期刊文献+
共找到300篇文章
< 1 2 15 >
每页显示 20 50 100
Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions
1
作者 Seo Yeon Moon Byung Hyun Jo +2 位作者 Abir El Azzaoui Sushil Kumar Singh Jong Hyuk Park 《Computers, Materials & Continua》 2025年第7期25-55,共31页
With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these t... With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these technologies face critical security challenges,exacerbated by the emergence of quantum computing,which threatens traditional encryption methods.The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust,quantum-resistant security solutions.To address these challenges,researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography,which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity.This paper reviews the current security practices in IoT and Edge/Fog environments,explores the latest advancements in QKD and PQC technologies,and discusses their integration into distributed computing systems.Additionally,this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations.Finally,we highlight future research directions aimed at improving the scalability,efficiency,and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats. 展开更多
关键词 Edge computing fog computing quantum key distribution security post-quantum cryptography cascade protocol
在线阅读 下载PDF
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
2
作者 Fatima Asiri Wajdan Al Malwi 《Computer Modeling in Engineering & Sciences》 2025年第5期2053-2077,共25页
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica... Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications. 展开更多
关键词 Information security chaotic map modeling post-quantum security quantum image encryption chaotic map image encryption
在线阅读 下载PDF
A Novel Post-Quantum Blind Signature for Log System in Blockchain 被引量:5
3
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Ke Xiao Xin Liu Xiubo Chen Mianxiong Dong 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期945-958,共14页
In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In... In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In orderto ensure the integrity of the log in the current system, many researchers havedesigned it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attackerequipped with a quantum computer can extract the user's private key from thepublic key to generate a forged signature, destroy the structure of the blockchain,and threaten the security of the log system. Thus, blind signature on the lattice inpost-quantum blockchain brings new security features for log systems. In ourpaper, to address these, firstly, we propose a novel log system based on post-quantum blockchain that can resist quantum computing attacks. Secondly, we utilize apost-quantum blind signature on the lattice to ensure both security and