期刊文献+
共找到1,556篇文章
< 1 2 78 >
每页显示 20 50 100
HashESU:一种生物网络模体识别高效方法 被引量:2
1
作者 赵静 钟诚 《小型微型计算机系统》 CSCD 北大核心 2015年第9期2042-2046,共5页
通过模体识别可以获得生物网络结构和功能,生物网络模体识别过程涉及到子图枚举和子图同构的问题,计算量非常大.提出一种高效的网络模体识别算法Hash ESU,它使用经典算法ESU枚举子图,采用Hash表结构保存生成的子图,利用每个新增结点与... 通过模体识别可以获得生物网络结构和功能,生物网络模体识别过程涉及到子图枚举和子图同构的问题,计算量非常大.提出一种高效的网络模体识别算法Hash ESU,它使用经典算法ESU枚举子图,采用Hash表结构保存生成的子图,利用每个新增结点与已经确定的结点之间的关系,生成子图标识关键字SIK并映射到Hash表中,每个SIK只在第一次生成时才需要调用同构计算,以大大减少调用NAUTY算法进行同构检测的次数、更快地进行查找和插入子图操作,进而加快模体识别的速度.实验结果表明,在模体识别结果质量相同的前提下,Hash ESU算法的运行效率明显优于著名的ESU算法和使用四分树结构存储子图的Quate Xelero算法. 展开更多
关键词 生物网络 模体识别 子图枚举 子图同构 HASHING
在线阅读 下载PDF
Multiple hashes of single key with passcode for multiple accounts
2
作者 LEE Kok-wah EWE Hong-tat 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第8期1183-1190,共8页
A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino ... A human's e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However,human memorability constrains the number of keys. Single sign-on server,key hashing,key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name,but numeric 4-digit passcode,key hashing,key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts. 展开更多
关键词 management Memorability Key hashing Key strengthening Multiple accounts Information security
在线阅读 下载PDF
基于监督学习的稀疏矩阵乘算法优选
3
作者 彭林 张鹏 +2 位作者 陈俊峰 唐滔 黄春 《计算机工程与科学》 北大核心 2025年第3期381-391,共11页
稀疏矩阵乘算法中主流的row-by-row计算公式上的SPA、HASH、ESC 3种稀疏矩阵乘实现算法,在对不同的稀疏矩阵进行计算时性能差异显著,在不同非零元规模上单一算法不总是能取得最佳性能,而且单一算法与最优选择存在明显差距。为此,提出了... 稀疏矩阵乘算法中主流的row-by-row计算公式上的SPA、HASH、ESC 3种稀疏矩阵乘实现算法,在对不同的稀疏矩阵进行计算时性能差异显著,在不同非零元规模上单一算法不总是能取得最佳性能,而且单一算法与最优选择存在明显差距。为此,提出了一种基于机器学习的最优稀疏矩阵乘算法选择模型,以给定矩阵集作为数据源,抽取稀疏矩阵的特征,并使用SPA、HASH、ESC计算获得的性能数据进行训练和验证,获得的模型能够仅使用稀疏矩阵的特征即可完成对新数据集的算法优选。实验结果表明,该模型可以获得91%以上的预测准确率,平均性能达到最优选择的98%,是单一算法性能的1.55倍以上,并且可在实际库函数中使用,具有良好的泛化能力和实用价值。 展开更多
关键词 稀疏矩阵乘 SpGEMM SPA算法 HASH算法 ESC算法 机器学习
在线阅读 下载PDF
Hash折叠寻址模型的研究
4
作者 庞志赟 萧琳 《现代信息科技》 2025年第5期184-186,192,共4页
在大数据背景下,研究大数据存储及寻址对大数据管理具有重要的数据经济意义。文章从数据存储物理结构和逻辑结构分析了数据存储的架构化现状,以准实时或实时为数据查询需求,在传统的主键索引查询技术基础上,对数据存储结构进行重组,关... 在大数据背景下,研究大数据存储及寻址对大数据管理具有重要的数据经济意义。文章从数据存储物理结构和逻辑结构分析了数据存储的架构化现状,以准实时或实时为数据查询需求,在传统的主键索引查询技术基础上,对数据存储结构进行重组,关心数据模型原型、数据存储规律与调用、数据Hash检索计算策略、结果存储和分发、折叠寻址结构模型,以及提升数据处理速度和数据查询处理能力等。应用Hash折叠检索策略和折叠函数原型构建折叠寻址思想模型,并将该思想应用于折叠寻址用例,对数据快速查询的Hash折叠寻址模型的研究具有重要意义。 展开更多
关键词 HASH 折叠寻址 存储结构 折叠检索策略 寻址模型
在线阅读 下载PDF
基于Python语言和Hash算法的双关键字查找算法应用研究
5
作者 卢志刚 陈平 《安徽水利水电职业技术学院学报》 2025年第1期43-48,共6页
大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,... 大数据量环境下,在2个二维表之间进行双关键字等值查找是一项挑战。传统的顺序查找算法在这种情况下效率较低。二分查找算法虽然更高效,但在处理大规模及非排序数据时仍有局限性。针对这一问题,文章提出了一种基于Hash算法的查找方法,并使用Python语言开发了使用该算法的软件。对比分析结果表明,该方法在处理大规模数据时,相比传统顺序查找和二分查找,不仅简化了实现过程,而且显著提高了查找效率。 展开更多
关键词 二维表 Hash table 查找算法
在线阅读 下载PDF
基于线性同态hash和秘密分享的高效可验证聚合方案
6
作者 高琦 孙奕 +1 位作者 王友贺 李宇杰 《计算机应用研究》 北大核心 2025年第2期599-605,共7页
