期刊文献+
共找到4,897篇文章
< 1 2 245 >
每页显示 20 50 100
Performance Evaluation of TLS1.3 Based on Post-Quantum Cryptography
1
作者 SONG Zhen-Yu ZHENG Jie-Yu ZHAO Yun-Lei 《密码学报(中英文)》 北大核心 2026年第1期199-218,共20页
Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computat... Post-quantum transport layer security(PQ-TLS)is capable of effectively defending against quantum threats to current network communications,whereas its larger public key and certificate sizes as well as higher computational overhead may result in a significant performance reduction compared with conventional TLS.In this paper,we present a systematic evaluation of PQ-TLS performance across diverse deployment scenarios to address the following critical research questions.(1)What is the performance behavior of PQ-TLS across different TLS modes?(2)How does PQ-TLS perform across varying client scales?(3)Which network topology is most suitable for PQ-TLS?(4)How does PQ-TLS perform on personal computers(PCs)compared to embedded IoT devices?To the best of our knowledge,this is the first work to comprehensively address these issues,offering implementers some insights into PQ-TLS performance and guidance for optimizing it across diverse scenarios. 展开更多
关键词 quantum security post-quantum cryptography transport layer security network emulation Internet measurement
在线阅读 下载PDF
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
2
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers ALGORITHM post-quantum cryptography
暂未订购
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
3
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
Lightweight Hash-Based Post-Quantum Signature Scheme for Industrial Internet of Things
4
作者 Chia-Hui Liu 《Computers, Materials & Continua》 2026年第2期1041-1058,共18页
TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,th... TheIndustrial Internet of Things(IIoT)has emerged as a cornerstone of Industry 4.0,enabling large-scale automation and data-driven decision-making across factories,supply chains,and critical infrastructures.However,the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping,data tampering,and device impersonation.While digital signatures are indispensable for ensuring authenticity and non-repudiation,conventional schemes such as RSA and ECCare vulnerable to quantumalgorithms,jeopardizing long-termtrust in IIoT deployments.This study proposes a lightweight,stateless,hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT.The design introduces two key optimizations:(1)Forest ofRandomSubsets(FORS)onDemand,where subset secret keys are generated dynamically via a PseudoRandom Function(PRF),thereby minimizing storage overhead and eliminating key-reuse risks;and(2)Winternitz One-Time Signature Plus(WOTS+)partial hash-chain caching,which precomputes intermediate hash values at edge gateways,reducing device-side computations,latency,and energy consumption.The architecture integrates a multi-layerMerkle authentication tree(Merkle tree)and role-based delegation across sensors,gateways,and a Signature Authority Center(SAC),supporting scalable cross-site deployment and key rotation.Froma theoretical perspective,we establish a formal(Existential