期刊文献+
共找到88篇文章
< 1 2 5 >
每页显示 20 50 100
Femtosecond laser subtractive/additive-integrated biomimetic manufacturing for visible/infrared encryption and stimuli-responsive infrared decryption
1
作者 Ruijie Liu Dongshi Zhang Zhuguo Li 《International Journal of Extreme Manufacturing》 2025年第4期387-404,共18页
Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,... Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension. 展开更多
关键词 femtosecond laser biomimetic manufacturing black particle aggregates subtractive/additive-integrated manufacturing intrinsic visible-infrared encryption stimuli responsive decrypted IR display
在线阅读 下载PDF
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
2
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
3
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
Digital image encryption with chaotic map lattices 被引量:8
4
作者 孙福艳 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期132-138,共7页
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o... This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency. 展开更多
关键词 image encryption image decryption chaotic map lattice CRYPTOGRAPHY spatiotemporal chaotic system
原文传递
A secure identification system using coherent states 被引量:3
5
作者 何广强 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第2期371-374,共4页
A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed i... A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed into an arbitrary elliptical polarization state, To verify the identity of a communicator, a reverse procedure is performed by the receiver, For simply describing the transformation procedure, the analytical methods of Poincaré sphere and quaternion are adopted. Since quantum noise provides such a measurement uncertainty for the eavesdropping that the identity information cannot be retrieved from the elliptical polarization state, the proposed scheme is secure. 展开更多
关键词 quantum identification polarization encryption and decryption quantum noise Poincaré sphere
原文传递
Decryption of pure-position permutation algorithms 被引量:3
6
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 DECRYPTION Image encryption FUZZY Position permutation
在线阅读 下载PDF
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
7
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
在线阅读 下载PDF
Substring-searchable attribute-based encryption and its application for IoT devices 被引量:3
8
作者 Xi Sun Hao Wang +4 位作者 Xiu Fu Hong Qin Mei Jiang Likun Xue Xiaochao Wei 《Digital Communications and Networks》 SCIE CSCD 2021年第2期277-283,共7页
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea... With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices. 展开更多
关键词 Attribute-based encryption Searchable encryption Outsourcing decryption IoT divices
在线阅读 下载PDF
An Efficient Sound and Data Steganography Based Secure Authentication System 被引量:2
9
作者 Debajit Datta Lalit Garg +5 位作者 Kathiravan Srinivasan Atsushi Inoue G.Thippa Reddy M.Praveen Kumar Reddy K.Ramesh Nidal Nasser 《Computers, Materials & Continua》 SCIE EI 2021年第4期723-751,共29页
The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.... The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks.Further,the pin-based security system is an inadequate mechanism for handling such a scenario.The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data.This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound,thereby disregarding the pins’manual verification.Further,the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches.Firstly,a random signal is encrypted,and then it is transformed into a wave file,after which it gets transmitted in a short burst via the device’s speakers.Subsequently,the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing.Besides,this model requires two devices/gadgets with speakers and a microphone,and no extra hardware such as a camera,for reading the QR code is required.The first module is tested with realtime data and generates high scores for the widely accepted accuracy metrics,including precision,Recall,F1 score,entropy,and mutual information(MI).Additionally,this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files.This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file.Several encryption algorithms and their combinations are taken for this system to compare the resultant file size.Both these systems engender high accuracies and provide secure connectivity,leading to a sustainable communication ecosystem. 展开更多
关键词 Cyber-attacks signals PRIVACY security organization ENCRYPTION DECRYPTION authentication effective communication STEGANOGRAPHY
在线阅读 下载PDF
A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption 被引量:2
10
作者 李世群 吴永东 +1 位作者 周建英 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期67-70,共4页
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa... The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4. 展开更多
关键词 batch decryption secure socket layer (SSL) server public key algorithm