针对目前联邦学习可验证聚合方案存在用户通信开销过大、无法容忍用户退出以及用户退出导致验证效率降低的问题,提出了一种基于线性同态hash和秘密分享的高效可验证聚合方案(LHSSEVA)。首先,采用线性同态hash和同态承诺实现聚合结果的... 针对目前联邦学习可验证聚合方案存在用户通信开销过大、无法容忍用户退出以及用户退出导致验证效率降低的问题,提出了一种基于线性同态hash和秘密分享的高效可验证聚合方案(LHSSEVA)。首先,采用线性同态hash和同态承诺实现聚合结果的可验证性,保证验证信息通信开销与模型维度无关,同时防止服务器通过伪造聚合hash欺骗用户接受错误聚合结果;然后基于椭圆曲线离散对数问题及其同态性保护输入的隐私,同时保证验证的正确性;接着通过融入秘密分享使验证过程可以容忍用户随时退出,并确保用户退出不会导致验证效率降低;最后理论分析证明了方案的正确性、可靠性和隐私性。仿真实验结果表明了方案的可行性和高效性,与VeriFL方案相比,具有更低的计算和通信开销,特别是存在用户退出时,显著提高了验证效率,具有更强的退出容忍性。 展开更多
关键词 联邦学习 隐私保护 可验证 线性同态hash 秘密分享 容忍退出
在线阅读 下载PDF
无线传感网络入侵干扰节点定位方法的优化设计
7
作者 贾仁祥 单鸿涛 《传感技术学报》 北大核心 2025年第8期1511-1518,共8页
为了维护无线传感网络的运行稳定性,设计一种无线传感网络入侵干扰定位优化方法。通过粒子群算法的方式,完成对无线传感网络入侵样本的取样,不再标记所有节点,实现对无线传感网络入侵对象的简洁标记。放弃入侵前阈值定义入侵等级的传统... 为了维护无线传感网络的运行稳定性,设计一种无线传感网络入侵干扰定位优化方法。通过粒子群算法的方式,完成对无线传感网络入侵样本的取样,不再标记所有节点,实现对无线传感网络入侵对象的简洁标记。放弃入侵前阈值定义入侵等级的传统思路,查询关键节点对象,并针对其定义攻击性判定Hash函数,联合相关攻击项,判定已标记对象入侵攻击等级。在无线传感网络中实施入侵信息的拟合处理,根据无线传感网络划分条件,定位入侵攻击项,完成无线传感网络入侵干扰节点定位。仿真结果表明,所提技术定位偏差在0.5~0.1之间,字段检测长度与真实长度的数值比保持在99%以上,检测时间低于30 s。符合检测无线传感网络攻击性信息的实际应用需求。 展开更多
关键词 无线传感网络 入侵干扰节点定位 粒子群算法 边界坐标 HASH函数 信息拟合 优化设计
在线阅读 下载PDF
Verifiable image revision from chameleon hashes 被引量:1
8
作者 Junpeng Xu Haixia Chen +2 位作者 Xu Yang Wei Wu Yongcheng Song 《Cybersecurity》 EI CSCD 2021年第1期528-540,共13页
In a digital society,the rapid development of computer science and the Internet has greatly facilitated image applications.However,one of the public network also brings risks to both image tampering and privacy exposu... In a digital society,the rapid development of computer science and the Internet has greatly facilitated image applications.However,one of the public network also brings risks to both image tampering and privacy exposure.Image authentication is the most important approaches to verify image integrity and authenticity.However,it has been challenging for image authentication to address both issues of tampering detection and privacy protection.One aspect,image authentication requires image contents not be changed to detect tampering.The other,privacy protection needs to remove sensitive information from images,and as a result,the contents should be changed.In this paper,we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection.Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose(for example,cover some sensitive areas with mosaics)according to specific rules and verify the authenticity without interaction with the original authenticator.The security of our scheme is guaranteed by the security of the underlying cryptographic primitives.Experiment results show that our scheme is efficient and practical.We believe that our work will facilitate image applications where both authentication and privacy protection are desirable. 展开更多
关键词 Image authentication Privacy protection CRYPTOGRAPHY Chameleon hashes Digital signatures
原文传递
康托展开在算法中的应用
9
作者 戴德军 《电脑编程技巧与维护》 2025年第5期29-31,43,共4页
介绍了康托展开的原理,指出了康托展开值是一个数在其全排列中的位次,相当于这个数的一个HASH值。康托展开的本质是全排列与自然数的双射。在搜索算法中利用康托展开值可以进行判重,提高空间使用效率。