blindnessof log system, which makes the privacy of log information to a large extent.Lastly, we enhance the security level of lattice-based blind signature under therandom oracle model, and the signature size grows slowly compared with others.We also implement our protocol and conduct an extensive analysis to prove theideas. The results show that our scheme signature size edges up subtly comparedwith others with the improvement of security level. 展开更多
关键词 Log system post-quantum blockchain LATTICE blind signature privacy protection
在线阅读 下载PDF
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
4
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers ALGORITHM post-quantum Cryptography
暂未订购
Implementation Scheme of Two-Photon Post-Quantum Correlations
5
作者 Cuo-Zhu Pan, Wen-Jing Chu +3 位作者 Ming Yang Qing Yang Gang Zhang Zhuo-Liang Cao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第6期687-693,共7页
The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a ph... The pre-and post-selection processes of the "two-state vector formalism" lead to a fair sampling loophole in Bell test, so it can be used to simulate post-quantum correlations. In this paper, we propose a physical implementation of such a correlation with the help of quantum non-demolition measurement, which is realized via the cross-Kerr nonlinear interaction between the signal photon and a probe coherent beam. The indirect measurement on the polarization state of photon is realized by the direct measurement on the phase shift of the probe coherent beam, which enhances the detection efficiency greatly and leaves the signal photon unabsorbed. The maximal violation of the CHSH inequality 4 can be achieved by pre-and post-selecting maximally entangled states. The reason why we can get the post-quantum correlation is that the selection of the results after measurement opens fair-sampling loophole. The fair-sampling loophole opened here is different from the one usually used in the currently existing simulation schemes for post-quantum correlations,which are simulated by selecting the states to be measured or enlarging the Hilbert space. So, our results present an alternative way to mimic post-quantum correlations. 展开更多
关键词 post-quantum correlation two-state vector formalism fair-sampling loophole linear optics
原文传递
Post-quantum blind signcryption scheme from lattice 被引量:4
6
作者 Huifang YU Lu BAI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第6期891-901,共11页
