Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ...Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one.展开更多
Public-key encryption is essential for secure communications,eliminating the need for pre-shared keys.However,traditional schemes such as RSA(Rivest-Shamir-Adleman)and elliptic curve cryptography rely on computational...Public-key encryption is essential for secure communications,eliminating the need for pre-shared keys.However,traditional schemes such as RSA(Rivest-Shamir-Adleman)and elliptic curve cryptography rely on computational complexity,making them increasingly susceptible to advances in computing power and algorithms.Physical-layer encryption,which leverages the intrinsic properties of physical systems,offers a promising alternative with security rooted in physics.Despite progress in this field,public-key encryption at the optical layer remains largely unexplored.Here,we propose a novel optical public-key encryption scheme based on partially coherent light sources.The cryptographic keys are encoded in the incoherent optical transmission matrix of an on-chip Mach-Zehnder interferometer mesh,providing high complexity and resilience to computational attacks.We experimentally demonstrate encrypted image transmission over 40 km of optical fiber with high decryption fidelity and achieve a 10 Gbit/s optical encryption rate using a lithium niobate photonic chip.This represents the first implementation of public-key encryption at the physical optical layer.The approach offers key advantages in security,cost,energy efficiency,and compatibility with commercial optical communication systems.By integrating public-key encryption into photonic hardware,this work opens a new direction for secure and high-speed optical communications in next-generation networks.展开更多
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is ...Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed.展开更多
As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage...As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage,the data to be stored needs to be encrypted for this reason.Since“searchable encryption”is enable to search on the encrypted data without any decryption,it is one of convenient solutions for secure data management.A public key encryption with keyword search(for short,PEKS)is one of searchable encryptions.Abdalla et al.firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the“robust”ANO-CCA secure identity-based encryption(IBE).In this paper,we propose two generic constructions of consistent IND-CCA secure PEKS combining(1)a hierarchical identity based encryption(for short,HIBE)and a signature scheme or(2)a HIBE,an encapsulation,and a message authentication code(for short,MAC)scheme.Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker“ANO-CPA security(resp.,IND-CPA security)”of HIBE than“ANOCCA security(resp.,IND-CCA security)”of IBE required in for achieving IND-CCA secure(resp.,consistent)PEKS.Finally,we prove that our generic constructions satisfy IND-CCA security and consistency under the security models.展开更多
Public-key encryption with keyword search(PEKS)is a well-known method for privacy-preserving keyword search in encrypted email systems due to its public-key characteristics.However,we have observed that even without a...Public-key encryption with keyword search(PEKS)is a well-known method for privacy-preserving keyword search in encrypted email systems due to its public-key characteristics.However,we have observed that even without a keyword-search trapdoor,traditional PEKS allows the server to distinguish ciphertexts effectively,compromising semantic security.To address this limitation,we introduce dynamic searchable public-key encryption(DSPE),a concept that conceals relationships between searchable ciphertexts and their corresponding encrypted files,ensuring semantic security in both theory and practice.DSPE also enables the server to delete specific ciphertexts as requested by the receiver.We present a DSPE instance with provable semantic security in the random oracle model,which offers the advantage of sublinear complexity in identifying matching ciphertexts and deleting intended ones.Through experimental validation,we demonstrate the feasibility of this instance.Furthermore,we construct a DSPE-based cloud email system in the double-cloud model and evaluate its performance.展开更多
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military...Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.展开更多
Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes ...Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes a novel image encryption algorithm specifically designed for grayscale image security.This research introduces a new Cantor diagonal matrix permutation method.The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix,where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice(CML).The high initial value sensitivity of the CML system makes the permutation method highly sensitive and secure.Additionally,leveraging fractal theory,this study introduces a chaotic fractal matrix and applies this matrix in the diffusion process.This chaotic fractal matrix exhibits selfsimilarity and irregularity.Using the Cantor diagonal matrix and chaotic fractal matrix,this paper introduces a fast image encryption algorithm involving two diffusion steps and one permutation step.Moreover,the algorithm achieves robust security with only a single encryption round,ensuring high operational efficiency.Experimental results show that the proposed algorithm features an expansive key space,robust security,high sensitivity,high efficiency,and superior statistical properties for the ciphered images.Thus,the proposed algorithm not only provides a practical solution for secure image transmission but also bridges fractal theory with image encryption techniques,thereby opening new research avenues in chaotic cryptography and advancing the development of information security technology.展开更多