在线阅读 下载PDF
AIE活性抗冻水凝胶可实现低温环境下多级信息的加密与解密 被引量:1
11
作者 睢晓洁 汪晓东 +3 位作者 蔡诚诚 马君怡 杨静 张雷 《Engineering》 SCIE EI CAS CSCD 2023年第4期82-89,M0005,共9页
抗冻水凝胶可在低温环境下调控内部水分子的冻结状态,进而维持其优异特性(如智能响应性、离子运输能力等)以及拓展其在低温环境下的应用。本文开发了一系列具有AIE活性的抗冻水凝胶,其可用于低温环境下的信息加密/解密。根据水凝胶中甜... 抗冻水凝胶可在低温环境下调控内部水分子的冻结状态,进而维持其优异特性(如智能响应性、离子运输能力等)以及拓展其在低温环境下的应用。本文开发了一系列具有AIE活性的抗冻水凝胶,其可用于低温环境下的信息加密/解密。根据水凝胶中甜菜碱浓度的不同使其具有可调的冻结温度(T_(f))。当温度高于/低于Tf时,编码于水凝胶内的AIE分子表现出不发光/发光行为,从而实现信息的加密/解密。此外,通过调控水凝胶的冷冻程序,或者在水凝胶中原位引入具有光热效应的硫化铜纳米粒子并结合一定的照射条件,可实现多级信息的读取,从而增强信息的安全性。最后,由于该水凝胶对外界温度波动表现出不可逆性,因此可作为无需外界供能的超低温防伪标签,用于实时可视化监测冷链运输过程中细胞的活性。 展开更多
关键词 Freeze-tolerant hydrogels Aggregation-induced emission ENCRYPTION DECRYPTION Anticounterfeiting
在线阅读 下载PDF
A dual-stimuli-responsive intelligent layered lanthanide hydroxide for application in information security and latent fingerprint identification 被引量:1
12
作者 Jun Xu Tinghui Zhu +7 位作者 Jianchao Shi Bo Song Lina Zhang Dan Zhao Xiyan Dong Ning Bi Jian Gou Lei Jia 《Journal of Rare Earths》 SCIE EI CAS CSCD 2022年第11期1715-1727,I0002,共14页
With the rapid changes in the field of information,the research and development of optical storage materials with high security and large storage capacity are particularly important in the development of contemporary ... With the rapid changes in the field of information,the research and development of optical storage materials with high security and large storage capacity are particularly important in the development of contemporary society.However,conventional memo ry materials with static fluorescent outputs have the disadvantages of easy simulation and forgery,which limits their practical application in the protection of confidential information.In this research,a dual-stimuli-responsive intelligent fluorescent material based on Tb^(3+)and Eu^(3+)ions doped layered lanthanide hydroxide(LYH:Eu_(x)Tb_(1-x)DPA)was fabricated,which can realize reversible multi-color luminescence conversion(from green to red)by varying the pH and temperature.Combined with the Morse code and security pattern,the multiple encryption and decryption of confidential information and anti-counterfeiting can also be realized.Therefore,the obtained intelligent fluorescent material has a great application prospect for information security.In addition,due to the excellent color tunability,the material can provide the possibility to obtain potential fingerprints with high contrast and no background interference on different color substrates.The unique dual-stimuli-responsive behavior of this material provides more ingenious design inspiration for the design of multi-color intelligent fluorescent devices. 展开更多
关键词 Layered lanthanide hydroxides Dual-stimuli-responsive Encryption DECRYPTION Latent fingerprint Rare earths
原文传递
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds 被引量:1
13
作者 Muhammad Akram Muhammad Waseem Iqbal +3 位作者 Syed Ashraf Ali Muhammad Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali 《Computers, Materials & Continua》 SCIE EI 2022年第9期6061-6077,共17页
In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext ot... In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples. 展开更多
关键词 Encryption DECRYPTION CIPHER symmetric key cryptography single key attack
在线阅读 下载PDF
Optical encryption with cascaded fractional wavelet transforms 被引量:1
14
作者 BAO Liang-hua CHEN Lin-fei ZHAO Dao-mu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第8期1431-1435,共5页
On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractiona... On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractional orders, standard focal lengths and scaling factors are its keys. Multistage fractional Fourier transforms can add the keys easily and strengthen information se-curity. This method can also realize partial encryption just as wavelet transform and fractional wavelet transform. Optical reali-zation of encryption and decryption is proposed. Computer simulations confirmed its possibility. 展开更多
关键词 Wavelet transform (WT) Cascaded fractional wavelet transform (CFWT) ENCRYPTION DECRYPTION
在线阅读 下载PDF
A Novel Image Encryption Technique Based on Inter Block Difference 被引量:1
15
作者 THAMANAM Srinivasa Rao Potti Nagaraja +1 位作者 B.Balaji Naik K.Manjunathachari 《Journal of Shanghai Jiaotong university(Science)》 EI 2021年第4期488-493,共6页
Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic device... Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner. 展开更多
关键词 ENCRYPTION DECRYPTION inter block difference advanced encryption standard(AES)
原文传递
DERNNet:Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN 被引量:1
16
作者 A.Venkatesh S.Asha 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1375-1392,共18页