关键词 康托展开 全排列 判重 HASH值
在线阅读 下载PDF
Verifiable image revision from chameleon hashes
10
作者 Junpeng Xu Haixia Chen +2 位作者 Xu Yang Wei Wu Yongcheng Song 《Cybersecurity》 EI CSCD 2022年第1期61-73,共13页
In a digital society,the rapid development of computer science and the Internet has greatly facilitated image applications.However,one of the public network also brings risks to both image tampering and privacy exposu... In a digital society,the rapid development of computer science and the Internet has greatly facilitated image applications.However,one of the public network also brings risks to both image tampering and privacy exposure.Image authentication is the most important approaches to verify image integrity and authenticity.However,it has been cha卜lenging for image authentication to address both issues of tampering detection and privacy protection.One aspect,image authentication requires image contents not be changed to detect tampering.The other,privacy protection needs to remove sensitive information from images,and as a result,the contents should be changed.In this paper,we propose a practical image authentication scheme constructed from chameleon hashes combined with ordinary digital signatures to make tradeoff between tampering detection and privacy protection.Our scheme allows legitimate users to modify contents of authenticated images with a privacy-aware purpose(for example,cover some sensitive areas with mosaics)according to specific rules and verify the authenticity without interaction with the original authenticator.The security of our scheme is guaranteed by the security of the underlying cryptographic primitives.Experiment results show that our scheme is efficient and practical.We believe that our work will facilitate image applications where both authentication and privacy protection are desirable. 展开更多
关键词 Image authentication Privacy protection CRYPTOGRAPHY Chameleon hashes Digital signatures
原文传递
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
11
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
基于加密算法的车载ECU安全部署设计
12
作者 王宇航 魏银 《人工智能与机器人研究》 2025年第5期1218-1229,共12页
由于现代汽车智能化的快速发展,软件定义汽车的愿想正逐渐成为现实,汽车制造商需要通过快速迭代软件来提升产品竞争力,由此带来的用户数据泄露、软件被恶意攻击等风险也日益增加,同时制造商与用户对于软件安全的重视程度也随之增加。软... 由于现代汽车智能化的快速发展,软件定义汽车的愿想正逐渐成为现实,汽车制造商需要通过快速迭代软件来提升产品竞争力,由此带来的用户数据泄露、软件被恶意攻击等风险也日益增加,同时制造商与用户对于软件安全的重视程度也随之增加。软件部署技术必须能够安全有效抵御这些威胁,本文设计了一套软件部署流程,在流程中增加了软件安全算法,使需要更新的软件能安全可靠地部署到规定的内存区域中。为确保ECU固件升级时,数据传输的安全性,在进入Bootloader模式时需要经过诊断27服务的安全验证,防止外部用户非法篡改内部数据,为此,设计了诊断27服务的加密验证方案。同时设计使用椭圆曲线和Hash256算法的组合来对需要部署的车载软件包进行加密和解密,确保外部需要下载的软件包为正确的版本。对于已经被恶意篡改的软件包,需要被丢弃。对需要测试的功能点进行了测试用例的编写,结合软件和硬件需求,在Canoe软件搭建了一套完整的软硬件实验平台,对测试用例的相关功能点进行了正常工况和异常工况的测试。 展开更多
关键词 软件部署 27服务 椭圆曲线 Hash256 BOOTLOADER
在线阅读 下载PDF
Dynamically redactable blockchain based on decentralized Chameleon hash
13
