期刊文献+
共找到144篇文章
< 1 2 8 >
每页显示 20 50 100
A Privacy Preserving Deep Linear Regression Scheme Based on Homomorphic Encryption 被引量:1
1
作者 Danping Dong Yue Wu +1 位作者 Lizhi Xiong Zhihua Xia 《Journal on Big Data》 2019年第3期145-150,共6页
This paper proposes a strategy for machine learning in the ciphertext domain.The data to be trained in the linear regression equation is encrypted by SHE homomorphic encryption,and then trained in the ciphertext domai... This paper proposes a strategy for machine learning in the ciphertext domain.The data to be trained in the linear regression equation is encrypted by SHE homomorphic encryption,and then trained in the ciphertext domain.At the same time,it is guaranteed that the error of the training results between the ciphertext domain and the plaintext domain is in a controllable range.After the training,the ciphertext can be decrypted and restored to the original plaintext training data. 展开更多
关键词 linear regression somewhat homomorphic encryption machine learning
在线阅读 下载PDF
Speech Encryption in Linear Canonical Transform Domain Based on Chaotic Dynamic Modulation
2
作者 Liyun Xu Tong Zhang Chao Wen 《Journal of Beijing Institute of Technology》 EI CAS 2021年第3期295-304,共10页
In order to transmit the speech information safely in the channel,a new speech encryp-tion algorithm in linear canonical transform(LCT)domain based on dynamic modulation of chaot-ic system is proposed.The algorithm fi... In order to transmit the speech information safely in the channel,a new speech encryp-tion algorithm in linear canonical transform(LCT)domain based on dynamic modulation of chaot-ic system is proposed.The algorithm first uses a chaotic system to obtain the number of sampling points of the grouped encrypted signal.Then three chaotic systems are used to modulate the corres-ponding parameters of the LCT,and each group of transform parameters corresponds to a group of encrypted signals.Thus,each group of signals is transformed by LCT with different parameters.Fi-nally,chaotic encryption is performed on the LCT domain spectrum of each group of signals,to realize the overall encryption of the speech signal.The experimental results show that the proposed algorithm is extremely sensitive to the keys and has a larger key space.Compared with the original signal,the waveform and LCT domain spectrum of obtained encrypted signal are distributed more uniformly and have less correlation,which can realize the safe transmission of speech signals. 展开更多
关键词 communication security linear canonical transform transform domain encryption chaotic system
在线阅读 下载PDF
A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations 被引量:4
3
作者 张立民 孙克辉 +1 位作者 刘文浩 贺少波 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第10期98-106,共9页
In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic ... In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic sequences, a novel color image encryption algorithm is proposed by employing a hybrid model of bidirectional circular permutation and DNA masking. In this scheme, the pixel positions of image are scrambled by circular permutation, and the pixel values are substituted by DNA sequence operations. In the DNA sequence operations, addition and substraction operations are performed according to traditional addition and subtraction in the binary, and two rounds of addition rules are used to encrypt the pixel values. The simulation results and security analysis show that the hyperchaotic map is suitable for image encryption, and the proposed encryption algorithm has good encryption effect and strong key sensitivity. It can resist brute-force attack, statistical attack, differential attack, known-plaintext, and chosen-plaintext attacks. 展开更多
关键词 color image encryption DNA sequence operation fractional calculus piecewise-linear hyperchaotic system
原文传递
A Novel Fully Homomorphic Encryption Scheme Bsed on LWE 被引量:2
4
作者 DING Yong LI Xiumin +1 位作者 Lü Haifeng LI Xinguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期84-92,共9页
Although the learning with errors(LWE)-based full homomorphic encryption scheme was the first example of deviation from the original Gentry's blueprint, the scheme did not give detailed conversion process of circui... Although the learning with errors(LWE)-based full homomorphic encryption scheme was the first example of deviation from the original Gentry's blueprint, the scheme did not give detailed conversion process of circuit layer structure, and must rely on bootstrapping technique to achieve full homomorphism. Therefore, through modifying the re-linearization technique proposed by the above scheme, a technique called non-matrix key switching is presented, which includes key switching with re-linearization and pure key switching. The complex matrix operations of existing key switching technique are removed. Combining this technique with modulus switching, a (leveled) fully homomorphic encryption scheme without bootstrapping from LWE is constructed. In order to make circuit layer structure clear, the scheme gives detailed refresh door operation. Finally, we use bootstrapping to upgrade arithmetic circuit to any layer, and make the homomorphic computing capability of the scheme have nothing to circuit depth. 展开更多
关键词 fully homomorphic encryption re-linearization key switching modulus switching LWE BOOTSTRAPPING
原文传递
Algebraic Cryptanalysis of GOST Encryption Algorithm
5
作者 Ludmila Babenko Ekaterina Maro 《Journal of Computer and Communications》 2014年第4期10-17,共8页
