期刊文献+

一个新的基于神经网络同步的公开密钥交换协议

New public key exchange protocol based on neural synchronization
下载PDF
导出
摘要 首先介绍了在神经密码应用中的树型奇偶机模型,在综述神经密码协议研究的基础上,构建了一个使用含有衰减项的神经网络同步学习规则的新的密钥交换协议,并对其进行了理论分析。仿真实验结果表明,此协议可以使神经网络的同步性能提高4倍以上,对几种常见攻击的抵御表现良好,与传统的协议相比,新协议同步计算开销更小,安全性更高。 This paper first introduced the tree parity machine (TPM) network model. On the basis of this study, it proposed a novel neural network with attenuation term. Several simulations were then conducted to show that synchronization efficiency of the new protocol is improved more than 80%. Meanwhile, it also indicates that the new protocol is computational inexpen- sive and it improves the security of the protocol compared to the classic TPM-based protocol.
出处 《计算机应用研究》 CSCD 北大核心 2014年第10期3090-3092,3099,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61170249) 重庆市自然科学基金面上项目(CSTC2010BB2210) 重庆市博士后研究人员科研基金特别资助项目(渝xm201103013)
关键词 神经网络同步 密钥交换 树型奇偶机 衰减项 neural synchronization key exchange tree parity machines(TPM) attenuation term
  • 相关文献

参考文献18

  • 1KINZEL W, KANTER I.Interacting neural networks and cryptography[C]//Advances in Solid State Physics.Berlin:Springer,2002:381-391.
  • 2DIFFIE W, HELLMAN M.New directions in cryptography[J].IEEE Trans on Information Theory,1976,22(6):644-654.
  • 3MARKUS V, SEBASTIAN W.Tree parity machine rekeying architectures[J].IEEE Trans on Computers,2005,54(4):421-427.
  • 4蔡家楣,严杜鹃,陈铁明.一种基于神经网络权值同步的TinySec协议密钥更新方案[J].计算机科学,2009,36(4):84-86. 被引量:5
  • 5ROSEN-ZVI M, KANTER I, KINZEL W.Cryptography based on neural networks-analytical results[J].Journal of Physics A:Mathe-matical and General,2002,35(47):L707-L713.
  • 6RUTTOR A, KINZEL W, SHACHAM L, et al.Neural cryptography with feedback[J].Physics Review E,2004,69(4):046110.
  • 7RUTTOR A, KINZEL W, KANTER I.Neural cryptography with queries[J].Journal of Statistical Mechanics:Theory and Experiment,2005,2005(1):P01009.
  • 8田勇,向涛.神经网络同步的判定及在神经密码中的应用[J].计算机工程与应用,2011,47(36):109-111. 被引量:5
  • 9KANTER I, KINZEL W, KANTER E.Secure exchange of information by synchronization of neural networks[J].Europhysics Letters,2002,51(1):141-147.
  • 10KLIMOV A, MITYAGUINE A, SHAMIR A.Analysis of neural cryptography[C]//Lecture Notes in Computer Science, vol 2501.Berlin:Springer,2003:823-828.

二级参考文献26

  • 1陈铁明,蔡家楣.基于神经网络互学习模型的密钥协商协议[J].计算机研究与发展,2006,43(z2):205-209. 被引量:1
  • 2Karlof C, Sastry N, Wagner D. TinySec: A Link Layer Security Architecture for Wireless Sensor NetworksffProceedings of the Second ACM Conference on Embedded Networked Sensor Systems. Nov. 2004
  • 3Kinzel W, Kanter I. Interacting neural networks and cryptography[J]. Advances in Solid State Physics,2002,42:383
  • 4Volkrner M. Authenticated tree parity machine key exchange [OL]. 2004. iaer. org/2004/204, ps. gz
  • 5Lauria F E, Neurocrytology O, Caianiello E R, et al. Parallel Architectures and Neural Networks// Third Italian Workshop [A]. Singapore, 1990: 337-343
  • 6Metzler R, Kinzel W. Interacting neural networks. Phys. Rev., 2000,E 62:2555
  • 7Kanter I , Kinzel W. The theory of neural networks and cryptography//Proceedings of the XXII Solvay Conference on the Physics of Communication, 2002 : 631
  • 8Rosen-Zvi M, Klein E, Kanter I, et al. Mutual learning in a tree parity machine and its application to cryptography. Phys. Rev. , 2002,E 66:066135
  • 9Ruttor A, Kinzel W, Shacham L, et al. Neural cryptography with feedback. Phys. Rev. ,2004,E 69:046110
  • 10Chen T-M, Cai J-M. A Novel Remote User Authentication Scheme Using Interacting Neural Network // ICNC2005. LNCS3610. Berlin: Springer-Verlag, 2005 : 1117-1120

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部