作者 Xinzhe Huang Yujue Wang +3 位作者 Yong Ding Qianhong Wu Changsong Yang Hai Liang 《Digital Communications and Networks》 2025年第3期757-767,共11页
The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchai... The immutability is a crucial property for blockchain applications,however,it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data.Although redactable blockchains enable on-chain modification,they suffer from inefficiency and excessive centralization,the majority of redactable blockchain schemes ignore the difficult problems of traceability and consistency check.In this paper,we present a Dynamically Redactable Blockchain based on decentralized Chameleon hash(DRBC).Specifically,we propose an Identity-Based Decentralized Chameleon Hash(IDCH)and a Version-Based Transaction structure(VT)to realize the traceability of transaction modifications in a decentralized environment.Then,we propose an efficient block consistency check protocol based on the Bloom filter tree,which can realize the consistency check of transactions with extremely low time and space cost.Security analysis and experiment results demonstrate the reliability of DRBC and its significant advantages in a decentralized environment. 展开更多
关键词 Privacy protection Redactable blockchain Chameleon hash Consistency check SCALABILITY
在线阅读 下载PDF
利用哈希算法实现机加工图纸相似度计算
14
作者 马天慧 吴辰阳 张虹 《上海汽车》 2025年第8期48-51,57,共5页
为计算多张图纸的相似度,采用哈希(Hash)算法来判断图纸是否相似,并采用计算机视觉、科学计算等工具做到最佳实践,使得整个程序兼顾准确率和效率的折中需求。项目具有算法简单、易实现、计算机算力要求低和准确率高等优点,在图纸相似度... 为计算多张图纸的相似度,采用哈希(Hash)算法来判断图纸是否相似,并采用计算机视觉、科学计算等工具做到最佳实践,使得整个程序兼顾准确率和效率的折中需求。项目具有算法简单、易实现、计算机算力要求低和准确率高等优点,在图纸相似度匹配和避免重复加工零件等方面具有较高作用。 展开更多
关键词 HASH 算法 机加工图纸 图像相似度
在线阅读 下载PDF
Hash-based FDI attack-resilient distributed self-triggered secondary frequency control for islanded microgrids
15
作者 Xing Huang Yulin Chen +4 位作者 Donglian Qi Yunfeng Yan Shaohua Yang Ying Weng Xianbo Wang 《Global Energy Interconnection》 2025年第1期1-12,共12页
Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sam... Given the rapid development of advanced information systems,microgrids(MGs)suffer from more potential attacks that affect their operational performance.Conventional distributed secondary control with a small,fixed sampling time period inevitably causes the wasteful use of communication resources.This paper proposes a self-triggered secondary control scheme under perturbations from false data injection(FDI)attacks.We designed a linear clock for each DG to trigger its controller at aperiodic and intermittent instants.Sub-sequently,a hash-based defense mechanism(HDM)is designed for detecting and eliminating malicious data infiltrated in the MGs.With the aid of HDM,a self-triggered control scheme achieves the secondary control objectives even in the presence of FDI attacks.Rigorous theoretical analyses and simulation results indicate that the introduced secondary control scheme significantly reduces communication costs and enhances the resilience of MGs under FDI attacks. 展开更多