As cyberattacks become increasingly sophisticated and intelligent,demand for machine-learning-based anomaly detection systems is growing.However,conventional systems generally assume a trusted server environment,where...As cyberattacks become increasingly sophisticated and intelligent,demand for machine-learning-based anomaly detection systems is growing.However,conventional systems generally assume a trusted server environment,where traffic data is collected and analyzed in plaintext.This assumption introduces inherent privacy risks,as privacy-sensitive information may be exposed if the server is compromised or misused.To address this limitation,privacy-preserving anomaly detection approaches have been actively studied,enabling anomaly detection to be performed directly on encrypted traffic without revealing privacy-sensitive data.While these approaches offer strong confidentiality guarantees,they suffer from significant drawbacks,including substantial computational overhead,high latency,and degraded detection accuracy.To overcome these limitations,we propose a privacy-aware anomaly detection(PAAD)model that adaptively applies homomorphic encryption based on the privacy sensitivity of incoming traffic.Instead of encrypting all data indiscriminately,PAAD dynamically determines whether traffic should be processed in plaintext or ciphertext and performs homomorphic inference only for privacy-sensitive data.This selective encryption strategy effectively balances privacy protection and system efficiency.Extensive experiments conducted under diverse network environments demonstrate that the proposed PAAD model significantly outperforms conventional anomaly detection models.In particular,PAAD improves detection accuracy by up to 73%,reduces latency by up to 8.6 times,and achieves negligible information leakage,highlighting its practicality for real-world privacy-sensitive network monitoring scenarios.展开更多
With the rapid development of intelligent electronic and military equipment,multifunctional flexible materials that integrat electromagnetic interference(EMI)shielding,temperature sensing,and information encryption ar...With the rapid development of intelligent electronic and military equipment,multifunctional flexible materials that integrat electromagnetic interference(EMI)shielding,temperature sensing,and information encryption are urgently required.This study presents a bio-inspired hierarchical composite foam fabricated using supercritical nitrogen foaming technology.This material exhibits a honeycomb structure,with pore cell sizes controllable within a range of 30–92μm by regulating the filler.The carbon fiber felt(CFf)provides efficient reflection of electromagnetic waves,while the chloroprene rubber/carbon fiber/carbon black foam facilitates both wave absorption and temperature monitoring through its optimized conductive network.This synergistic mechanism results in an EMI shielding effectiveness(SE)of 60.06 d B with excellent temperature sensing performance(The temperature coefficient of resistance(TCR)is-2.642%/℃)in the 24–70℃ range.Notably,the material has a thermal conductivity of up to 0.159 W/(m·K),and the bio-inspired layered design enables information encryption,demonstrating the material's potential for secure communication applications.The foam also has tensile properties of up to 5.13 MPa and a tear strength of 33.02 N/mm.This biomimetic design overcomes the traditional limitations of flexible materials and provides a transformative solution for next-generation applications such as flexible electronics,aerospace systems and military equipment,which urgently need integrated electromagnetic protection,thermal management and information security.展开更多
The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently...The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently,the protection of sensitive data has become increasingly critical.Regardless of the complexity of the encryption algorithm used,a robust and highly secure encryption key is essential,with randomness and key space being crucial factors.This paper proposes a new Robust Deoxyribonucleic Acid(RDNA)nucleotide-based encryption method.The RDNA encryption method leverages the unique properties of DNA nucleotides,including their inherent randomness and extensive key space,to generate a highly secure encryption key.By employing transposition and substitution operations,the RDNA method ensures significant diffusion and confusion in the encrypted images.Additionally,it utilises a pseudorandom generation technique based on the random sequence of nucleotides in the DNA secret key.The performance of the RDNA encryption method is evaluated through various statistical and visual tests,and compared against established encryption methods such as 3DES,AES,and a DNA-based method.Experimental results demonstrate that the RDNA encryption method outperforms its rivals in the literature,and achieves superior performance in terms of information entropy,avalanche effect,encryption execution time,and correlation reduction,while maintaining competitive values for NMAE,PSNR,NPCR,and UACI.The high degree of randomness and sensitivity to key changes inherent in the RDNA method offers enhanced security,making it highly resistant to brute force and differential attacks.展开更多
Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystem...Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystems.However,the recently developed EC based algorithms usually trade off between computational efficiency and security,necessitating the design of a new algorithm with the desired cryptographic strength.To address these shortcomings,this paper proposes a new scheme based onMordell elliptic curve(MEC)over the complex field for generating distinct,dynamic,and highly uncorrelated S-boxes.Furthermore,we count the exact number of the obtained S-boxes,and demonstrate that the permuted version of the presented S-box is statistically optimal.The nonsingularity of the presented algorithm and the injectivity of the resultant output are explored.Rigorous theoretical analysis and experimental results demonstrate that the proposedmethod is highly effective in generating a large number of dynamic S-boxes with adequate cryptographic properties,surpassing current state-of-the-art S-box generation algorithms in terms of security.Apart fromthis,the generated S-box is benchmarked using side-channel attacks,and its performance is compared with highly nonlinear S-boxes,demonstrating comparable results.In addition,we present an application of our proposed S-box generator by incorporating it into an image encryption technique.The encrypted and decrypted images are tested by employing extensive standard security metrics,including the Number of Pixel Change Rate,the Unified Average Changing Intensity,information entropy,correlation coefficient,and histogram analysis.Moreover,the analysis is extended beyond conventional metrics to validate the new method using advanced tests,such as the NIST statistical test suite,robustness analysis,and noise and cropping attacks.Experimental outcomes show that the presented algorithm strengthens the existing encryption scheme against various well-known cryptographic attacks.展开更多
The rapid development of brain-like neural networks and secure data transmission technologies has placed greater demands on highly complex neural network systems and highly secure encryption methods.To this end,the pa...The rapid development of brain-like neural networks and secure data transmission technologies has placed greater demands on highly complex neural network systems and highly secure encryption methods.To this end,the paper proposes a novel high-dimensional memristor synapse-coupled hyperchaotic neural network by using the designed memristor as the synapse to connect an inertial neuron(IN)and a Hopfield neural network(HNN).By using numerical tools including bifurcation plots,phase plots,and basins of attraction,it is found that the dynamics of this system are closely related to the memristor coupling strength,self-connection synaptic weights,and inter-connection synaptic weights,and it can exhibit excellent hyperchaotic behaviors and coexisting multi-stable patterns.Through PSIM circuit simulations,the complex dynamics of the coupled IN-HNN system are verified.Furthermore,a DNA-encoded encryption algorithm is given,which utilizes generated hyperchaotic sequences to achieve encoding,operation,and decoding of DNA.The results show that this algorithm possesses strong robustness against statistical attacks,differential attacks,and noise interference,and can effectively resist known/selected plaintext attacks.This work will provide new ideas for the modeling of large-scale brainlike neural networks and high-security image encryption.展开更多
The exploration of solvent-driven reversible structural transformation in clusters is crucial for advanced stimulus-responsive optical applications and understanding of structure-property relationships.Herein,we repor...The exploration of solvent-driven reversible structural transformation in clusters is crucial for advanced stimulus-responsive optical applications and understanding of structure-property relationships.Herein,we report a solvent-driven reversible trans-formation between two copper(I)clusters:[Cu(totp)(CH_(3)CN)_(3)][Cu_(2)I_(3)(totp)(DPPPy)]·CH_(3)CN 1 and Cu_(4)I_(4)(DPPPy)_(2)·0.5CH_(2)Cl_(2)2(totp=tri-o-tolylphosphine,DPPPy=2-[diphenylphosphino]pyridine).X-ray radioluminescence and encryption applications were studied based on structure-dependent photophysical properties difference.The noncovalent interaction-mediated space charge transition between isolated ion units of 1 enables more efficient thermally activated delayed fluorescence by reverse intersystem crossing,accounting for structure-dependent luminescence.Notably,compared to 2,1 exhibits a higher scintillation light yield of 14832 photons MeV^(-1),exceeding that of the commercial scintillator Bi_(4)Ge_(3)O_(12)(8000 photons MeV^(-1)),and a low X-ray detection limit of 22.49 nGy s^(-1),far below the typical diagnostic dose(5.5μGy s^(-1)).Furthermore,scintillating film fabricated by 1 achieves X-ray imaging with a high spatial resolution of 16 lp/mm.The reversible structural interconversion enables solvent-responsive luminescent switches,and thus,the dynamic encryption system capable of multistage decryption was developed.This work not only offers new insight into solvent-regulated clusters transformations but also provides a promising strategy for developing high-performance copper(I)clusters-based scintillators and stimulus-responsive optical devices.展开更多
This paper presents an image encryption scheme for underwater optical wireless communication(UOWC)systems based on dynamically generated hyperchaotic S-boxes,aiming to enhance both data security and transmission perfo...This paper presents an image encryption scheme for underwater optical wireless communication(UOWC)systems based on dynamically generated hyperchaotic S-boxes,aiming to enhance both data security and transmission performance in underwater environments.The proposed encryption approach provides strong confusion and diffusion properties and is evaluated over five Jerlov water types with different optical attenuation characteristics.Security analysis demonstrates that the encrypted images achieve information entropy values close to the ideal value of 8(7.9925–7.9993),with very low correlation coefficients in horizontal,vertical,and diagonal directions,as well as the system achieves high values in key metrics such as the Unified Average Changing Intensity(UACI)and Number of Pixel Change Rate(NPCR),ranging from 33.42 to 33.47 and from 99.58%to 99.62%,respectively,both near their theoretical optima.In addition to improving confidentiality,the hyperchaotic encryption process decorrelates pixel intensities and redistributes image spectral content,which enhances robustness against underwater absorption and scattering effects.As a result,improved transmission performance is observed;for example,in Jerlov type I(JI)water,the effective transmission distance is extended from16mfor plain images to 24mfor encrypted images,while the Peak Signal to Noise Ratio(PSNR)at 24 m increases from 9.25 to 20.13 dB after decryption and enhancement.These results confirmthat the proposed scheme provides a dual benefit of secure and reliable image transmission in UOWC systems.展开更多
Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the correspond...Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.展开更多
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth...This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model.展开更多
Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the relat...Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage.展开更多
Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and t...Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and then construct an informationtheoretic secure instance.Then,we propose a quantum public-key authentication scheme,which can protect the integrity of quantum messages.This scheme can both encrypt and authenticate quantum messages.It is information-theoretic secure with regard to encryption,and the success probability of tampering decreases exponentially with the security parameter with regard to authentication.Compared with classical public-key cryptosystems,one private-key in our schemes corresponds to an exponential number of public-keys,and every quantum public-key used by the sender is an unknown quantum state to the sender.展开更多
This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme. As a result, a ciphertext is not a quadruple but a triple at the cost of ...This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme. As a result, a ciphertext is not a quadruple but a triple at the cost of a strong assumption, the third version of knowledge of exponent assumption (KEA3). Under assumptions of KEA3, a decision Diffie-Hellman (DDH) and a variant of target collision resistance (TCRv), the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack (IND-CCA2). This scheme is as efficient as Damgard ElGamal (DEG) scheme when it makes use of a well-known algorithm for product of exponentiations. The DEG scheme is recently proved IND-CCA1 secure by Bellare and Palacio in ASIACRYPT 2004 under another strong assumption. In addition to our IND-CCA2 secured scheme, we also believe that the security proof procedure itself provides a well insight for ElGamal-based encryption schemes which are secure in real world.展开更多
With the rapid development of holographic technology,metasurface-based holographic communication schemes have demonstrated immense potential for electromagnetic(EM)multifunctionality.However,traditional passive metasu...With the rapid development of holographic technology,metasurface-based holographic communication schemes have demonstrated immense potential for electromagnetic(EM)multifunctionality.However,traditional passive metasurfaces are severely limited by their lack of reconfigurability,hindering the realization of versatile holographic applications.Origami,an art form that mechanically induces spatial deformations,serves as a platform for multifunctional devices and has garnered significant attention in optics,physics,and materials science.The Miura-ori folding paradigm,characterized by its continuous reconfigurability in folded states,remains unexplored in the context of holographic imaging.Herein,we integrate the principles of Rosenfeld with L-and D-metal chiral enantiomers on a Miura-ori surface to tailor the aperture distribution.Leveraging the continuously tunable nature of the Miura-ori's folded states,the chiral response of the metallic structures varies across different folding configurations,enabling distinct EM holographic imaging functionalities.In the planar state,holographic encryption is achieved.Under specific folding conditions and driven by spin circularly polarized(CP)waves at a particular frequency,multiplexed holographic images can be reconstructed on designated focal planes with CP selectivity.Notably,the fabricated origami metasurface exhibits a large negative Poisson ratio,facilitating portability and deployment and offering novel avenues for spin-selective systems,camouflage,and information encryption.展开更多
基金Supported by the National Natural Science Foundation of China(60603010,60970120)~~
文摘Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one.
基金supported by the Fundamental Research Funds for the Central Universities.National Natural Science Foundation of China(62425504,U21A20511,62275088).
文摘Public-key encryption is essential for secure communications,eliminating the need for pre-shared keys.However,traditional schemes such as RSA(Rivest-Shamir-Adleman)and elliptic curve cryptography rely on computational complexity,making them increasingly susceptible to advances in computing power and algorithms.Physical-layer encryption,which leverages the intrinsic properties of physical systems,offers a promising alternative with security rooted in physics.Despite progress in this field,public-key encryption at the optical layer remains largely unexplored.Here,we propose a novel optical public-key encryption scheme based on partially coherent light sources.The cryptographic keys are encoded in the incoherent optical transmission matrix of an on-chip Mach-Zehnder interferometer mesh,providing high complexity and resilience to computational attacks.We experimentally demonstrate encrypted image transmission over 40 km of optical fiber with high decryption fidelity and achieve a 10 Gbit/s optical encryption rate using a lithium niobate photonic chip.This represents the first implementation of public-key encryption at the physical optical layer.The approach offers key advantages in security,cost,energy efficiency,and compatibility with commercial optical communication systems.By integrating public-key encryption into photonic hardware,this work opens a new direction for secure and high-speed optical communications in next-generation networks.