Unforgeability under Chosen Message Attack)EUF-CMA security proof using a game-based reduction framework.The proof demonstrates that any successful forgerymust reduce to breaking the underlying assumptions of PRF indistinguishability,(second)preimage resistance,or collision resistance,thus quantifying adversarial advantage and ensuring unforgeability.On the implementation side,our design achieves a balanced trade-off between postquantum security and lightweight performance,offering concrete deployment guidelines for real-time industrial systems.In summary,the proposed method contributes both practical system design and formal security guarantees,providing IIoT with a deployable signature substrate that enhances resilience against quantum-era threats and supports future extensions such as device attestation,group signatures,and anomaly detection. 展开更多
关键词 Industrial Internet of Things(IIoT) post-quantum cryptography hash-based signatures SPHINCS+
在线阅读 下载PDF
Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions
5
作者 Seo Yeon Moon Byung Hyun Jo +2 位作者 Abir El Azzaoui Sushil Kumar Singh Jong Hyuk Park 《Computers, Materials & Continua》 2025年第7期25-55,共31页
With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these t... With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these technologies face critical security challenges,exacerbated by the emergence of quantum computing,which threatens traditional encryption methods.The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust,quantum-resistant security solutions.To address these challenges,researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography,which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity.This paper reviews the current security practices in IoT and Edge/Fog environments,explores the latest advancements in QKD and PQC technologies,and discusses their integration into distributed computing systems.Additionally,this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations.Finally,we highlight future research directions aimed at improving the scalability,efficiency,and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats. 展开更多
关键词 Edge computing fog computing quantum key distribution security post-quantum cryptography cascade protocol
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
6
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
7
作者 Fatima Asiri Wajdan Al Malwi 《Computer Modeling in Engineering & Sciences》 2025年第5期2053-2077,共25页
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica... Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications. 展开更多
关键词 Information security chaotic map modeling post-quantum security quantum image encryption chaotic map image encryption
在线阅读 下载PDF
Sine-Polynomial Chaotic Map(SPCM):A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks
8
作者 David S.Bhatti Annas W.Malik +1 位作者 Haeung Choi Ki-Il Kim 《Computers, Materials & Continua》 2025年第10期2157-2177,共21页
Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a n... Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions,leveraging a piecewise function to achieve a broad chaotic range()and a high Lyapunov exponent(5.04).Validated through nine benchmarks,including standard randomness tests,Diehard tests,and Shannon entropy(3.883),SPCM demonstrates superior randomness and high sensitivity to initial conditions.Applied to image encryption,SPCM achieves 0.152582 s(39%faster than some techniques)and 433.42 KB/s throughput(134%higher than some techniques),setting new benchmarks for chaotic map-based methods in WSNs.Chaos-based permutation and exclusive or(XOR)diffusion yield near-zero correlation in encrypted images,ensuring strong resistance to Statistical Attacks(SA)and accurate recovery.SPCM also exhibits a strong avalanche effect(bit difference),making it an efficient,secure solution for WSNs in domains like healthcare and smart cities. 展开更多
关键词 Chaos theory chaotic system image encryption cryptography wireless sensor networks(WSNs)
在线阅读 下载PDF
Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms
9
作者 Ehan Sohn Sangmyung Lee +3 位作者 Sunggon Kim Kiwook Sohn Manish Kumar Yongseok Son 《Computer Modeling in Engineering & Sciences》 2025年第11期2761-2785,共25页
With the accelerated growth of the Internet of Things(IoT),real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local.Since these d... With the accelerated growth of the Internet of Things(IoT),real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local.Since these devices often handle personal information under limited resources,cryptographic algorithms must be executed efficiently.Their computational characteristics strongly affect system performance,making it necessary to analyze resource impact and predict usage under diverse configurations.In this paper,we analyze the phase-level resource usage of AES variants,ChaCha20,ECC,and RSA on an edge device and develop a prediction model.We apply these algorithms under varying parallelism levels and execution strategies across key generation,encryption,and decryption phases.Based on the analysis,we train a unified Random Forest model using execution context and temporal features,achieving R2 values up to 0.994 for power and 0.988 for temperature.Furthermore,the model maintains practical predictive performance even for cryptographic algorithms not included during training,demonstrating its ability to generalize across distinct computational characteristics.Our proposed approach reveals how execution characteristics and resource usage interacts,supporting proactive resource planning and efficient deployment of cryptographic workloads on edge devices.As our approach is grounded in phase-level computational characteristics rather than in any single algorithm,it provides generalizable insights that can be extended to a broader range of cryptographic algorithms that exhibit comparable phase-level execution patterns and to heterogeneous edge architectures. 展开更多
关键词 Internet of Things(IoT) cryptography power efficient computing performance modeling
在线阅读 下载PDF
Consensus⁃Based Cryptographic Framework for Side⁃Channel Attack Resilience in Cloud Environments
10
作者 I.Nasurulla K.Hemalatha +1 位作者 P.Ramachandran S.Parvathi 《Journal of Harbin Institute of Technology(New Series)》 2025年第2期90-104,共15页
Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we... Cloud environments are essential for modern computing,but are increasingly vulnerable to Side-Channel Attacks(SCAs),which exploit indirect information to compromise sensitive data.To address this critical challenge,we propose SecureCons Framework(SCF),a novel consensus-based cryptographic framework designed to enhance resilience against SCAs in cloud environments.SCF integrates a dual-layer approach combining lightweight cryptographic algorithms with a blockchain-inspired consensus mechanism to secure data exchanges and thwart potential side-channel exploits.The framework includes adaptive anomaly detection models,cryptographic obfuscation techniques,and real-time monitoring to identify and mitigate vulnerabilities proactively.Experimental evaluations demonstrate the framework's robustness,achieving over 95%resilience against advanced SCAs with minimal computational overhead.SCF provides a scalable,secure,and efficient solution,setting a new benchmark for side-channel attack mitigation in cloud ecosystems. 展开更多
关键词 Cloud computing side channel attacks HAVAL cryptographic hash Wilcoxon signed⁃rank test consensus mechanism improved schmidt⁃samoa cryptography
在线阅读 下载PDF
格上基于零知识证明的可追踪环签名方案
11
作者 孟慧 桑梓鑫 +1 位作者 汤永利 闫玺玺 《重庆邮电大学学报(自然科学版)》 北大核心 2026年第1期49-57,共9页
针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒... 针对目前格上环签名方案在环成员数量较多的情况下,签名效率低下且签名尺寸和公钥尺寸过大的问题,基于零知识证明,使用E-MLWE(extended module learning with errors)和MSIS(module short interger solution)问题降低了公钥大小,结合拒绝采样算法和追踪机制设计了一种可追踪环签名方案,签名算法中使用递归算法压缩了承诺的大小,进一步降低了签名尺寸,在随机预言机模型下证明方案满足可链接性、匿名性和抗陷害性。性能分析表明,签名尺寸与环成员数量为对数大小关系,在环成员数量较多时,公钥的存储开销和签名的通信开销具有明显优势。 展开更多
关键词 环签名 递归 格密码 零知识证明
在线阅读 下载PDF
智能汽车基础地图众源更新安全合规技术探讨
12
作者 马照亭 章炜 +4 位作者 马小龙 方驰宇 潘忠凯 赵占杰 赵永坤 《测绘地理信息》 2026年第2期34-40,共7页
众源更新是当前阶段保持智能汽车基础地图动态更新的必要、可行手段,但其在安全合规方面一直没有得到充分认可。本文在分析众源更新模式下可能存在的安全风险基础上,设计了融合地理信息保密处理和商用密码技术的智能汽车基础地图众源更... 众源更新是当前阶段保持智能汽车基础地图动态更新的必要、可行手段,但其在安全合规方面一直没有得到充分认可。本文在分析众源更新模式下可能存在的安全风险基础上,设计了融合地理信息保密处理和商用密码技术的智能汽车基础地图众源更新安全合规技术框架,研究了车端测绘装备及云端地图平台可信身份核验、地理围栏白名单可控范围汇聚、车端坐标与敏感内容安全处理和车云数据流转监控等关键技术。实践与分析表明,本技术框架符合现行相关法律法规,可在保障地理信息安全的前提下满足智能汽车基础地图动态更新的迫切需求,为主管部门认可、规范智能汽车基础地图众源更新模式奠定了技术基础。 展开更多
关键词 智能汽车 众源更新 地理信息安全 商用密码
原文传递
产教协同视域下密码学课程OBE重构及效果实证
13
作者 杨恒伏 周聪 《计算机时代》 2026年第4期91-95,共5页
针对新工科背景下密码学课程与产业脱节、能力培养模糊的问题,本文研究以校企联合调研为基础,剖析教学短板,提取“卓越密码工程师”核心能力维度,融合行业认证标准与OBE理念,构建可量化、可落地的课程目标体系。通过引入整数规划模型设... 针对新工科背景下密码学课程与产业脱节、能力培养模糊的问题,本文研究以校企联合调研为基础,剖析教学短板,提取“卓越密码工程师”核心能力维度,融合行业认证标准与OBE理念,构建可量化、可落地的课程目标体系。通过引入整数规划模型设计课程结构,兼顾能力覆盖、产业动态变化与高校教学实际,优化课程内容、学时与产教融合模式。课程按“基础—核心—实战”三阶段设置,贯穿三年学习周期。准实验研究与测评结果表明,重构后的课程显著提升了学生的密码工程实践能力、知识综合运用能力与就业竞争力,为同类工科专业课程改革提供了可借鉴的示范路径。 展开更多
关键词 OBE理念 密码学课程 新工科 整数规划模型
在线阅读 下载PDF
OFD版式文档体系在智慧医疗中的创新应用与优化路径探讨
14
作者 张晓东 杨丰华 《中国数字医学》 2026年第2期66-71,共6页
探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出... 探讨了OFD版式文档体系在智慧医疗领域的应用,阐述了OFD版式文档体系的特点及其在智慧医疗中的具体应用场景,包括智慧病案无纸化全生命周期管理、跨医疗机构病历共享和长期安全保存。分析了其在智慧医疗实践中的优势,针对现存问题提出优化策略,并展望未来发展前景。 展开更多
关键词 智慧医疗 OFD版式文档 国密算法
在线阅读 下载PDF
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks 被引量:1
15
作者 Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita 《Digital Communications and Networks》 SCIE CSCD 2024年第4期989-1000,共12页