关键词 MICROGRIDS Distributed secondary control Self-triggered control Hash algorithms False data injection attack
在线阅读 下载PDF
基于区块链的边缘计算分布式安全认证系统设计
16
作者 秦前锋 蔡卫江 +3 位作者 陶迎新 张航瑞 关迪予 秦健 《自动化仪表》 2025年第1期83-88,共6页
针对电网终端用户安全存在无法认证和认证速度较慢等问题,设计了基于区块链的边缘计算分布式安全认证系统。利用区块链技术的区块链机制实现电网终端用户安全认证的安全、稳定控制。利用边缘计算的分布特征,通过融合区块链上边缘设备终... 针对电网终端用户安全存在无法认证和认证速度较慢等问题,设计了基于区块链的边缘计算分布式安全认证系统。利用区块链技术的区块链机制实现电网终端用户安全认证的安全、稳定控制。利用边缘计算的分布特征,通过融合区块链上边缘设备终端和Hash分布式存储模型,获取新设备的身份信息,实现对新设备或用户的安全分布式控制认证。将认证后的设备或用户信息上传到核心区块链网络,以减少主机协议转换认证的工作量、提升身份验证的速度。利用委托权益证明(DPoS)共识技术对Hash模型进行改进,解决了Hash模型刷新完身份后无法继续认证的问题。通过试验验证,该系统核算的数据误差率最大为0.7%、最小为0.2%。该系统应用效果显著。 展开更多
关键词 区块链技术 委托权益证明 边缘计算 安全认证 Hash模型 终端入网
在线阅读 下载PDF
Secure Medical Image Retrieval Based on Multi-Attention Mechanism and Triplet Deep Hashing
17
作者 Shaozheng Zhang Qiuyu Zhang +1 位作者 Jiahui Tang Ruihua Xu 《Computers, Materials & Continua》 2025年第2期2137-2158,共22页
Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third... Medical institutions frequently utilize cloud servers for storing digital medical imaging data, aiming to lower both storage expenses and computational expenses. Nevertheless, the reliability of cloud servers as third-party providers is not always guaranteed. To safeguard against the exposure and misuse of personal privacy information, and achieve secure and efficient retrieval, a secure medical image retrieval based on a multi-attention mechanism and triplet deep hashing is proposed in this paper (abbreviated as MATDH). Specifically, this method first utilizes the contrast-limited adaptive histogram equalization method applicable to color images to enhance chest X-ray images. Next, a designed multi-attention mechanism focuses on important local features during the feature extraction stage. Moreover, a triplet loss function is utilized to learn discriminative hash codes to construct a compact and efficient triplet deep hashing. Finally, upsampling is used to restore the original resolution of the images during retrieval, thereby enabling more accurate matching. To ensure the security of medical image data, a lightweight image encryption method based on frequency domain encryption is designed to encrypt the chest X-ray images. The findings of the experiment indicate that, in comparison to various advanced image retrieval techniques, the suggested approach improves the precision of feature extraction and retrieval using the COVIDx dataset. Additionally, it offers enhanced protection for the confidentiality of medical images stored in cloud settings and demonstrates strong practicality. 展开更多
关键词 Secure medical image retrieval multi-attention mechanism triplet deep hashing image enhancement lightweight image encryption
在线阅读 下载PDF
基于信息技术的安全认证协议研究
