期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
A One-Time Pad Encryption Scheme Based on Efficient Physical-Layer Secret Key Generation for Intelligent IoT System 被引量:1
1
作者 Liquan Chen Kailin Cao +2 位作者 Tianyu Lu Yi Lu Aiqun Hu 《China Communications》 SCIE CSCD 2022年第7期185-196,共12页
The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random k... The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random keys for OTP.In this paper,we propose a joint SKG and OTP encryption scheme with the aid of a reconfigurable intelligent surface(RIS)to boost secret key rate.To maximize the efficiency of secure communication,we divide the process of secure transmission into two stages:SKG and then encrypted packet transmission.Meanwhile,we design an optimal algorithm for allocating time slots for SKG to maximize SKG efficiency without security risk.Furthermore,we design a key updating protocol based on our SKG scheme for OTP encryption.Simulation results verify that our scheme can generate keys securely and efficiently,and significantly improve the secure communication performance in an intelligent IoT system. 展开更多
关键词 physical layer security intelligent internet of things one-time pad reconfigurable intelligent surface
在线阅读 下载PDF
New Constructions of Dynamic Threshold Cryptosystem 被引量:4
2
作者 龙宇 陈克非 毛贤平 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期431-435,共5页
This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. ... This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. We first introduce an identity based dynamic threshold cryptosystem, and then use the CanettiHalevi-Katz(CHK) transformation to transform it into a fully secure system in the traditional public key setting.Finally, the elegant dual system encryption technique is applied to constructing a fully secure dynamic threshold cryptosystem with adaptive security. 展开更多
关键词 threshold cryptosystem dynamic property dual system encryption one-time signature
原文传递
Robust quantum secure direct communication with a quantum one-time pad over a collective-noise channel 被引量:28
3
作者 GU Bin ZHANG ChengYi +1 位作者 CHENG GuoSheng HUANG YuGai 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第5期942-947,共6页
We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a col... We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a collective-noise channel. The two photons in each logical qubit can be produced with a practically entangled source, i.e., a parametric down-conversion source with a beta barium borate crystal and a pump pulse of ultraviolet light. The information is encoded on each logical qubit with two logical unitary operations, which will not destroy the antinoise feather of the quantum systems. The receiver Bob can read out the sender's message directly with two single-photon measurements on each logical qubit, instead of Bell-state measurements, which will make these protocols more convenient in a practical application. With current technology, our two robust QSDC schemes are feasible and may be optimal ones. 展开更多
关键词 quantum secure direct communication quantum one-time pad ROBUST collective noise
原文传递
RIS Enabled Simultaneous Transmission and Key Generation with PPO:Exploring Security Boundary of RIS Phase Shift
4
作者 FAN Kaiqing YAO Yuze +2 位作者 GAO Ning LI Xiao JIN Shi 《ZTE Communications》 2025年第1期11-17,共7页
Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and... Due to the broadcast nature of wireless channels and the development of quantum computers,the confidentiality of wireless communication is seriously threatened.In this paper,we propose an integrated communications and security(ICAS)design to enhance communication security using reconfigurable intelligent surfaces(RIS),in which the physical layer key generation(PLKG)rate and the data transmission rate are jointly considered.Specifically,to deal with the threat of eavesdropping attackers,we focus on studying the simultaneous transmission and key generation(STAG)by configuring the RIS phase shift.Firstly,we derive the key generation rate of the RIS assisted PLKG and formulate the optimization problem.Then,in light of the dynamic wireless environments,the optimization problem is modeled as a finite Markov decision process.We put forward a policy gradient-based proximal policy optimization(PPO)algorithm to optimize the continuous phase shift of the RIS,which improves the convergence stability and explores the security boundary of the RIS phase shift for STAG.The simulation results demonstrate that the proposed algorithm outperforms the benchmark method in convergence stability and system performance.By reasonably allocating the weight factors for the data transmission rate and the key generation rate,“one-time pad”communication can be achieved.The proposed method has about 90%performance improvement for“one-time pad”communication compared with the benchmark methods. 展开更多
关键词 reconfigurable intelligent surfaces physical layer key generation integrated communications and security one-time pad deep reinforcement learning
在线阅读 下载PDF
基于矩阵广义特征逆问题实现的具有数字签名功能的Hill密码体制 被引量:6
5
作者 黄贤通 李文锋 任金威 《航空计算技术》 2007年第2期11-13,共3页
在研究矩阵广义特征逆问题的基础上,对Hill密码体制实施改进,实现了一种具有数字签名功能的Hill密码体制方案,并给出了该方案的详细实现过程。改进后的Hill密码体制具有数字签名功能,能够达到一次一密的效果。
关键词 HILL密码体制 数字签名 矩阵逆问题 一次一密
在线阅读 下载PDF
密钥非均匀分布的完善保密通信系统 被引量:6
6
作者 田传俊 《通信学报》 EI CSCD 北大核心 2018年第11期1-9,共9页
提出了理论上更加严格的无限完善保密性和随机"一次一密"保密通信系统的概念,并将保密通信设计过程划分为基本密码系统设计及其应用设计两个阶段。首先研究了利用正交拉丁方组设计基本密码系统的问题,并举例说明了其非线性加... 提出了理论上更加严格的无限完善保密性和随机"一次一密"保密通信系统的概念,并将保密通信设计过程划分为基本密码系统设计及其应用设计两个阶段。首先研究了利用正交拉丁方组设计基本密码系统的问题,并举例说明了其非线性加密变换的设计方法;然后讨论了利用一类非均匀分布的随机方法设计应用过程中密钥序列的问题,并在理论上严格证明了基于所设计的基本密码系统的随机"一次一密"无限保密通信系统具有完善保密性。这一成果推广了当前常见的基于"模加法密码系统"的随机"一次一密"完善保密通信系统,因而可将其作为序列密码算法设计的一种更广泛的理想模拟原型。由于所能设计的基本密码系统的数量远超过现有常用方法所能设计的基本密码系统的数量,因此,所得结果对当前序列密码算法的主流设计方法是一种有效的补充与完善。 展开更多
关键词 单钥密码系统 完善保密性 非线性基本密码系统 一次一密系统 正交拉丁方组
在线阅读 下载PDF
XTR公钥密制的改进及可证明安全通信协议 被引量:4
7
作者 王泽辉 《通信学报》 EI CSCD 北大核心 2007年第1期22-27,共6页
提出一种新的迹函数,将基于3阶LFSR序列的XTR公钥密码体制(称之为XTR3体制),改进为基于4阶LFSR序列的XTR4公钥密码体制。与XTR3体制比较,同等安全程度下XTR4的密钥长度小于XTR3。提出XTR4体制上的密钥交换协议,可证明安全性保密通信协议... 提出一种新的迹函数,将基于3阶LFSR序列的XTR公钥密码体制(称之为XTR3体制),改进为基于4阶LFSR序列的XTR4公钥密码体制。与XTR3体制比较,同等安全程度下XTR4的密钥长度小于XTR3。提出XTR4体制上的密钥交换协议,可证明安全性保密通信协议,一次一密协议,可以应用于多种环境,既能保证安全性,又能显著地提高运算效率。 展开更多
关键词 公钥密码体制 XTR 迹函数 可证明安全性 通信协议 一次一密
在线阅读 下载PDF
由RSA实现的具有数字签名功能的Hill密码体制 被引量:1
8
作者 任金威 李文锋 《微型电脑应用》 2007年第2期9-10,24,共3页
本文研究了一类矩阵的构造问题,对Hill密码体制实施了改进,实现了一种具有数字签名功能的Hill密码体制方案,给出了该方案的详细实现过程。改进后的Hill密码体制具有数字签名功能,能够达到一次一密的安全效果。
关键词 HILL密码体制 数字签名 矩阵逆问题 一次一密
在线阅读 下载PDF
Analysis and Application of Endogenous Wireless Security Principle for Key Generation 被引量:4
9
作者 Xu Wang Liang Jin +1 位作者 Yangming Lou Xiaoming Xu 《China Communications》 SCIE CSCD 2021年第4期99-114,共16页