This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic an... This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define relations between a secret key and a cipher text. Extended linearization method is evaluated as a method for solving the nonlinear sys- tem of equations. 展开更多
关键词 encryption Algorithm GOST GOST S-BOX Systems of MULTIVARIATE QUADRATIC Equations ALGEBRAIC CRYPTANALYSIS Extended linearIZATION Method Gaussian Elimination
在线阅读 下载PDF
Research on the File Encryption and Programming based on Matrix Transformation
6
作者 Jiangtao Geng Qi Huang 《International Journal of Technology Management》 2013年第1期24-26,共3页
Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt f... Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software. 展开更多
关键词 linear transformation file encryption and decryption matrix vc source code
在线阅读 下载PDF
Frequency Hopping Spread Spectrum Security Improvement with Encrypted Spreading Codes in a Partial Band Noise Jamming Environment 被引量:1
7
作者 Amirhossein Ebrahimzadeh Abolfazl Falahati 《Journal of Information Security》 2013年第1期1-6,共6页
Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or unde... Frequency Hopping Spread Spectrum (FHSS) system is often deployed to protect wireless communication from jamming or to preclude undesired reception of the signal. Such themes can only be achieved if the jammer or undesired receiver does not have the knowledge of the spreading code. For this reason, unencrypted M-sequences are a deficient choice for the spreading code when a high level of security is required. The primary objective of this paper is to analyze vulnerability of linear feedback shift register (LFSRs) codes. Then, a new method based on encryption algorithm applied over spreading codes, named hidden frequency hopping is proposed to improve the security of FHSS. The proposed encryption security algorithm is highly reliable, and can be applied to all existing data communication systems based on spread spectrum techniques. Since the multi-user detection is an inherent characteristic for FHSS, the multi-user interference must be studied carefully. Hence, a new method called optimum pair “key-input” selection is proposed which reduces interference below the desired constant threshold. 展开更多
关键词 FREQUENCY HOPPING SPREAD SPECTRUM KEY Distribution Centre KEY encryption KEY linear Feedback Shift REGISTER FREQUENCY HOPPING Code Division Multiple Access Direct Sequence SPREAD SPECTRUM
在线阅读 下载PDF
Analysis of the Design Methods of Word Oriented Linear Feedback Shift Registers
8
作者 ZENG Guang HAN Wenbao HE Kaicheng 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期712-716,共5页
Based on analysis of the structure characteristics and implementation methods of some representative word oriented linear feedback shift registers (LFSRs) in several modem software oriented stream ciphers, this pape... Based on analysis of the structure characteristics and implementation methods of some representative word oriented linear feedback shift registers (LFSRs) in several modem software oriented stream ciphers, this paper firstly classifies the word oriented LFSRs into two classes: the machine instruction type and the arithmetic type. The similarities and differences between each type are illustrated by concrete examples. Then we give a detailed analysis about the word oriented LFSRs in each category from design structure, cryptographic properties and implementation issue aspects. Finally, some basic design criteria for modem word oriented LFSRs and suitable for software implementation are summarized. 展开更多
关键词 stream cipher word oriented design linear feedback shift register (LFSR) fast software encryption
原文传递
A LINEARIZATION ATTACK ON MODIFIED E_0 ALGORITHM
9
作者 Guan Jie Liu Jiandong 《Journal of Electronics(China)》 2006年第3期410-412,共3页
A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be... A linearization attack on the Key Stream Generator (KSG) of the modified Eo algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be recovered by a linearization attack with O(2^60.52) operations by solving a System of Linear Equations (SLE) with at most 2^20.538 unknowns. Frederik Armknecht [Cryptology ePrint Archive, 2002/191] proposed a linearization attack on the KSG olEo algorithm with O(2^70.341) operations by solving an SLE with at most 2^24.056 unknowns, so the modification proposed by Hermelin reduces the ability or E0 to resist the linearization attack by comparing with the results ofFrederik Armknecht. 展开更多
关键词 E0 encryption system Stream cipher linearization attack
在线阅读 下载PDF
Linear-Differential Cryptanalysis for SPN Cipher Structure and AES
10
作者 WEI Yongzhuang HU Yupu 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期37-40,共4页
A new attack on block ciphers is introduced, which is termed linear-differential cryptanalysis. It bases the combining of linear cryptanalysis and differential cryptanalysis, and works by using linear-differential pro... A new attack on block ciphers is introduced, which is termed linear-differential cryptanalysis. It bases the combining of linear cryptanalysis and differential cryptanalysis, and works by using linear-differential probability (LDP). Moreover, we present a new method for upper bounding the maximum linear-differential probability (MLDP) for 2 rounds of substitution permutation network (SPN) cipher structure. When our result applies to 2-round advanced encryption standard(AES), It is shown that the upper bound of MLDP is up to 1.68×2^-19, which extends the known results for the 2-round SPN. Furthermore, when using a recursive technique, we obtain that the MLDP for 4 rounds of AES is bounded by 2^-73. 展开更多
关键词 linear-differential cryptanalysis substitution permutation network advanced encryption standard (AES).