基金Supported by the 973 State Key Project of China (No.G1999035803)the National Natural Science Foundation of China (No.69931010).
文摘Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed.
文摘As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage,the data to be stored needs to be encrypted for this reason.Since“searchable encryption”is enable to search on the encrypted data without any decryption,it is one of convenient solutions for secure data management.A public key encryption with keyword search(for short,PEKS)is one of searchable encryptions.Abdalla et al.firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the“robust”ANO-CCA secure identity-based encryption(IBE).In this paper,we propose two generic constructions of consistent IND-CCA secure PEKS combining(1)a hierarchical identity based encryption(for short,HIBE)and a signature scheme or(2)a HIBE,an encapsulation,and a message authentication code(for short,MAC)scheme.Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker“ANO-CPA security(resp.,IND-CPA security)”of HIBE than“ANOCCA security(resp.,IND-CCA security)”of IBE required in for achieving IND-CCA secure(resp.,consistent)PEKS.Finally,we prove that our generic constructions satisfy IND-CCA security and consistency under the security models.
基金supported by the National Key Research and Development Program of China(Grant No.2022YFB4501500)the National Natural Science Foundation of China(Grant Nos.62272186 and 62372201).
文摘Public-key encryption with keyword search(PEKS)is a well-known method for privacy-preserving keyword search in encrypted email systems due to its public-key characteristics.However,we have observed that even without a keyword-search trapdoor,traditional PEKS allows the server to distinguish ciphertexts effectively,compromising semantic security.To address this limitation,we introduce dynamic searchable public-key encryption(DSPE),a concept that conceals relationships between searchable ciphertexts and their corresponding encrypted files,ensuring semantic security in both theory and practice.DSPE also enables the server to delete specific ciphertexts as requested by the receiver.We present a DSPE instance with provable semantic security in the random oracle model,which offers the advantage of sublinear complexity in identifying matching ciphertexts and deleting intended ones.Through experimental validation,we demonstrate the feasibility of this instance.Furthermore,we construct a DSPE-based cloud email system in the double-cloud model and evaluate its performance.
文摘Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems.
基金supported by the National Natural Science Foundation of China(62376106)The Science and Technology Development Plan of Jilin Province(20250102212JC).
文摘Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes a novel image encryption algorithm specifically designed for grayscale image security.This research introduces a new Cantor diagonal matrix permutation method.The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix,where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice(CML).The high initial value sensitivity of the CML system makes the permutation method highly sensitive and secure.Additionally,leveraging fractal theory,this study introduces a chaotic fractal matrix and applies this matrix in the diffusion process.This chaotic fractal matrix exhibits selfsimilarity and irregularity.Using the Cantor diagonal matrix and chaotic fractal matrix,this paper introduces a fast image encryption algorithm involving two diffusion steps and one permutation step.Moreover,the algorithm achieves robust security with only a single encryption round,ensuring high operational efficiency.Experimental results show that the proposed algorithm features an expansive key space,robust security,high sensitivity,high efficiency,and superior statistical properties for the ciphered images.Thus,the proposed algorithm not only provides a practical solution for secure image transmission but also bridges fractal theory with image encryption techniques,thereby opening new research avenues in chaotic cryptography and advancing the development of information security technology.
基金supported by the Ministry of Trade,Industry and Energy(MOTIE)under Training Industrial Security Specialist for High-Tech Industry[grant number RS-2024-00415520]supervised by the Korea Institute for Advancement of Technology(KIAT)Ministry of Science and ICT(MSIT)under the ICAN(ICT Challenge and Advanced Network of HRD)program[grant number IITP-2022-RS-2022-00156310]+1 种基金National Research Foundation of Korea(NRF)grant[RS-2025-00518150]the Information Security Core Technology Development program[grant number RS-2024-00437252]supervised by the Institute of Information&Communication Technology Planning&Evaluation(IITP).
文摘As cyberattacks become increasingly sophisticated and intelligent,demand for machine-learning-based anomaly detection systems is growing.However,conventional systems generally assume a trusted server environment,where traffic data is collected and analyzed in plaintext.This assumption introduces inherent privacy risks,as privacy-sensitive information may be exposed if the server is compromised or misused.To address this limitation,privacy-preserving anomaly detection approaches have been actively studied,enabling anomaly detection to be performed directly on encrypted traffic without revealing privacy-sensitive data.While these approaches offer strong confidentiality guarantees,they suffer from significant drawbacks,including substantial computational overhead,high latency,and degraded detection accuracy.To overcome these limitations,we propose a privacy-aware anomaly detection(PAAD)model that adaptively applies homomorphic encryption based on the privacy sensitivity of incoming traffic.Instead of encrypting all data indiscriminately,PAAD dynamically determines whether traffic should be processed in plaintext or ciphertext and performs homomorphic inference only for privacy-sensitive data.This selective encryption strategy effectively balances privacy protection and system efficiency.Extensive experiments conducted under diverse network environments demonstrate that the proposed PAAD model significantly outperforms conventional anomaly detection models.In particular,PAAD improves detection accuracy by up to 73%,reduces latency by up to 8.6 times,and achieves negligible information leakage,highlighting its practicality for real-world privacy-sensitive network monitoring scenarios.