The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The funda... The open and broadcast nature of wireless channels leads to the inherent security problem of information leakage in wireless communication.We can utilize endogenous security functions to resolve this problem.The fundamental solution is channel-based mechanisms,like physical layer secret keys.Unfortunately,current investigations have not fully exploited the randomness of wireless channels,making secret key rates not high.Consequently,user data can be encrypted by reducing the data rate to match the secret key rate.Based on the analysis of the endogenous wireless security principle,we proposed that the channel-based endogenous secret key rate can nearly match the maximum data rate in the fast-fading environments.After that,we validated the proposition in an instantiation system with multiple phase shift keying(MPSK)inputs from the perspectives of both theoretical analysis and simulation experiments.The results indicate that it is possible to accomplish the onetime pad without decreasing the data rate via channelbased endogenous keys.Besides,we can realize highspeed endogenously secure transmission by introducing independent channels in the domains of frequency,space,or time.The conclusions derived provide a new idea for wireless security and promote the application of the endogenous security theory. 展开更多
关键词 endogenous wireless security one-time pad physical layer security secret keys generation
在线阅读 下载PDF
基于科学史视角的量子密码
10
作者 古卫芳 《现代电子技术》 2013年第21期83-85,共3页
为了寻求一种无条件安全的密钥系统,采用了科学史的研究方法,对人类历史上产生过巨大影响的密钥思想进行了探究,调研了现在广泛使用的密码系统,特别是RSA密码系统,并指出它的安全性受到量子计算能力的严重挑战,在此基础上探究一次一密... 为了寻求一种无条件安全的密钥系统,采用了科学史的研究方法,对人类历史上产生过巨大影响的密钥思想进行了探究,调研了现在广泛使用的密码系统,特别是RSA密码系统,并指出它的安全性受到量子计算能力的严重挑战,在此基础上探究一次一密与量子密钥分发的结合能否实现无条件安全通信。 展开更多
关键词 RSA密码系统 量子密码 一次一密 量子密钥分发
在线阅读 下载PDF
基于有限域矩阵构造技术和RSA体系的密码体制 被引量:1
11
作者 李文锋 任金威 《网络安全技术与应用》 2007年第3期88-90,共3页
本文研究了有限域矩阵构造技术,对Hill密码体制实施改进,实现了一种具有数字签名功能的Hill密码体制方案,并给出了该方案的详细实现过程。改进后的Hill密码体制具有数字签名功能,能够达到一次一密的效果。
关键词 HILL密码体制 数字签名 矩阵逆问题 一次一密 有限域
原文传递
Security of account and privacy of transaction for bitcoin
12
作者 Liu Zhenhua Yuan Dong +1 位作者 Liu Yaohui Li Yuanyuan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第5期20-30,48,共12页
As a kind of cryptocurrency, bitcoin has attracted much attention with its decentralization. However, there is two problems in the bitcoin transactions : the account security and transaction privacy. In view of the a... As a kind of cryptocurrency, bitcoin has attracted much attention with its decentralization. However, there is two problems in the bitcoin transactions : the account security and transaction privacy. In view of the above problems, a new partially blind threshold signature scheme is proposed, which can both enhance the security of bitcoin account and preserve the privacy of transaction. Firstly, transaction amounts are encrypted by employing the homomorphic Paillier cryptosystem, and output address is disturbed by using one-time public key. Then the encrypted or disrupted transaction information is signed by multiple participants who are authorized by using threshold secret sharing. Compared with partially blind fuzzy signature scheme, the proposed scheme can fully preserve the transaction privacy. Furthermore, performance analysis shows that the proposed scheme is secure and effective in practical applications. 展开更多
关键词 bitcoin account security threshold secret sharing transaction privacy one-time public key Paillier cryptosystem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部