在线阅读 下载PDF
面向无线传感网络安全的轻量级加密算法研究 被引量:1
11
作者 石鲁生 朱慧博 《传感技术学报》 北大核心 2025年第1期168-173,共6页
轻量级加密算法需在保证安全性的同时尽可能地降低计算和存储资源的消耗,以适应传感器节点的硬件限制。为同时提高数据传输的安全性和准确性,降低传感器节点能耗和计算量,提出面向无线传感网络安全的轻量级加密算法。建立传感器节点分... 轻量级加密算法需在保证安全性的同时尽可能地降低计算和存储资源的消耗,以适应传感器节点的硬件限制。为同时提高数据传输的安全性和准确性,降低传感器节点能耗和计算量,提出面向无线传感网络安全的轻量级加密算法。建立传感器节点分簇模型,为簇首分配相应的对称密钥;利用TCDCP算法构建WSN线性回归模型,采集经过密钥分配处理后的感知数据;引入流密钥的轻量级同态加密算法,实现对感知数据的加密、解密处理,增强无线传感网络安全性能。仿真结果表明,所提算法的加密、解密时间分别为1.01 s、1.05 s,解密成功率平均值为97.0%,RAM空间、ROM空间占用字节数分别为770 kB、800 kB,能耗为82 mJ。所提方法能够有效地保护无线传感网络数据的机密性和完整性,降低资源消耗。 展开更多
关键词 无线传感网络 轻量级加密算法 分簇模型 线性回归模型 感知数据采集
在线阅读 下载PDF
格上高效且可撤销的密文策略属性基加密方案 被引量:1
12
作者 姜美羡 高军涛 裴焘 《系统工程与电子技术》 北大核心 2025年第4期1364-1373,共10页
针对格上属性基加密方案中存在的运算效率低、访问策略表达能力不够灵活、不具备撤销功能的问题,提出一种格上高效表达且可撤销的密文策略属性基加密方案。在环上带误差学习困难问题下,采用小策略矩阵和更高基数的采样算法降低了方案的... 针对格上属性基加密方案中存在的运算效率低、访问策略表达能力不够灵活、不具备撤销功能的问题,提出一种格上高效表达且可撤销的密文策略属性基加密方案。在环上带误差学习困难问题下,采用小策略矩阵和更高基数的采样算法降低了方案的累计误差,提升了运算效率。将线性秘密共享技术和环上带误差学习困难问题结合,实现了访问策略的高效灵活表达;此外,在该访问策略下加入直接撤销,使方案在具有高效表达性的同时,也具备了用户撤销功能。所提方案在环上带误差学习困难问题下可以抵抗选择性明文攻击。实验仿真比较结果表明了所提方案的有效性和实用性。 展开更多
关键词 属性基加密 线性秘密共享 用户撤销 环上带误差学习 小策略矩阵
在线阅读 下载PDF
边云辅助下的可撤销属性加密方案
13
作者 张伟航 钟永彦 +1 位作者 向元柱 丁士旵 《计算机工程》 北大核心 2025年第7期244-253,共10页
物联网(IoT)设备数据上云已成为主流数据管理方案,但云端数据管理存在安全风险。为确保数据机密性并防止未授权访问,属性访问控制(ABAC)被认为是一种有效的解决方案。然而,现有加密方案负担重、撤销机制不完善,不适用于动态的物联网环境... 物联网(IoT)设备数据上云已成为主流数据管理方案,但云端数据管理存在安全风险。为确保数据机密性并防止未授权访问,属性访问控制(ABAC)被认为是一种有效的解决方案。然而,现有加密方案负担重、撤销机制不完善,不适用于动态的物联网环境,为此提出了边云辅助下的可撤销属性加密方案(ECA-RABE)。该方案采用椭圆曲线加密(ECC)技术降低计算开销;支持多属性机构分担属性管理减少单点故障问题;引入边缘节点(EN)降低物联网设备的计算负载;利用云计算预解密降低用户侧计算压力;引入属性版本号以及系统版本号,设计撤销机制实现用户属性撤销、系统全局属性撤销以及用户撤销。安全性分析与性能分析表明,所提方案在决策双线性Diffie-Hellman(DBDH)假设下是安全的,并且加、解密效率高,更适用于物联网环境。 展开更多
关键词 属性加密 边缘计算 访问控制 线性秘密共享方案 加密外包 解密外包
在线阅读 下载PDF
基于同态加密技术的新型电力系统网络信息检索方法
14