The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to secur... The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment. 展开更多
关键词 Internet of things AUTHENTICATION post-quantum cryptography Lattice-based cryptography Cloud computing Fog computing FAIL-SAFE
在线阅读 下载PDF
NTRU_SSS:Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing 被引量:1
16
作者 Asma Ibrahim Hussein Abeer Tariq MaoLood Ekhlas Khalaf Gbashi 《Computers, Materials & Continua》 SCIE EI 2023年第7期753-769,共17页
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).... With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency. 展开更多
关键词 post-quantum cryptography NTRU Shamir’s secret sharing public key
在线阅读 下载PDF
针对格密码算法Kyber与Dilithium的能耗侧信道防护技术
17
作者 李延斌 郭奕康 +3 位作者 张舒琪 唐明 葛春鹏 徐秋亮 《计算机学报》 北大核心 2026年第4期952-978,共27页
随着量子计算技术的迅猛发展,传统公钥密码体系面临重大安全威胁,后量子密码(PQC)成为新一代密码标准化的核心方向。美国国家标准与技术研究院(NIST)于2024年将基于模块化格上学习问题的Kyber算法和Dilithium算法分别确立为FIPS203密钥... 随着量子计算技术的迅猛发展,传统公钥密码体系面临重大安全威胁,后量子密码(PQC)成为新一代密码标准化的核心方向。美国国家标准与技术研究院(NIST)于2024年将基于模块化格上学习问题的Kyber算法和Dilithium算法分别确立为FIPS203密钥封装机制标准和FIPS204数字签名算法标准。在后量子密码的过渡过程中,实际环境中的物理安全性也逐渐被关注。格密码特有的多项式环运算、数论变换、消息编解码、边界检查、FO变换等操作导致其能耗侧信道泄露模式与传统密码存在显著差异,格密码泄露面广、算子种类多、运算复杂等特点对防护实现带来了巨大挑战。本文重点以Kyber和Dilithium为研究对象,系统梳理其侧信道脆弱点与防护目标,并对现有防护技术进行深入分析与评估:(1)揭示格密码侧信道攻击的脆弱性分布,进行泄露机理分析,归纳关键泄露点;(2)提出涵盖不同脆弱点的整体防护架构,对算子(如NTT、编解码等)的防护思路、实现难点进行分析,构建覆盖Kyber与Dilithium的防护全景图;(3)从设计思想、实现代价及优化方向评估现有方案,对防护方案给出实现建议,指出开销瓶颈与未来挑战。本研究为格密码侧信道防护提供理论参考与技术路线支撑,助力后量子密码在实际密码设备中的高效安全部署。 展开更多
关键词 格密码 后量子密码 侧信道分析 侧信道防护 Kyber Dilithium
在线阅读 下载PDF
基于SM2算法的无证书多重签名及其在区块链交易中的应用
18
作者 朱炳丞 周凤 +3 位作者 田有亮 向阿新 熊伟 彭长根 《计算机工程》 北大核心 2026年第4期290-301,共12页
多重签名广泛应用于区块链交易方案,随着区块链应用国产化需求的不断增长,安全高效的SM2算法日益缺少多重签名方面的研究。此外,现有方案大多依赖公钥基础设施(PKI)体系来实现证书管理,存在效率和可扩展性问题。为此,提出一种基于SM2算... 多重签名广泛应用于区块链交易方案,随着区块链应用国产化需求的不断增长,安全高效的SM2算法日益缺少多重签名方面的研究。此外,现有方案大多依赖公钥基础设施(PKI)体系来实现证书管理,存在效率和可扩展性问题。为此,提出一种基于SM2算法的无证书多重签名方案。首先,在SM2密钥生成阶段引入无证书密码机制,避免代价高昂的证书管理,设计密钥持有证明,抵御恶意密钥攻击;其次,通过引入树形结构,设计"线上-线下"的SM2多重签名算法,实现签名生成的高效性和高可扩展性,并在随机预言机模型(ROM)下证明该方案满足选择消息攻击下的存在性不可伪造性(EUF-CMA);最后,将所提方案应用于Hyperledger Fabric联盟链,优化区块链交易流程。性能分析结果表明,与现有签名方案相比,所提方案在保证安全性的前提下,有效降低了计算开销和通信开销。 展开更多
关键词 区块链 多重签名 SM2算法 无证书密码 随机预言机模型
在线阅读 下载PDF
格上困难问题量子求解算法综述
19
作者 曹金政 罗向阳 +1 位作者 陈晓峰 程庆丰 《软件学报》 北大核心 2026年第1期398-424,共27页
随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐... 随着基于格的后量子密码体制快速发展,格上困难问题求解算法已成为评估后量子密码方案安全性的关键技术.当前,经典计算模型下已存在枚举、筛法、格基约化等格上困难问题求解算法,同时量子筛法、量子枚举等格上困难问题量子求解算法正逐步引起关注.围绕后量子密码研究中涉及的格上困难问题,对格上困难问题量子求解算法给出综述.首先,分类整了格上困难问题量子求解算法研究现状.其次,梳理各类格上困难问题量子求解算法的设计思路和应用的量子计算技术,并总结各类格上困难问题量子求解算法的复杂度.最后,展望格上困难问题量子求解算法的未来发展趋势. 展开更多
关键词 格公钥密码 格上困难问题 量子算法
在线阅读 下载PDF
一种保持库表结构的矢量数据字段级加解密技术
20
作者 樊泽宇 马照亭 +3 位作者 雍琦 王旭 丁剑 刘冬 《地理与地理信息科学》 北大核心 2026年第2期18-24,共7页
针对传统字段级加密技术应用于空间数据库矢量字段时因密文扩展导致的库表结构破坏、存储异常等问题,提出一种保持库表结构的矢量数据字段级加密扩展框架。以WKB格式的geometry字段为基础,在加密空间坐标的同时嵌入加密填充和摘要值,通... 针对传统字段级加密技术应用于空间数据库矢量字段时因密文扩展导致的库表结构破坏、存储异常等问题,提出一种保持库表结构的矢量数据字段级加密扩展框架。以WKB格式的geometry字段为基础,在加密空间坐标的同时嵌入加密填充和摘要值,通过差异化修改和扩展WKB节点适应密文数据扩张,形成适用点、线、面等多种类型的加密扩展框架,并设计面向几何字段的结构化加解密方法,有效保障几何字段的机密性和完整性。实验结果表明:加密后的几何字段密文完全兼容数据库矢量字段解析规范,能保持库表结构不变;加密效率与传统字段级加密效率相近,少量记录查询场景下,密文解密查询效率与明文查询效率相当。该方法可为矢量数据在空间数据库中的安全存储提供实用化解决方案。 展开更多
关键词 空间数据库 库表结构保持 矢量数据 商用密码 字段级加密
在线阅读 下载PDF
上一页 1 2 245 下一页 到第
使用帮助 返回顶部