基金financially supported by the Natural Science Foundation of Shandong Province(No.ZR2024QE446)。
文摘With the rapid development of intelligent electronic and military equipment,multifunctional flexible materials that integrat electromagnetic interference(EMI)shielding,temperature sensing,and information encryption are urgently required.This study presents a bio-inspired hierarchical composite foam fabricated using supercritical nitrogen foaming technology.This material exhibits a honeycomb structure,with pore cell sizes controllable within a range of 30–92μm by regulating the filler.The carbon fiber felt(CFf)provides efficient reflection of electromagnetic waves,while the chloroprene rubber/carbon fiber/carbon black foam facilitates both wave absorption and temperature monitoring through its optimized conductive network.This synergistic mechanism results in an EMI shielding effectiveness(SE)of 60.06 d B with excellent temperature sensing performance(The temperature coefficient of resistance(TCR)is-2.642%/℃)in the 24–70℃ range.Notably,the material has a thermal conductivity of up to 0.159 W/(m·K),and the bio-inspired layered design enables information encryption,demonstrating the material's potential for secure communication applications.The foam also has tensile properties of up to 5.13 MPa and a tear strength of 33.02 N/mm.This biomimetic design overcomes the traditional limitations of flexible materials and provides a transformative solution for next-generation applications such as flexible electronics,aerospace systems and military equipment,which urgently need integrated electromagnetic protection,thermal management and information security.
文摘The advent of 5G technology has significantly enhanced the transmission of images over networks,expanding data accessibility and exposure across various applications in digital technology and social media.Consequently,the protection of sensitive data has become increasingly critical.Regardless of the complexity of the encryption algorithm used,a robust and highly secure encryption key is essential,with randomness and key space being crucial factors.This paper proposes a new Robust Deoxyribonucleic Acid(RDNA)nucleotide-based encryption method.The RDNA encryption method leverages the unique properties of DNA nucleotides,including their inherent randomness and extensive key space,to generate a highly secure encryption key.By employing transposition and substitution operations,the RDNA method ensures significant diffusion and confusion in the encrypted images.Additionally,it utilises a pseudorandom generation technique based on the random sequence of nucleotides in the DNA secret key.The performance of the RDNA encryption method is evaluated through various statistical and visual tests,and compared against established encryption methods such as 3DES,AES,and a DNA-based method.Experimental results demonstrate that the RDNA encryption method outperforms its rivals in the literature,and achieves superior performance in terms of information entropy,avalanche effect,encryption execution time,and correlation reduction,while maintaining competitive values for NMAE,PSNR,NPCR,and UACI.The high degree of randomness and sensitivity to key changes inherent in the RDNA method offers enhanced security,making it highly resistant to brute force and differential attacks.
文摘Elliptic curve(EC)based cryptosystems gained more attention due to enhanced security than the existing public key cryptosystems.A substitution box(S-box)plays a vital role in securing modern symmetric key cryptosystems.However,the recently developed EC based algorithms usually trade off between computational efficiency and security,necessitating the design of a new algorithm with the desired cryptographic strength.To address these shortcomings,this paper proposes a new scheme based onMordell elliptic curve(MEC)over the complex field for generating distinct,dynamic,and highly uncorrelated S-boxes.Furthermore,we count the exact number of the obtained S-boxes,and demonstrate that the permuted version of the presented S-box is statistically optimal.The nonsingularity of the presented algorithm and the injectivity of the resultant output are explored.Rigorous theoretical analysis and experimental results demonstrate that the proposedmethod is highly effective in generating a large number of dynamic S-boxes with adequate cryptographic properties,surpassing current state-of-the-art S-box generation algorithms in terms of security.Apart fromthis,the generated S-box is benchmarked using side-channel attacks,and its performance is compared with highly nonlinear S-boxes,demonstrating comparable results.In addition,we present an application of our proposed S-box generator by incorporating it into an image encryption technique.The encrypted and decrypted images are tested by employing extensive standard security metrics,including the Number of Pixel Change Rate,the Unified Average Changing Intensity,information entropy,correlation coefficient,and histogram analysis.Moreover,the analysis is extended beyond conventional metrics to validate the new method using advanced tests,such as the NIST statistical test suite,robustness analysis,and noise and cropping attacks.Experimental outcomes show that the presented algorithm strengthens the existing encryption scheme against various well-known cryptographic attacks.
