Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the c...Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks.This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding,which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security.The traditional and state-of-the-art joint source-channel coding algorithms are selected as two baselines for different comparison purposes.Experimental results demonstrate that our proposed algorithm outperforms the first baseline algorithm,the traditional source-channel coding,by 61.21%in efficiency under identical channel conditions(SNR=15 dB).In security,our proposed method can resist 2 more types of attacks compared to the two baselines,exhibiting nearly no increases in time consumption and error rate compared to the state-of-the-art joint source-channel coding algorithm while the secure semantic communication is supported.展开更多
Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes,it is found that the improved scheme can effectively resist conspiracy attack and forgery attack,but does not...Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes,it is found that the improved scheme can effectively resist conspiracy attack and forgery attack,but does not have semantic security and public verification function,and sends threshold signcryption by the secret secure channel,which increases the communication costs and potential safety hazards of the system.A new group-oriented publicly verifiable threshold signcryption scheme is proposed on the basis of the improved scheme,the new scheme overcomes the drawbacks of the improved scheme,which not only provides with semantic security and public verification function,but also can send threshold signcryption by the public channel.展开更多
The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advance...The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advancement of mobile networks,cloud computing,and Internet of Things,communication-computing integration and cloud-network integration have been important technical routes.As a result,the main application requirements of wireless networks have changed from data transmission to cloud-based information services.Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era,and secure semantic communication has become an important model.To address this issue,we propose a cloud-network-end collaborative security architecture.Firstly,we clarify security mechanisms for end system security,network connection security,and cloud services security,respectively.Next,based on the above three aspects,we elaborate on the connotation of cloud-network-end collaborative security.By giving example applications,including heterogeneous network secure convergence framework,unmanned system collaborative operations security framework,and space-air-ground integrated network security framework,we demonstrate the universality of the proposed architecture.Finally,we review the current research on end system security,network connection security,and cloud services security,respectively.展开更多
Within the framework of UC (universally composable) security, a general method is presented to construct a secure channel protocol with using IND-CVA (indistinguishability of encryption scheme under ciphertext veri...Within the framework of UC (universally composable) security, a general method is presented to construct a secure channel protocol with using IND-CVA (indistinguishability of encryption scheme under ciphertext verification attacks). A channel protocol with using the method first invokes an ideal keyexchange protocol to get a session key, and then computes the messages with an authenticated encryption scheme. The paper shows that a channel protocol is UC secure if and only if the underlying authenticated encryption scheme is both IND-CVA secure and INT-PTXT secure. The condition about secure channel protocol in this paper is much weaker than IND-CCA secure and INT-CTXT secure. The IND-CVA can be presented for describing the privacy requirements of secure channels in detail. Moreover, the method for designing secure channel protocol in the paper reduces the UC security of secure channels, which are measured by action-simulation in the UC security framework, to the security of authenticated encryption schemes, which are measured semantically.展开更多
基金supported in part by the National Key R&D Program of China under Grant 2022YFB3103500in part by the National Natural Science Foundation of China under Grant 62302195.
文摘Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks.This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding,which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security.The traditional and state-of-the-art joint source-channel coding algorithms are selected as two baselines for different comparison purposes.Experimental results demonstrate that our proposed algorithm outperforms the first baseline algorithm,the traditional source-channel coding,by 61.21%in efficiency under identical channel conditions(SNR=15 dB).In security,our proposed method can resist 2 more types of attacks compared to the two baselines,exhibiting nearly no increases in time consumption and error rate compared to the state-of-the-art joint source-channel coding algorithm while the secure semantic communication is supported.
基金Supported by the National Natural Science Foundation of China(No.61179026)the Fundamental Research funds for the Centeral Universities(No.3122013K001)
文摘Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes,it is found that the improved scheme can effectively resist conspiracy attack and forgery attack,but does not have semantic security and public verification function,and sends threshold signcryption by the secret secure channel,which increases the communication costs and potential safety hazards of the system.A new group-oriented publicly verifiable threshold signcryption scheme is proposed on the basis of the improved scheme,the new scheme overcomes the drawbacks of the improved scheme,which not only provides with semantic security and public verification function,but also can send threshold signcryption by the public channel.
基金supported by the National Key Research and Development Program of China(No.2021YFB3101100)National Natural Science Foundation of China(Nos.62232013,92267204,and 62202364)Fellowship of China National Postdoctoral Program for Innovation Talents(No.BX20230279).
文摘The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advancement of mobile networks,cloud computing,and Internet of Things,communication-computing integration and cloud-network integration have been important technical routes.As a result,the main application requirements of wireless networks have changed from data transmission to cloud-based information services.Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era,and secure semantic communication has become an important model.To address this issue,we propose a cloud-network-end collaborative security architecture.Firstly,we clarify security mechanisms for end system security,network connection security,and cloud services security,respectively.Next,based on the above three aspects,we elaborate on the connotation of cloud-network-end collaborative security.By giving example applications,including heterogeneous network secure convergence framework,unmanned system collaborative operations security framework,and space-air-ground integrated network security framework,we demonstrate the universality of the proposed architecture.Finally,we review the current research on end system security,network connection security,and cloud services security,respectively.
基金Supported by the National Basic Research Program of China (Grant No. G2002cb312205)
文摘Within the framework of UC (universally composable) security, a general method is presented to construct a secure channel protocol with using IND-CVA (indistinguishability of encryption scheme under ciphertext verification attacks). A channel protocol with using the method first invokes an ideal keyexchange protocol to get a session key, and then computes the messages with an authenticated encryption scheme. The paper shows that a channel protocol is UC secure if and only if the underlying authenticated encryption scheme is both IND-CVA secure and INT-PTXT secure. The condition about secure channel protocol in this paper is much weaker than IND-CCA secure and INT-CTXT secure. The IND-CVA can be presented for describing the privacy requirements of secure channels in detail. Moreover, the method for designing secure channel protocol in the paper reduces the UC security of secure channels, which are measured by action-simulation in the UC security framework, to the security of authenticated encryption schemes, which are measured semantically.