期刊文献+

基于生成对抗网络的抗泄露加密算法研究 被引量:11

Key Resilient Encryption Algorithm Based on Generative Adversarial Networks
下载PDF
导出
摘要 生成对抗网络(Generative Adversarial Networks,GANs)是一种深度学习模型,通过与辨别模型的对抗获得逐渐完善的生成模型,用以产生真假难辨的数据,而利用生成对抗网络实现加密算法是一个新的研究方向。在16位密钥对称加密方案下,对Abadi等人的基本加密通信模型做了抗泄漏加密通信测试,发现了利用生成对抗网络实现抗泄露加密通信的可能性。对通信双方和敌手的神经网络模型进行了改进,通过修改系统的激活函数,获得3比特密钥泄露情况下的加密算法模型,通过增加解密方和敌手模型的复杂度可提高通信的稳定性。在模型中增加批规格化处理,进一步提升了抗泄露加密通信能力。最终可以在8位泄漏的情况下,保证通信双方正常通信且敌手无法获取秘密信息。为抗泄露加密通信问题提供了一种全新的解决方案,并通过实验证明了方案的可行性。 Generative Adversarial Networks(GANs)is a kind of deep learning model. Through adversarial training with discriminative model, a gradually improved generative model can be obtained to generate data which are difficult to distinguish between true and false. And using GANs to realize encryption algorithm is a new research direction. Firstly, under the 16 bit key symmetric encryption scheme, this paper tests the key resilient encryption communication of the basic encryption communication model built by Abadi et al., and finds the possibility of realizing the key resilient encryption communication by using GANs. Then, the neural network model of both parties and the adversary is improved by modifying the activation function of the network, and obtains the encryption algorithm model in the case of 3 bit key leakage. The communication stability can be improved by increasing the complexity of the decrypter and the adversary model. Then, adding batch normalization in the model can further improve the ability of key resilient encryption communication. Finally, in the case of 8 bit leakage, it can ensure the normal communication between the two sides of the communication and the adversary cannot obtain the secret information. This paper provides a new solution to the problem of key resilient encryption communication and proves the feasibility of the solution through experiments.
作者 李西明 吴嘉润 吴少乾 郭玉彬 马莎 LI Ximing;WU Jiarun;WU Shaoqian;GUO Yubin;MA Sha(College of Mathematics and Informatics,South China Agricultural University,Guangzhou 510642,Chin)
出处 《计算机工程与应用》 CSCD 北大核心 2020年第10期69-74,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.61872152,No.61872409) 广东省自然科学基金杰出青年基金(No.2014A030306021) 广东省特支计划(No.2015TQ01X796) 广州市珠江科技新星项目(No.201610010037)。
关键词 抗泄露 生成对抗网络 批规格化 全连接神经网络 卷积神经网络 key resilient generative adversarial networks batch normalization fully connected neural networks convolutional neural networks
  • 相关文献

参考文献3

二级参考文献31

  • 1Bitansky N, Dachman-Soled D, Lin H. Leakage-tolerant computation with input-independent preprocessing//Proceedings of the CRYPTO'14. Santa Barbara, USA, 2014:146-167.
  • 2Dodis Y, Pietrzak K. Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks//Proceedings of the CRYPTO'10. Santa Barbara, USA, 2010:21-40.
  • 3Akavia A, Goldwasser S, Vaikuntanathan V. Simultaneous hardcore bits and cryptography against memory attacks// Proceedings of the TCC' 09. San Francisco, USA, 2009: 474-495.
  • 4Brakershi Z, Kalai Y T, Katz J, Vaikuntanathan V. Overco- ming the hole in the bucket: Public-key cryptogaphy resilient to continual memory leakage//Proceedings of the FOCS: 10. Las Vegas, USA, 2010:501-510.
  • 5Dodis Y, Haralambiev K, L6pez-Alt K, Wichs D. Efficient public-key cryptography in the presence of key leakage// Proceedings of the ASIACRYPT' 10. Singapore, 2010:613-631.
  • 6Alwen J, Dodis Y, Wichs D. Leakage-resilient public-key in the hounded-retrieval model//Proceedings of the CRYPTO' 09. Santa Barbara, USA, 2009:36-54.
  • 7Yu J, Kong F Y, Cheng X G, et al. Intrusion-resilient identity- based signature: Security definition and construction. Journal of Systems and Software, 2012, 85(2): 382-391.
  • 8Alwen J, Dodis Y, Naor M. Public-key encryption in the bounded-retrieval model//Proceedings of the EUROCRYPT'10. Riviera, French, 2010:113-134.
  • 9Barak B, Dodis Y, Krawczyk H, et al. Leftover hash lemma, revisited//Proceedings of the CRYPTO' 11. Santa Barbara, USA, 2011:1-20.
  • 10Chow S, Dodis D, Rouselakis Y, Waters B. Practical leakage- resilient identity based encryption from simple assumptions// Proceedings of the ACM-CCS'10. New York, USA, 2010: 152-161.

共引文献10

同被引文献76

引证文献11

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部