期刊文献+
共找到1,515篇文章
< 1 2 76 >
每页显示 20 50 100
Edge-Fog Enhanced Post-Quantum Network Security: Applications, Challenges and Solutions
1
作者 Seo Yeon Moon Byung Hyun Jo +2 位作者 Abir El Azzaoui Sushil Kumar Singh Jong Hyuk Park 《Computers, Materials & Continua》 2025年第7期25-55,共31页
With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these t... With the rapid advancement of ICT and IoT technologies,the integration of Edge and Fog Computing has become essential to meet the increasing demands for real-time data processing and network efficiency.However,these technologies face critical security challenges,exacerbated by the emergence of quantum computing,which threatens traditional encryption methods.The rise in cyber-attacks targeting IoT and Edge/Fog networks underscores the need for robust,quantum-resistant security solutions.To address these challenges,researchers are focusing on Quantum Key Distribution and Post-Quantum Cryptography,which utilize quantum-resistant algorithms and the principles of quantum mechanics to ensure data confidentiality and integrity.This paper reviews the current security practices in IoT and Edge/Fog environments,explores the latest advancements in QKD and PQC technologies,and discusses their integration into distributed computing systems.Additionally,this paper proposes an enhanced QKD protocol combining the Cascade protocol and Kyber algorithm to address existing limitations.Finally,we highlight future research directions aimed at improving the scalability,efficiency,and practicality of QKD and PQC for securing IoT and Edge/Fog networks against evolving quantum threats. 展开更多
关键词 Edge computing fog computing quantum key distribution security post-quantum cryptography cascade protocol
在线阅读 下载PDF
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
2
作者 Zeric Tabekoueng Njitacke Louai A.Maghrabi +1 位作者 Musheer Ahmad Turki Althaqafi 《Computers, Materials & Continua》 2025年第4期917-933,共17页
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map.The map demonstrates remarkable chaotic dynamics over a wide range of parameters.We employ nonlinea... This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map.The map demonstrates remarkable chaotic dynamics over a wide range of parameters.We employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption process.Our findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective encryption.The encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit planes.These planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant ones.The subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance security.An auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted image.Experimental results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical images.As a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted images.Additionally,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,respectively.Furthermore,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach. 展开更多
关键词 Image cryptosystem robust chaos sine-cosine map nonlinear analysis tools medical images
在线阅读 下载PDF
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
3
作者 Fatima Asiri Wajdan Al Malwi 《Computer Modeling in Engineering & Sciences》 2025年第5期2053-2077,共25页
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica... Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications. 展开更多
关键词 Information security chaotic map modeling post-quantum security quantum image encryption chaotic map image encryption
在线阅读 下载PDF
Hardware-Enabled Key Generation in Industry 4.0 Cryptosystems through Analog Hyperchaotic Signals
4
作者 Borja Bordel Sánchez Fernando Rodríguez-Sela +1 位作者 Ramón Alcarria Tomás Robles 《Computers, Materials & Continua》 2025年第5期1821-1853,共33页
The Industry 4.0 revolution is characterized by distributed infrastructures where data must be continuously communicated between hardware nodes and cloud servers.Specific lightweight cryptosystems are needed to protec... The Industry 4.0 revolution is characterized by distributed infrastructures where data must be continuously communicated between hardware nodes and cloud servers.Specific lightweight cryptosystems are needed to protect those links,as the hardware node tends to be resource-constrained.Then Pseudo Random Number Generators are employed to produce random keys,whose final behavior depends on the initial seed.To guarantee good mathematical behavior,most key generators need an unpredictable voltage signal as input.However,physical signals evolve slowly and have a significant autocorrelation,so they do not have enough entropy to support highrandomness seeds.Then,electronic mechanisms to generate those high-entropy signals artificially are required.This paper proposes a robust hyperchaotic circuit to obtain such unpredictable electric signals.The circuit is based on a hyperchaotic dynamic system,showing a large catalog of structures,four different secret parameters,and producing four high entropy voltage signals.Synchronization schemes for the correct secret key calculation and distribution among all remote communicating modules are also analyzed and discussed.Security risks and intruder and attacker models for the proposed solution are explored,too.An experimental validation based on circuit simulations and a real hardware implementation is provided.The results show that the random properties of PRNG improved by up to 11%when seeds were calculated through the proposed circuit. 展开更多
关键词 Hyperchaotic circuits chaos synchronization hardware-supported technologies chaotic cryptosystems Industry 4.0 adaptative control
在线阅读 下载PDF
New Constructions of Dynamic Threshold Cryptosystem 被引量:4
5
作者 龙宇 陈克非 毛贤平 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期431-435,共5页
This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. ... This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. We first introduce an identity based dynamic threshold cryptosystem, and then use the CanettiHalevi-Katz(CHK) transformation to transform it into a fully secure system in the traditional public key setting.Finally, the elegant dual system encryption technique is applied to constructing a fully secure dynamic threshold cryptosystem with adaptive security. 展开更多