Blind signcryption(BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous unforgeability and confidentiality. Most traditional BSC schemes are based on the ... Blind signcryption(BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous unforgeability and confidentiality. Most traditional BSC schemes are based on the number theory. However, with the rapid development of quantum computing, traditional BSC systems are faced with severe security threats. As promising candidate cryptosystems with the ability to resist attacks from quantum computing, lattice-based cryptosystems have attracted increasing attention in academic fields. In this paper, a post-quantum blind signcryption scheme from lattice(PQ-LBSCS) is devised by applying BSC to lattice-based cryptosystems. PQ-LBSCS inherits the advantages of the lattice-based cryptosystem and blind signcryption technique. PQ-LBSCS is provably secure under the hard assumptions of the learning with error problem and small integer solution problem in the standard model. Simulations are carried out using the Matlab tool to analyze the computational efficiency, and the simulation results show that PQ-LBSCS is more efficient than previous schemes. PQ-LBSCS has extensive application prospects in e-commerce, mobile communication, and smart cards. 展开更多
关键词 Lattice-based cryptosystem Blind signcryption post-quantum computing Learning with error assumption Small integer solution assumption
原文传递
快速数论变换算法硬件实现研究综述 被引量:1
7
作者 董秀则 于庚辰 +1 位作者 杨鸿刚 高献伟 《北京电子科技学院学报》 2025年第1期26-36,共11页
随着量子计算机的迅速发展,传统密码方案面临严重的安全威胁。在后量子密码方案中,格密码因其高安全性、广泛用途和强灵活性,成为最具潜力的一类。多项式乘法是格密码理论中的关键模块,快速数论变换算法能够显著提升多项式乘法的计算速... 随着量子计算机的迅速发展,传统密码方案面临严重的安全威胁。在后量子密码方案中,格密码因其高安全性、广泛用途和强灵活性,成为最具潜力的一类。多项式乘法是格密码理论中的关键模块,快速数论变换算法能够显著提升多项式乘法的计算速度,从而提高格密码算法的整体效率。这种算法在大规模并行计算和资源受限的环境中表现尤为出色,高性能的快速数论变换硬件实现可以带来显著的计算加速、功耗降低和并行化处理能力,快速数论变换算法的设计直接决定了格密码算法的安全性和高效性。本文简要介绍了格密码理论及其面临的困难问题,探讨了快速数论变换算法的基本概念与结构,并对近年来其在硬件实现方面的进展进行了研究。最后,从公钥加密、数字签名和密钥交换三个方面对相关研究进行了总结与概括。 展开更多
关键词 格密码体制 后量子密码 快速数论变换 多项式乘法
在线阅读 下载PDF
基于后量子密码改进算法的FPGA设计优化 被引量:2
8
作者 田洪亮 王馨语 张海武 《粘接》 2025年第2期155-157,共3页
为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构... 为了提高硬件整体的运算效率,研究提出了一种可以降低Crystals-Kyber算法复杂度的改进算法,硬件实现方式采用基于频率抽取的数论变换(NTT)算法。通过合并NTT计算层减少需要的的内存量,设计了一种迭代型NTT和流水型NTT相结合的硬件结构。与之前其他的设计相比较,基于Crystals-Kyber算法的可编程门阵列(FPGA)优化实现了高效的NTT多项式乘法。实验结果表明,所提方案优化算法使用了较快的计算速度和较少的计算周期,以及较小的面积时间乘积(Area Time,AT),改进的Crystals-Kyber算法与其他算法相比,至少缩短了39.13%的NTT计算周期,并缩短了47.50%计算时间,优化了基于格密码的执行时间和硬件资源开销。 展开更多
关键词 后量子密码 NTT算法 FPGA
在线阅读 下载PDF
Crystals-Dilithium数字签名技术硬件实现综述
9
作者 崔益军 李梦雪 +2 位作者 王辈 王成华 刘伟强 《电子学报》 北大核心 2025年第7期2558-2578,共21页
随着量子计算技术的不断发展,依赖传统公钥密码体制三大功能(密钥协商/数字签名/公钥加密)的各种应用系统将不再安全.为应对量子威胁,以美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)为首的国际标准... 随着量子计算技术的不断发展,依赖传统公钥密码体制三大功能(密钥协商/数字签名/公钥加密)的各种应用系统将不再安全.为应对量子威胁,以美国国家标准与技术研究院(National Institute of Standards and Technology,NIST)为首的国际标准组织积极征集与部署后量子密码(Post Quantum Cryptography,PQC)算法的标准化工作,致力于在真正实用型量子计算机问世之前,提前完成传统公钥密码算法到PQC算法的迁移过渡.Crystals-Dilithium是NIST-PQC标准中的一种基于格的数字签名算法,其安全性高,运算速度快,是实现抵抗量子攻击数字签名算法的重要路径之一.本文从主流Crystals-Dilithium数字签名算法的理论基础出发,从底层关键组件的优化方法和整体硬件构架设计方法着手,围绕硬件资源优化和性能优化等现有方法和成果对比展开分析介绍,为研究者们后续研究探明方向,希望为设计性能与硬件资源均衡的后量子数字签名密码芯片提供有力参考. 展开更多