作者 高丽红 韩少卿 +1 位作者 郑涛 张冬亚 《河北电力技术》 2025年第1期59-65,共7页
新型电力系统中的数据包含个人用户的用电习惯、位置信息等敏感数据,未经处理的敏感数据会成为网络攻击的目标,增加电力系统的安全风险,攻击者会篡改或伪造数据,从而影响检索结果的准确性。为此,提出基于同态加密技术的新型电力系统网... 新型电力系统中的数据包含个人用户的用电习惯、位置信息等敏感数据,未经处理的敏感数据会成为网络攻击的目标,增加电力系统的安全风险,攻击者会篡改或伪造数据,从而影响检索结果的准确性。为此,提出基于同态加密技术的新型电力系统网络信息检索方法。引入同态加密技术,结合伪随机序列法,获取有限域中新型电力系统网络信息的残差分量。利用主密钥创建信息加密的标识位序列,融合同态加密和线性迭代函数,增强信息检索的准确性和安全性。对加解密后的信息展开Fourier变换,根据轮廓系数,获取密文检索对应索引并对其进行后置操作,实现新型电力系统网络信息高效检索。仿真结果表明,应用所提方法后,针对所有攻击类型的平均防御成功率在0.98以上,归一化折损累计增益(normalized discounted cumulative gain,NDCG)数值在0.90以上,同时能够有效地满足用户对快速准确检索信息的需求,在实验环境条件下,所提方法的检索时间最长仅为130 ms,检索性能更高效。 展开更多
关键词 同态加密技术 新型电力系统 网络信息 信息检索 线性迭代函数
在线阅读 下载PDF
基于LSSS共享矩阵无授权策略的属性密码解密效率提高方案 被引量:10
15
作者 刘梦君 刘树波 +3 位作者 王颖 王晶 李永凯 曹辉 《电子学报》 EI CAS CSCD 北大核心 2015年第6期1065-1072,共8页
在基于LSSS(Linear Secret-Sharing Schemes)共享矩阵的属性密码方案中,为了获得相对较高的解密效率,需要剔除授权集合中冗余参与方在解密时的计算.为达到这一目的,现有方案都需要使用授权策略进行最小参与方搜寻,而在一些应用场合下,... 在基于LSSS(Linear Secret-Sharing Schemes)共享矩阵的属性密码方案中,为了获得相对较高的解密效率,需要剔除授权集合中冗余参与方在解密时的计算.为达到这一目的,现有方案都需要使用授权策略进行最小参与方搜寻,而在一些应用场合下,授权策略的出现是不安全的.如果不使用授权策略,现有的解密优化方案便无法运行.本文提出一种LSSS共享矩阵下,无授权策略的属性密码解密效率提高方案.理论分析和实验表明,它可以在无授权策略情况下,找到最小参与方集合,从而提高了解密效率. 展开更多
关键词 属性加密 LSSS(linear Secret-Sharing Schemes)共享矩阵 解密效率
在线阅读 下载PDF
基于一维混沌映射的图像加密方法 被引量:5
16
作者 于为中 马红光 +1 位作者 王令欢 赵星阳 《计算机应用》 CSCD 北大核心 2005年第1期141-143,共3页
由于混沌系统对初始条件和混沌参数非常敏感,以及生成的混沌序列具有非周期性和伪随机性的特性,近年来在图像加密领域得到了较多的应用。提出了一种基于参数随机变化的混沌映射的密码生成方法,生成一个随机性好,长周期的密钥序列并给出... 由于混沌系统对初始条件和混沌参数非常敏感,以及生成的混沌序列具有非周期性和伪随机性的特性,近年来在图像加密领域得到了较多的应用。提出了一种基于参数随机变化的混沌映射的密码生成方法,生成一个随机性好,长周期的密钥序列并给出了统计特性分析的严格的理论证明。用此序列进行图像加解密实验,对结果分析表明提出的算法能够得到令人满意的加密效果。 展开更多
关键词 混沌 图像加密 一维线性映射 混沌退化
在线阅读 下载PDF
一种IND-CCA2完全匿名的短群签名 被引量:4
17
作者 张跃宇 陈杰 +1 位作者 苏万力 王育民 《计算机学报》 EI CSCD 北大核心 2007年第10期1865-1871,共7页