基金Project supported by the Training Plan of Young Backbone Teachers in Universities of Henan Province(Grant No.2023GGJS142)the Key Scientific Research of Colleges and Universities in Henan Province,China(Grant No.25A120009)+1 种基金Changzhou Leading Innovative Talent Introduction and Cultivation Project(Grant No.CQ20240102)Changzhou Applied Basic Research Program(Grant No.CJ20253065)。
文摘The rapid development of brain-like neural networks and secure data transmission technologies has placed greater demands on highly complex neural network systems and highly secure encryption methods.To this end,the paper proposes a novel high-dimensional memristor synapse-coupled hyperchaotic neural network by using the designed memristor as the synapse to connect an inertial neuron(IN)and a Hopfield neural network(HNN).By using numerical tools including bifurcation plots,phase plots,and basins of attraction,it is found that the dynamics of this system are closely related to the memristor coupling strength,self-connection synaptic weights,and inter-connection synaptic weights,and it can exhibit excellent hyperchaotic behaviors and coexisting multi-stable patterns.Through PSIM circuit simulations,the complex dynamics of the coupled IN-HNN system are verified.Furthermore,a DNA-encoded encryption algorithm is given,which utilizes generated hyperchaotic sequences to achieve encoding,operation,and decoding of DNA.The results show that this algorithm possesses strong robustness against statistical attacks,differential attacks,and noise interference,and can effectively resist known/selected plaintext attacks.This work will provide new ideas for the modeling of large-scale brainlike neural networks and high-security image encryption.
基金supported by the National Natural Science Foundation of China(21971240 and 22271283)the Natural Science Foundation of Shandong Province(ZR2025QC1361)。
文摘The exploration of solvent-driven reversible structural transformation in clusters is crucial for advanced stimulus-responsive optical applications and understanding of structure-property relationships.Herein,we report a solvent-driven reversible trans-formation between two copper(I)clusters:[Cu(totp)(CH_(3)CN)_(3)][Cu_(2)I_(3)(totp)(DPPPy)]·CH_(3)CN 1 and Cu_(4)I_(4)(DPPPy)_(2)·0.5CH_(2)Cl_(2)2(totp=tri-o-tolylphosphine,DPPPy=2-[diphenylphosphino]pyridine).X-ray radioluminescence and encryption applications were studied based on structure-dependent photophysical properties difference.The noncovalent interaction-mediated space charge transition between isolated ion units of 1 enables more efficient thermally activated delayed fluorescence by reverse intersystem crossing,accounting for structure-dependent luminescence.Notably,compared to 2,1 exhibits a higher scintillation light yield of 14832 photons MeV^(-1),exceeding that of the commercial scintillator Bi_(4)Ge_(3)O_(12)(8000 photons MeV^(-1)),and a low X-ray detection limit of 22.49 nGy s^(-1),far below the typical diagnostic dose(5.5μGy s^(-1)).Furthermore,scintillating film fabricated by 1 achieves X-ray imaging with a high spatial resolution of 16 lp/mm.The reversible structural interconversion enables solvent-responsive luminescent switches,and thus,the dynamic encryption system capable of multistage decryption was developed.This work not only offers new insight into solvent-regulated clusters transformations but also provides a promising strategy for developing high-performance copper(I)clusters-based scintillators and stimulus-responsive optical devices.
基金funded by Prince Sattam bin Abdulaziz University,grant number PSAU/2025/01/34620.
文摘This paper presents an image encryption scheme for underwater optical wireless communication(UOWC)systems based on dynamically generated hyperchaotic S-boxes,aiming to enhance both data security and transmission performance in underwater environments.The proposed encryption approach provides strong confusion and diffusion properties and is evaluated over five Jerlov water types with different optical attenuation characteristics.Security analysis demonstrates that the encrypted images achieve information entropy values close to the ideal value of 8(7.9925–7.9993),with very low correlation coefficients in horizontal,vertical,and diagonal directions,as well as the system achieves high values in key metrics such as the Unified Average Changing Intensity(UACI)and Number of Pixel Change Rate(NPCR),ranging from 33.42 to 33.47 and from 99.58%to 99.62%,respectively,both near their theoretical optima.In addition to improving confidentiality,the hyperchaotic encryption process decorrelates pixel intensities and redistributes image spectral content,which enhances robustness against underwater absorption and scattering effects.As a result,improved transmission performance is observed;for example,in Jerlov type I(JI)water,the effective transmission distance is extended from16mfor plain images to 24mfor encrypted images,while the Peak Signal to Noise Ratio(PSNR)at 24 m increases from 9.25 to 20.13 dB after decryption and enhancement.These results confirmthat the proposed scheme provides a dual benefit of secure and reliable image transmission in UOWC systems.