关键词 threshold cryptosystem dynamic property dual system encryption one-time signature
原文传递
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
6
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
在线阅读 下载PDF
A Novel Post-Quantum Blind Signature for Log System in Blockchain 被引量:5
7
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Ke Xiao Xin Liu Xiubo Chen Mianxiong Dong 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期945-958,共14页
In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In... In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In orderto ensure the integrity of the log in the current system, many researchers havedesigned it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attackerequipped with a quantum computer can extract the user's private key from thepublic key to generate a forged signature, destroy the structure of the blockchain,and threaten the security of the log system. Thus, blind signature on the lattice inpost-quantum blockchain brings new security features for log systems. In ourpaper, to address these, firstly, we propose a novel log system based on post-quantum blockchain that can resist quantum computing attacks. Secondly, we utilize apost-quantum blind signature on the lattice to ensure both security and blindnessof log system, which makes the privacy of log information to a large extent.Lastly, we enhance the security level of lattice-based blind signature under therandom oracle model, and the signature size grows slowly compared with others.We also implement our protocol and conduct an extensive analysis to prove theideas. The results show that our scheme signature size edges up subtly comparedwith others with the improvement of security level. 展开更多
关键词 Log system post-quantum blockchain LATTICE blind signature privacy protection
在线阅读 下载PDF
A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network 被引量:1
8
作者 王兴元 鲍雪梅 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期232-240,共9页
In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (... In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hard- ware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosys- tem is secure and practical, and suitable for image encryption. 展开更多
关键词 image encryption block cryptosystem chaotic neural network coupled map lattice
原文传递
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
9
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
在线阅读 下载PDF
Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem 被引量:2
10
作者 Ramadhan J.Mstafa 《Computers, Materials & Continua》 SCIE EI 2022年第8期3349-3368,共20页
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breache... The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breaches of privacy and data security.When it comes to protecting private information in today’s Internet era,digital steganography is vital.Many academics are interested in digital video because it has a great capability for concealing important data.There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data.The visual imperceptibility,robustness,and embedding capacity of these approaches are all challenges that must be addressed.In this paper,a novel solution to reversible video steganography based on Discrete Wavelet Transform(DWT)and Quick Response(QR)codes is proposed to address these concerns.In order to increase the security level of the suggested method,an enhanced ElGamal cryptosystem has also been proposed.Prior to the embedding stage,the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes.Concurrently,it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation(LL),Horizontal(LH),Vertical(HL),and Diagonal(HH)sub-bands.Then,the encrypted Low(L),Medium(M),Quantile(Q),and High(H)QR codes are embedded into the HL sub-band,HHsub-band,U-component,and V-component of video frames,respectively,using the Least Significant Bit(LSB)technique.As a consequence of extensive testing of the approach,it was shown to be very secure and highly invisible,as well as highly resistant to attacks from Salt&Pepper,Gaussian,Poisson,and Speckle noises,which has an average Structural Similarity Index(SSIM)of more than 0.91.Aside from visual imperceptibility,the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio(PSNR)average of 52.143 dB,and embedding capacity 1 bpp. 展开更多
关键词 Reversible video steganography QR code SECURITY ElGamal cryptosystem DWT
在线阅读 下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
11
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
在线阅读 下载PDF
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem 被引量:2
12
作者 Zeyu Liu Tiecheng Xia Jinbo Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期161-176,共16页
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif... We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. 展开更多
关键词 CHAOS fractional two-dimensional triangle function combination discrete chaotic map image encryption Menezes-Vanstone elliptic curve cryptosystem
原文传递
Review of Public-Key Cryptosystem Based on the Error Correcting Code 被引量:1
13
作者 LI Zhongyuan QU Chengqin +1 位作者 ZHOU Xueguang ZHUO Lifeng 《Wuhan University Journal of Natural Sciences》 CAS 2014年第6期489-496,共8页
The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative anal... The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative analyses of the merits and drawbacks of them. The cryptosystem based on Goppa code has high security, but can be achieved poor. The cryptosystems based on other error correcting codes have higher performance than Goppa code. But there are still some disadvantages to solve. At last, the paper produce an assumption of the Niederreiter cascade combination cryptosystem based on double public-keys under complex circumstances, which has higher performance and security than the traditional cryptosystems. 展开更多
关键词 error correcting code public-key cryptosystem cascaded code safety
原文传递
