adaptive security. 展开更多
关键词 threshold cryptosystem dynamic property dual system encryption one-time signature
原文传递
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
16
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
在线阅读 下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
17
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
在线阅读 下载PDF
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem 被引量:2
18
作者 Zeyu Liu Tiecheng Xia Jinbo Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期161-176,共16页
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif... We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. 展开更多
关键词 CHAOS fractional two-dimensional triangle function combination discrete chaotic map image encryption Menezes-Vanstone elliptic curve cryptosystem
原文传递
A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network 被引量:1
19
作者 王兴元 鲍雪梅 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期232-240,共9页
In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (... In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hard- ware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosys- tem is secure and practical, and suitable for image encryption. 展开更多
关键词 image encryption block cryptosystem chaotic neural network coupled map lattice
原文传递
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
20
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
在线阅读 下载PDF
上一页 1 2 74 下一页 到第
使用帮助 返回顶部