关键词 后量子密码 格密码 Crystals-Dilithium数字签名 硬件实现 优化方案
在线阅读 下载PDF
具有用户自主链接及验证者条件撤销的格基群签名
10
作者 陈颖 何德彪 +1 位作者 彭聪 罗敏 《软件学报》 北大核心 2025年第10期4444-4460,共17页
群签名作为一种隐私保护的重要技术,为用户匿名性提供良好的保障.然而,普通群签名方案存在可追溯签名者身份的群管理员,与区块链去中心化的特性相悖,难以满足对于隐私性要求更严格的应用场景.结合防双重认证签名技术,提出一种具有用户... 群签名作为一种隐私保护的重要技术,为用户匿名性提供良好的保障.然而,普通群签名方案存在可追溯签名者身份的群管理员,与区块链去中心化的特性相悖,难以满足对于隐私性要求更严格的应用场景.结合防双重认证签名技术,提出一种具有用户自主链接及验证者条件撤销的群签名,较好地实现了用户隐私与平台管理之间的平衡,并给出了格上实例化方案.通过随机谕言机模型下的安全性分析,方案满足无私匿名性、可追溯性和不可诽谤性.通过性能分析,方案的时间开销和通信开销均在可接受范围内.最后,设计了一种基于区块链的后量子安全医疗数据共享条件隐私保护系统,给出方案的具体应用实例. 展开更多
关键词 群签名 后量子密码 区块链 条件隐私保护 格密码
在线阅读 下载PDF
Olithium:基于格的无陷门在线/离线签名方案
11
作者 王后珍 段小超 +2 位作者 文嘉明 王亚辉 张焕国 《计算机学报》 北大核心 2025年第4期877-892,共16页
随着互联网和大数据时代的到来,数据在传输过程中的安全性和效率问题日益凸显。作为保障数据完整性并验证发送者身份的核心技术,数字签名显得尤为重要。与此同时,量子计算机的发展对传统的签名方案构成了巨大威胁。在这一背景下,美国国... 随着互联网和大数据时代的到来,数据在传输过程中的安全性和效率问题日益凸显。作为保障数据完整性并验证发送者身份的核心技术,数字签名显得尤为重要。与此同时,量子计算机的发展对传统的签名方案构成了巨大威胁。在这一背景下,美国国家标准与技术研究院于2023年公布了基于CRYSTALS-Dilithium算法的抗量子签名标准ML-DSA的草案。为了使其能更好地应用于海量的数据传输等场景,本文在此基础上设计了一个无陷门在线/离线签名方案,称之为Olithium。该方案允许签名者在未收到消息时(离线阶段)产生签名的一部分,并在收到消息后(在线阶段)继续完成签名。最终,能在存储空间小幅增加的前提下,将在线签名时间缩短约50%。本文还以数字证书颁发场景为例,说明该方案的现实有效性。 展开更多
关键词 后量子密码 在线/离线签名 数字证书 基于格的密码学 优化实现
在线阅读 下载PDF
面向格密码的可配置NTT硬件快速实现
12
作者 韩炼冰 房利国 +1 位作者 王松 刘鸿博 《通信技术》 2025年第10期1119-1124,共6页
数论变换(NTT)是一种提高多项式乘法计算效率的加速技术。为提高NTT运算速度,提出了一种面向格密码的可配置NTT硬件快速实现方法。该方法通过预计算和预缩放简化计算过程,降低计算复杂度,并利用多级流水线技术提高存取效率,降低蝶形单... 数论变换(NTT)是一种提高多项式乘法计算效率的加速技术。为提高NTT运算速度,提出了一种面向格密码的可配置NTT硬件快速实现方法。该方法通过预计算和预缩放简化计算过程,降低计算复杂度,并利用多级流水线技术提高存取效率,降低蝶形单元运算等待时间。设计了可配置硬件架构,支持配置多个蝶形单元并行计算,提出了可配置多随机存取存储器(RAM)存储设计方案及数据存储分配方法,避免了多个蝶形单元共享内存访问冲突,提高了数据存取效率。最后,在Xilinx公司Artix-7系列现场可编程门阵列(FPGA)中进行了实现评估。结果表明,完成一次NTT运算最快仅需要1.23μs,与相关研究相比运算速度提升了5%~28%。 展开更多
关键词 后量子密码 多项式乘法 数论变换 蝶形运算 FPGA
在线阅读 下载PDF
基于CUDA平台的后量子密码算法babyKyber并行设计
13
作者 肖超恩 余福蓉 +1 位作者 王建新 孙凯勃 《北京电子科技学院学报》 2025年第2期11-20,共10页
针对物联网设备在后量子时代面临的新型安全挑战,本文基于CUDA架构提出面向babyKyber算法的并行优化方案。研究聚焦该算法中多项式乘法与数论变换等核心模块,通过细粒度并行将运算拆解至GPU线程级实现计算加速,同时采用粗粒度并行构建... 针对物联网设备在后量子时代面临的新型安全挑战,本文基于CUDA架构提出面向babyKyber算法的并行优化方案。研究聚焦该算法中多项式乘法与数论变换等核心模块,通过细粒度并行将运算拆解至GPU线程级实现计算加速,同时采用粗粒度并行构建多线程块架构以提升算法吞吐量。特别地,本文通过动态线程块配置实验探索GPU资源利用率优化路径。实验数据表明:优化后的并行方案在NVIDIA GeForce MX150平台实现千万级吞吐量,较CPU平台获得三个数量级的加速增益。该研究为后量子密码算法在资源受限物联网终端的工程化部署提供可行解决方案。 展开更多
关键词 后量子密码 Kyber GPU babyKyber 物联网
在线阅读 下载PDF
Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi
14
作者 Ahmed I.Alutaibi 《Computers, Materials & Continua》 2025年第10期875-903,共29页
The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital ... The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification.This paper proposes a quantum-resilient,blockchain-based identity verification framework designed to address critical challenges in privacy preservation,scalability,and post-quantum security.The proposed model integrates Post-quantum Cryptography(PQC),specifically lattice-based cryptographic