18
作者 卢爱芬 熊永平 《河北软件职业技术学院学报》 2025年第1期1-4,共4页
单服务器身份认证已无法满足人们的信息安全认证需求,为解决该问题,一种轻量级的身份认证协议,可满足多服务器环境下的人们复杂的需求。协议基于一种创新的加密算法实现对所要发送数据加密,即变形Hash函数。变形Hash函数巧妙结合加密参... 单服务器身份认证已无法满足人们的信息安全认证需求,为解决该问题,一种轻量级的身份认证协议,可满足多服务器环境下的人们复杂的需求。协议基于一种创新的加密算法实现对所要发送数据加密,即变形Hash函数。变形Hash函数巧妙结合加密参数自身包含的汉明权重变量,不仅减少了新变量的引入,还降低了存储空间。从多个攻击类型角度分析,表明提出的身份认证协议可抵抗常见的攻击。 展开更多
关键词 安全认证 多服务器 变形Hash函数 身份认证协议 轻量级
在线阅读 下载PDF
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
19
作者 I.Nasurulla K.Hemalatha +1 位作者 P.Ramachandran S.Parvathi 《Journal of Harbin Institute of Technology(New Series)》 2025年第2期90-104,共15页
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we... Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we propose SecureCons Framework(SCF),a novel consensus-based cryptographic framework designed to enhance resilience against SCAs in cloud environments.SCF integrates a dual-layer approach combining lightweight cryptographic algorithms with a blockchain-inspired consensus mechanism to secure data exchanges and thwart potential side-channel exploits.The framework includes adaptive anomaly detection models,cryptographic obfuscation techniques,and real-time monitoring to identify and mitigate vulnerabilities proactively.Experimental evaluations demonstrate the framework's robustness,achieving over 95%resilience against advanced SCAs with minimal computational overhead.SCF provides a scalable,secure,and efficient solution,setting a new benchmark for side-channel attack mitigation in cloud ecosystems. 展开更多
关键词 Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography
在线阅读 下载PDF
Chameleon Hashes Without Key Exposure Based on Factoring 被引量:2
20
作者 高伟 王学理 谢冬青 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第1期109-113,共5页
Chameleon hash is the main primitive to construct a chameleon signature scheme which provides nonrepudiation and non-transferability simultaneously. However, the initial chameleon hash schemes suffer from the key expo... Chameleon hash is the main primitive to construct a chameleon signature scheme which provides nonrepudiation and non-transferability simultaneously. However, the initial chameleon hash schemes suffer from the key exposure problem: non-transferability is based on an unsound assumption that the designated receiver is willing to abuse his private key regardless of its exposure. Recently, several key-exposure-free chameleon hashes have been constructed based on RSA assumption and SDH (strong Diffie-Hellman) assumption. In this paper, we propose a factoring-based chameleon hash scheme which is proven to enjoy all advantages of the previous schemes. In order to support it, we propose a variant Rabin signature scheme which is proven secure against a new type of attack in the random oracle model. 展开更多
关键词 chameleon signature chameleon hash key-exposure
原文传递
上一页 1 2 78 下一页 到第
使用帮助 返回顶部