基于线性假设下的Cramer-Shoup加密方案和SDH假设,提出一种新的SDH问题的零知识证明协议,并基于此协议构造了一种在Bellare-Micciancio-Warinshi模型下可证明安全的短群签名方案.该方案具有IND-CCA2完全匿名性,允许攻击者在攻击完全匿... 基于线性假设下的Cramer-Shoup加密方案和SDH假设,提出一种新的SDH问题的零知识证明协议,并基于此协议构造了一种在Bellare-Micciancio-Warinshi模型下可证明安全的短群签名方案.该方案具有IND-CCA2完全匿名性,允许攻击者在攻击完全匿名性时提问打开预言机.签名的长度仅为1704bits. 展开更多
关键词 群签名 完全匿名性 线性cramer-shoup加密 IND-CCA2安全 判定线性假设
在线阅读 下载PDF
一种新的多涡卷混沌模型在图像加密中的应用 被引量:11
18
作者 刘嵩 韦亚萍 +1 位作者 刘静漪 张国平 《华中师范大学学报(自然科学版)》 CAS CSCD 北大核心 2020年第1期36-44,共9页
提出了一种能产生多涡卷的5阶超混沌系统,分析了该系统的平衡点、耗散性、Lyapunov指数等基本动力学特性.应用该混沌系统产生的伪随机序列构建随机矩阵和扩散矩阵,并对图像像素进行置乱和扩散,得到加密图像.在MATLAB平台进行了密钥空间... 提出了一种能产生多涡卷的5阶超混沌系统,分析了该系统的平衡点、耗散性、Lyapunov指数等基本动力学特性.应用该混沌系统产生的伪随机序列构建随机矩阵和扩散矩阵,并对图像像素进行置乱和扩散,得到加密图像.在MATLAB平台进行了密钥空间分析、密钥敏感性分析、相关性分析、信息熵分析和抗剪切分析等.实验结果表明:本算法能够有效地抵御攻击,具有良好的加密效果. 展开更多
关键词 多涡卷 混沌 图像加密 分段线性 满秩
在线阅读 下载PDF
异构分布的多元线性回归隐私保护模型 被引量:11
19
作者 方炜炜 任江 夏红科 《计算机研究与发展》 EI CSCD 北大核心 2011年第9期1685-1692,共8页
隐私保护是数据挖掘领域中一个极其重要而富有挑战性的课题,以实现隐私数据的保护和准确知识的挖掘两者兼得为其最终目标.统计回归是数据挖掘的常用工具之一,而数据分布式存储情况下统计分析的研究工作甚少.由于机密性或其他原因,数据... 隐私保护是数据挖掘领域中一个极其重要而富有挑战性的课题,以实现隐私数据的保护和准确知识的挖掘两者兼得为其最终目标.统计回归是数据挖掘的常用工具之一,而数据分布式存储情况下统计分析的研究工作甚少.由于机密性或其他原因,数据拥有者往往不情愿与其他合作方分享原始数据,去又希望与其他合作方共同协作执行统计分析.关注于如何解决既获取准确统计分析结果又保护原始数据隐私的平衡问题,基于环同态和离散对数计算困难的思想,建立了隐私保护回归模型,该模型通过同态公钥加密协议的同态性质从而获取准确的统计分析结果.经理论分析和实验证明该协议模型在语义上是安全的和有效的. 展开更多
关键词 安全多方计算 数据挖掘 线性回归 隐私保护 同态加密 密码学
在线阅读 下载PDF
基于混沌的变参数数字图像加密方法 被引量:3
20
作者 张蓓 王顺宏 +1 位作者 马红光 于宁宇 《计算机测量与控制》 CSCD 2007年第6期772-774,共3页
针对图像数据的存储特点,应用离散混沌动力系统设计了一种图像加密算法,该方法所有的密钥都由离散混沌映射产生,并在混沌映射过程中改变控制参数,改变了流密码“一次一密”的基本加密方法,增加了算法复杂度;仿真结果表明该算法能够有效... 针对图像数据的存储特点,应用离散混沌动力系统设计了一种图像加密算法,该方法所有的密钥都由离散混沌映射产生,并在混沌映射过程中改变控制参数,改变了流密码“一次一密”的基本加密方法,增加了算法复杂度;仿真结果表明该算法能够有效地实现对数字图像的加密/解密,满足保密通信的要求。 展开更多
关键词 逐段线性混沌映射(Pwlcm) 加密/解密 数字图像 线性复杂度
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部