primitives,with Decentralized Identifiers(DIDs)and Zero-knowledge Proofs(ZKPs)to ensure verifiability,anonymity,and resistance to quantum attacks.A dual-layer architecture is introduced,comprising an identity layer for credential generation and validation,and an application layer for DeFi protocol integration.To evaluate its performance,the framework is tested on multiple real-world DeFi platforms using metrics such as verification latency,throughput,attack resistance,energy efficiency,and quantum attack simulation.The results demonstrate that the proposed framework achieves 90%latency reduction and over 35%throughput improvement compared to traditional blockchain identity solutions.It also exhibits a high quantum resistance score(95/100),with successful secure verification under simulated quantum adversaries.The revocation mechanism—implemented using Merkle-tree-based proofs—achieves average response times under 40 ms,and the system maintains secure operations with energy consumption below 9 J per authentication cycle.Additionally,the paper presents a security and cost tradeoff analysis using ZKP schemes such as Bulletproofs and STARKs,revealing superior bits-per-byte efficiency and reduced proof sizes.Real-world adoption scenarios,including integration with six major DeFi protocols,indicate a 25%increase in verified users and a 15%improvement in Total Value Locked(TVL).The proposed solution is projected to remain secure until 2041(basic version)and 2043(advanced version),ensuring long-term sustainability and future-proofing against evolving quantum threats.This work establishes a scalable,privacy-preserving identity model that aligns with emerging post-quantum security standards for decentralized ecosystems. 展开更多
关键词 Quantum-resistant cryptography decentralized identity DeFi blockchain zero-knowledge proofs post-quantum security lattice-based encryption
在线阅读 下载PDF
From portfolio optimization to quantum blockchain and security: a systematic review of quantum computing in finance
15
作者 Abha Satyavan Naik Esra Yeniaras +2 位作者 Gerhard Hellstern Grishma Prasad Sanjay Kumar Lalta Prasad Vishwakarma 《Financial Innovation》 2025年第1期2536-2602,共67页
The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the explo... The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas. 展开更多
关键词 Portfolio optimization Fraud detection Derivative pricing Risk calculation Monte carlo Quantum blockchain Quantum-resistant blockchain Digital signature algorithms post-quantum cryptography SECURITY Privacy-preserving blockchain Quantum computing
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
16
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
后摩尔时代集成电路发展的新机遇——第二十期中国计算机学会秀湖会议报告
17
作者 王颖(整理) 金洲(整理) +1 位作者 邵恩(整理) 王梦迪(整理) 《计算》 2025年第2期88-95,共8页