A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical regions.The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy.As sensor no... A Wireless Sensor Network(WSN)is constructed with numerous sensors over geographical regions.The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy.As sensor nodes are resource constrained in nature,novel techniques are essential to improve lifetime of nodes in WSN.Nodes energy is considered as an important resource for sensor node which are battery powered based.In WSN,energy is consumed mainly while data is being transferred among nodes in the network.Several research works are carried out focusing on preserving energy of nodes in the network and made network to live longer.Moreover,this network is threatened by attacks like vampire attack where the network is loaded by fake traffic.Here,Dual Encoding Recurrent Neural network(DERNNet)is proposed for classifying the vampire nodes s node in the network.Moreover,the Grey Wolf Optimization(GWO)algorithm helps for transferring the data by determining best solutions to optimally select the aggregation points;thereby maximizing battery/lifetime of the network nodes.The proposed method is evaluated with three standard approaches namely Knowledge and Intrusion Detection based Secure Atom Search Routing(KIDSASR),Risk-aware Reputation-based Trust(RaRTrust)model and Activation Function-based Trusted Neighbor Selection(AF-TNS)in terms of various parameters.These existing methods may lead to wastage of energy due to vampire attack,which further reduce the lifetime and increase average energy consumed in the network.Hence,the proposed DERNNet method achieves 31.4%of routing overhead,23%of end-to-end delay,78.6%of energy efficiency,94.8%of throughput,28.2%of average latency,92.4%of packet delivery ratio,85.2%of network lifetime,and 94.3%of classification accuracy. 展开更多
关键词 Wireless sensor network vampire nodes LIFETIME optimal routing energy ENCRYPTION DECRYPTION trust value optimization
在线阅读 下载PDF
Implementation of a TPM-Based Security Enhanced Browser Password Manager 被引量:1
17
作者 HE Yuchen WANG Rui SHI Wenchang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期56-62,共7页
In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which... In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable.Abstract: In order to enhance the security of a browser password manager, we propose an approach based on a hardware trusted platform module (TPM). Our approach encrypts users' passwords with keys generated by the TPM, which uses a master password as the credential for authorization to access the TPM. Such a hardware-based feature may provide an efficient way to protect users' passwords. Experiment and evaluation results show that our approach performs well to defend against password stealing attack and brute force attack. Attackers cannot get passwords directly from the browser, therefore they will spend incredible time to obtain passwords. Besides, performance cost induced by our approach is acceptable. 展开更多
关键词 trusted platform module(TPM) password manager trusted encryption decryption
原文传递
Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography 被引量:2
18
作者 Lein Harn Changlu Lin 《International Journal of Communications, Network and System Sciences》 2014年第1期22-29,共8页
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor... In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well. 展开更多
关键词 Shamir’s(t n)Secret Sharing Scheme SECRET RECONSTRUCTION THRESHOLD CRYPTOGRAPHY THRESHOLD DECRYPTION ASYNCHRONOUS Networks
暂未订购
New Constructions of Identity-Based Threshold Decryption 被引量:1
19
作者 ZHANG Leyou HU Yupu +1 位作者 TIAN Xu'an YANG Yang 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期222-226,共5页
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive c... In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously. 展开更多
关键词 ID-Based threshold decryption verifiable pair computational bilinear Diffie-Hellman (CBDH) problem provable security
原文传递
Comparative Study of Different Cryptographic Algorithms 被引量:1
20
作者 Baha Eldin Hamouda Hassan Hamouda 《Journal of Information Security》 2020年第3期138-148,共11页
With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of d... With the increasing interconnection of computer networks and sophistication of cyber-attacks, Cryptography is one way to make sure that confidentiality, authentication, integrity, availability, and identification of data user can be maintained as well as security and privacy of data provided to the user. Symmetric key cryptography is a part of the cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. In this paper I have analyzed comparative encryption algorithms in performance, three most useful algorithms: Data Encryption Standard (DES), Triple DES (3DES) also known as Triple Data Encryption Algorithm (TDEA), and Advanced Encryption Standard (AES). They have been analyzed on their ability to secure data, time taken to encrypt data and throughput the algorithm requires. The performance of different algorithms differs according to the inputs. 展开更多
关键词 CRYPTOGRAPHY DES 3DES AES ENCRYPTION DECRYPTION CIPHERTEXT PLAINTEXT
在线阅读 下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部