Cryptanalysis of a Cryptosystem with Non- Commutative Platform Groups 被引量:1
14
作者 Jinhui Liu Jianwei Jia +3 位作者 Huanguo Zhang Rongwei Yu Yong Yu Wangqing Wu 《China Communications》 SCIE CSCD 2018年第2期67-73,共7页
A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryp... A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryption scheme. We propose an algebraic key-recovery attack in the polynomial computational complexity. Furthermore, we peel off the encryption and decryption process and propose attack methods for solving the conjugator search problem over the given non-abelian group. Finally, we provide corresponding practical attack examples to illustrate the attack methods in our cryptanalysis, and provide some improved suggestions. 展开更多
关键词 CRYPTANALYSIS post-quantum com-putational cryptography conjugator searchproblem computational complexity
在线阅读 下载PDF
Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem 被引量:1
15
作者 张龙军 韩玮 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期645-650,共6页
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t... The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet. 展开更多
关键词 SECURITY wireless local area network (WLAN) elliptic curve cryptosystem
在线阅读 下载PDF
Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation 被引量:1
16
作者 Protais Ndagijimana Fulgence Nahayo +2 位作者 Marc Kokou Assogba Adoté François-Xavier Ametepe Juma Shabani 《Journal of Information Security》 2020年第3期149-160,共12页
The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the br... The advent of quantum computers and algorithms challenges the semantic security of symmetric and asymmetric cryptosystems. Thus, the implementation of new cryptographic primitives is essential. They must follow the breakthroughs and properties of quantum calculators which make vulnerable existing cryptosystems. In this paper, we propose a random number generation model based on evaluation of the thermal noise power of the volume elements of an electronic system with a volume of 58.83 cm<sup>3</sup>. We prove through the sampling of the temperature of each volume element that it is difficult for an attacker to carry out an exploit. In 12 seconds, we generate for 7 volume elements, a stream of randomly generated keys of 187 digits that will be transmitted from source to destination through the properties of quantum cryptography. 展开更多
关键词 Thermal Noise True Random Numbers ALGORITHM post-quantum Cryptography
暂未订购
Software Watermarking Scheme Based on Multivariate Public Key Cryptosystem
17
作者 SUN Xiaoyan ZHANG Maosheng +2 位作者 MAO Shaowu REN Zhengwei ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第3期257-261,共5页
Software watermarking is an efficient tool to verify the copyright of software. Public key cryptosystem-based watermarking is widely researched. However, the popular public key cryptosystem is not secure under quantum... Software watermarking is an efficient tool to verify the copyright of software. Public key cryptosystem-based watermarking is widely researched. However, the popular public key cryptosystem is not secure under quantum algorithm. This paper proposes a novel soft-ware watermarking scheme based on multivariate public key cryptosystem. The copyright information generated by copyright holder is transformed into copyright numbers using multivariate quadratic polynomial equations inspired by multivariate public key cryptosystem (MPKC). Every polynomial is embedded into the host program independently. Based on the security performance of MPKC, the robustness and invisibility of the proposed scheme is significantly improved in comparison with the RSA-based watermarking method. 展开更多
关键词 SOFTWARE WATERMARKING MULTIVARIATE cryptosystem COPYRIGHT
原文传递
Public Key Cryptosystem Based on Two Sided Action of Different Exotic Semirings 被引量:1
18
作者 Mariana Durcheva 《Journal of Mathematics and System Science》 2014年第1期6-13,共8页
The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic prob... The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic problems, optimization theory, discrete event systems, fuzzy logics. In this paper we consider the expansion of the semirings Rmax and Rmin with residuals and describe how to use these expended semirings in public key cryptography. 展开更多
关键词 Public key cryptosystem exotic semirings semiring action residuals.
在线阅读 下载PDF
A JOINT SIGNATURE ENCRYPTION AND ERROR CORRECTION PUBLIC-KEY CRYPTOSYSTEM BASED ON ALGEBRAIC CODING THEORY
19
作者 李元兴 成坚 王新梅 《Journal of Electronics(China)》 1992年第1期33-39,共7页
A joint signature,encryption and error correction public-key cryptosystem is pre-sented based on an NP-completeness problem-the decoding problem of general linear codes inalgebraic coding theory,
关键词 CRYPTOLOGY Public-key cryptosystem Error-correcting CODES
在线阅读 下载PDF
A TTP-Independent Watermarking Protocol Based on Commutative Cryptosystem for Copyright Protection in E-Commerce
20
作者 LUO Ting YUAN Jun HONG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1636-1640,共5页
For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techni... For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techniques have been proposed, However, previous protocols have potential risk from trust third party (TTP) because all entities (including multi-buyers and multi-sellers) mentioned in protocol construct a star tupology like connection, in which the watermark certification authority (WCA) serves as the central point in the interaction and therefore its availability probably turns out to be the vital bottleneck of reliability and efficiency to the whole system. Secondly, WCA holds entire information about watermark used hy Buyers so that an innocent Buyer can he found as guilty if WCA collude with the Seller. In this paper, we propose a watermarking protocol to address the problems using cryptographic technologies in phase of watermark generation. The resuh is a TTP-independent and collusion-secure buyer-seller watermarking protocol. 展开更多
关键词 WATERMARKING copyright protection watermarking protocol commutative cryptosystem
在线阅读 下载PDF
上一页 1 2 76 下一页 到第
使用帮助 返回顶部