随着摩尔定律的微缩红利逐渐消退,全球半导体行业迈入以多元化技术路径为核心的后摩尔时代。2024年10月,第二十期中国计算机学会(China Computer Federation,CCF)秀湖会议以“后摩尔时代集成电路发展的新机遇”为主题,汇聚学术界与产业... 随着摩尔定律的微缩红利逐渐消退,全球半导体行业迈入以多元化技术路径为核心的后摩尔时代。2024年10月,第二十期中国计算机学会(China Computer Federation,CCF)秀湖会议以“后摩尔时代集成电路发展的新机遇”为主题,汇聚学术界与产业界20余位专家,围绕处理器指令集新生态、新型芯片架构、智能电子设计自动化(electronic design automation,EDA)技术革新与系统先进封装集成四大议题展开深度探讨。会议提出,构建自主可控的人工智能(arificial itelligence,AI)软硬件生态、突破新型存储与存内计算技术瓶颈、推动开源芯片生态全球化、发展面向先进集成技术、量子计算与光计算的智能EDA工具,将成为后摩尔时代技术突破的关键方向。通过跨学科协作与产业链整合,我国有望在A1算力、芯片架构及生态建设领域实现弯道超车,为全球半导体技术变革提供“中国方案”。本文梳理会议核心观点与共识,揭示后摩尔时代技术发展趋势及其对产业创新的深远影响。 展开更多
关键词 后摩尔 处理器指令集 量子计算 智能电子设计自动化
在线阅读 下载PDF
高能效格基后量子密码并行采样算法与硬件结构研究 被引量:1
18
作者 别梦妮 李伟 +3 位作者 付秋兴 陈韬 杜怡然 南龙梅 《电子学报》 北大核心 2025年第2期420-430,共11页
在后量子密码高速演进的过程中,为兼顾灵活性与高效性的需求,本文面向多种格基后量子密码算法提出了一款并行可重构的采样加速器.本文结合数学推导分别提出了7种采样的高效并行实现模型,并从中提炼了4种共同运算逻辑.以这4种共同运算逻... 在后量子密码高速演进的过程中,为兼顾灵活性与高效性的需求,本文面向多种格基后量子密码算法提出了一款并行可重构的采样加速器.本文结合数学推导分别提出了7种采样的高效并行实现模型,并从中提炼了4种共同运算逻辑.以这4种共同运算逻辑为核心,引入数据重排限制运算数据的有效位宽,提高了拒绝采样的接受率并简化了运算逻辑,提出了一种高能效的可重构并行采样算法.为提升采样算法的硬件实现效能,本文采用蝴蝶变换网络在单个时钟周期内完成任意有效位宽数据的并行切分、归并与查找,高效实现了算法前后处理的并行化,构建了参数化的并行可重构采样加速器架构模型,结合实验探索,提出了一款数据带宽为1 024 bit的并行可重构采样加速器.实验结果表明,使用40 nm CMOS工艺库,在ss、125℃工艺角条件下进行后仿,电路最高工作频率可达到667 MHz,平均功耗为0.54 W.完成256点均匀采样需6 ns,完成256点拒绝值小于216的拒绝采样平均仅需22.5 ns,完成256点8 bit以内的二项采样需18 ns,完成509点简单三值采样需36 ns,完成701点非负相关三值采样需124.5 ns,完成509点固定权重三值采样需11.18μs,完成一次Falcon算法中的离散高斯采样需3 ns.与现有研究相比,本文提出的采样器完成一次均匀-拒绝采样的能耗值降低了约30.23%,完成一次二项采样的能耗值降低了约31.6%. 展开更多
关键词 后量子密码算法 采样器 高能效 可重构
在线阅读 下载PDF
后量子密码CRYSTALS-Dilithium的高性能实现 被引量:2
19
作者 方伟钿 蒲金伟 +2 位作者 谢家兴 郑欣 熊晓明 《小型微型计算机系统》 北大核心 2025年第5期1273-1280,共8页
CRYSTALS-Dilithium作为后量子密码标准化竞赛的获胜选手之一,被官方首推为传统公钥转型过渡的格数字签名方案.针对目前算法存在的纯硬件方案少和性能不足等问题,提出一种部署在FPGA端的高性能协处理器.本设计调用2层4组并排的CT和GS蝶... CRYSTALS-Dilithium作为后量子密码标准化竞赛的获胜选手之一,被官方首推为传统公钥转型过渡的格数字签名方案.针对目前算法存在的纯硬件方案少和性能不足等问题,提出一种部署在FPGA端的高性能协处理器.本设计调用2层4组并排的CT和GS蝶形对,采用多级流水线、算子可重构和关键路径优化等技术,避免过长的流水线等待,实现高效的多项式运算单元.完全硬件化哈希、采样和特殊函数等单元,并在狭小的设计空间里组合并优化各模块调度.实验结果表明,所提出的系统工作频率为157MHz,执行最高安全等级的密钥生成、签名和验签仅需64.1us、304.0us和59.4us,相比同平台的硬件协处理器,全流程速度提升约69%. 展开更多
关键词 后量子密码学 数字签名 多项式乘法器 数论变换
在线阅读 下载PDF
格基后量子密码的可重构NTT运算单元与高效调度算法研究
20
作者 付秋兴 李伟 +2 位作者 别梦妮 陈韬 南龙梅 《电子学报》 北大核心 2025年第4期1182-1191,共10页
为进一步提高格基后量子密码算法中多项式乘法的运算速率,同时考虑到不同格基密码中多项式乘法参数各异的现状,本文提出了一种面向高速的可重构数论变换(Number Theoretic Transforms,NTT)运算单元,并提出了相应的数据调度方案解决时序... 为进一步提高格基后量子密码算法中多项式乘法的运算速率,同时考虑到不同格基密码中多项式乘法参数各异的现状,本文提出了一种面向高速的可重构数论变换(Number Theoretic Transforms,NTT)运算单元,并提出了相应的数据调度方案解决时序冲突和空间冲突问题.本文首先分析了不同格基后量子密码算法中NTT算法的运算特征,提出一款4×4的可重构运算单元,满足不同位宽的基2/3/4-NTT运算需求.其次,基于上述硬件设计提出了一种针对基4-NTT算法的数据调度方案,解决了高并行多流水级设计下的时序冲突问题.最后,提出了基于m-着色算法的多Bank数据存储方案,解决数据访问冲突的问题.实验结果表明,本文设计的硬件结构具备实现基2/3/4-NTT及其逆运算功能,能够支持Kyber、Dilithium在内的多种格基后量子密码算法,硬件支持最大并行度为4.为进一步验证本文硬件设计的优越性,在Xilinx Virtex-7器件上进行实验验证,工作频率达169 MHz,可在0.40μs内完成NTT算法功能,ATP降低约42%;在40 nm CMOS工艺节点进行综合实现,与现有的设计相比,本文的硬件设计AT积降低18%~90%. 展开更多
关键词 后量子密码 NTT 可重构 并行化 高速
在线阅读 下载PDF
上一页 1 2 15 下一页 到第
使用帮助 返回顶部