基金supported by the National Natural Science Foundation of China(62303353,62273030,62573320)。
文摘Dear Editor,This letter studies the problem of stealthy attacks targeting stochastic event-based estimation,alongside proposing measures for their mitigation.A general attack framework is introduced,and the corresponding stealthiness condition is analyzed.To enhance system security,we advocate for a single-dimensional encryption method,showing that securing a singular data element is sufficient to shield the system from the perils of stealthy attacks.
基金National Key Research and Development Program of China(2021YFB3101402)National Natural Science Foundation of China(62202294)。
文摘This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model.
基金This work was supported by the National Key Research and Development Program of China under Grant No. 2017YFt30802000, the National Natural Science Foundation of China under Grant Nos. 61802241, 61772326, 61572303, 61872229, 61802242, and 61602290, the National Natural Science Foundation of China for International Young Scientists under Grant No. 61750110528, the National Cryp-tographv Development Fund during the 13th Five-Year Plan Period of China under Grant Nos. MMJJ20170216 and MMJJ20180217, the Foundation of State Key Laboratory of Information Security of China under Grant No. 2017-MS-03, and the Fundamental Re- search Funds for the Central Universities of China under Grant Nos. GK201603084, GK201702004, GK201603092, GK201603093, and GK201703062.
文摘Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage.
基金supported by the National Natural Science Foundation of China (Grant No. 61173157)Strategy Pilot Project of Chinese Academy of Sciences (Grant No. Sub-project XD06010702)IIE’s Cryptography Research Project
文摘Public-key cryptosystems for quantum messages are considered from two aspects:public-key encryption and public-key authentication.Firstly,we propose a general construction of quantum public-key encryption scheme,and then construct an informationtheoretic secure instance.Then,we propose a quantum public-key authentication scheme,which can protect the integrity of quantum messages.This scheme can both encrypt and authenticate quantum messages.It is information-theoretic secure with regard to encryption,and the success probability of tampering decreases exponentially with the security parameter with regard to authentication.Compared with classical public-key cryptosystems,one private-key in our schemes corresponds to an exponential number of public-keys,and every quantum public-key used by the sender is an unknown quantum state to the sender.
基金Supported by the National Grand Fundamental Research 973 Program of Chine under Grant No. 1999035803 and the National Natural Science Foundation of China under Grant No. 60473027. The authors would like to thank Dr. Qian-Hong Wu from Wollongong Univ. and Dr. Zheng-Tao Jiang from Xidian Univ. for their fruitful discussions. We also take the opportunity to appreciate valuable comments from editors and reviewers.
文摘This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme. As a result, a ciphertext is not a quadruple but a triple at the cost of a strong assumption, the third version of knowledge of exponent assumption (KEA3). Under assumptions of KEA3, a decision Diffie-Hellman (DDH) and a variant of target collision resistance (TCRv), the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack (IND-CCA2). This scheme is as efficient as Damgard ElGamal (DEG) scheme when it makes use of a well-known algorithm for product of exponentiations. The DEG scheme is recently proved IND-CCA1 secure by Bellare and Palacio in ASIACRYPT 2004 under another strong assumption. In addition to our IND-CCA2 secured scheme, we also believe that the security proof procedure itself provides a well insight for ElGamal-based encryption schemes which are secure in real world.
基金financial supports from National Key Research and Development Program of China(No.2022YFB3806200)。
文摘With the rapid development of holographic technology,metasurface-based holographic communication schemes have demonstrated immense potential for electromagnetic(EM)multifunctionality.However,traditional passive metasurfaces are severely limited by their lack of reconfigurability,hindering the realization of versatile holographic applications.Origami,an art form that mechanically induces spatial deformations,serves as a platform for multifunctional devices and has garnered significant attention in optics,physics,and materials science.The Miura-ori folding paradigm,characterized by its continuous reconfigurability in folded states,remains unexplored in the context of holographic imaging.Herein,we integrate the principles of Rosenfeld with L-and D-metal chiral enantiomers on a Miura-ori surface to tailor the aperture distribution.Leveraging the continuously tunable nature of the Miura-ori's folded states,the chiral response of the metallic structures varies across different folding configurations,enabling distinct EM holographic imaging functionalities.In the planar state,holographic encryption is achieved.Under specific folding conditions and driven by spin circularly polarized(CP)waves at a particular frequency,multiplexed holographic images can be reconstructed on designated focal planes with CP selectivity.Notably,the fabricated origami metasurface exhibits a large negative Poisson ratio,facilitating portability and deployment and offering novel avenues for spin-selective systems,camouflage,and information encryption.