期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
FL-EASGD:Federated Learning Privacy Security Method Based on Homomorphic Encryption
1
作者 Hao Sun xiubo chen Kaiguo Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第5期2361-2373,共13页
Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data.However,there is still a potential risk of privacy leakage,for example,attackers can obta... Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data.However,there is still a potential risk of privacy leakage,for example,attackers can obtain the original data through model inference attacks.Therefore,safeguarding the privacy of model parameters becomes crucial.One proposed solution involves incorporating homomorphic encryption algorithms into the federated learning process.However,the existing federated learning privacy protection scheme based on homomorphic encryption will greatly reduce the efficiency and robustness when there are performance differences between parties or abnormal nodes.To solve the above problems,this paper proposes a privacy protection scheme named Federated Learning-Elastic Averaging Stochastic Gradient Descent(FL-EASGD)based on a fully homomorphic encryption algorithm.First,this paper introduces the homomorphic encryption algorithm into the FL-EASGD scheme to preventmodel plaintext leakage and realize privacy security in the process ofmodel aggregation.Second,this paper designs a robust model aggregation algorithm by adding time variables and constraint coefficients,which ensures the accuracy of model prediction while solving performance differences such as computation speed and node anomalies such as downtime of each participant.In addition,the scheme in this paper preserves the independent exploration of the local model by the nodes of each party,making the model more applicable to the local data distribution.Finally,experimental analysis shows that when there are abnormalities in the participants,the efficiency and accuracy of the whole protocol are not significantly affected. 展开更多
关键词 Federated learning homomorphic encryption privacy security stochastic gradient descent
下载PDF
Efficient semi-quantum secret sharing protocol using single particles
2
作者 邢丁 王艺霏 +3 位作者 窦钊 李剑 陈秀波 李丽香 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期273-278,共6页
Semi-quantum secret sharing(SQSS)is a branch of quantum cryptography which only requires the dealer to have quantum capabilities,reducing the difficulty of protocol implementation.However,the efficiency of the SQSS pr... Semi-quantum secret sharing(SQSS)is a branch of quantum cryptography which only requires the dealer to have quantum capabilities,reducing the difficulty of protocol implementation.However,the efficiency of the SQSS protocol still needs to be further studied.In this paper,we propose a semi-quantum secret sharing protocol,whose efficiency can approach 100%as the length of message increases.The protocol is based on single particles to reduce the difficulty of resource preparation.Particle reordering,a simple but effective operation,is used in the protocol to improve efficiency and ensure security.Furthermore,our protocol can share specific secrets while most SQSS protocols could not.We also prove that the protocol is secure against common attacks. 展开更多
关键词 semi-quantum secret sharing efficiency single particles specific secret particle reordering
下载PDF
A Novel Post-Quantum Blind Signature for Log System in Blockchain 被引量:5
3
作者 Gang Xu Yibo Cao +4 位作者 Shiyuan Xu Ke Xiao Xin Liu xiubo chen Mianxiong Dong 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期945-958,共14页
In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In... In recent decades, log system management has been widely studied fordata security management. System abnormalities or illegal operations can befound in time by analyzing the log and provide evidence for intrusions. In orderto ensure the integrity of the log in the current system, many researchers havedesigned it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attackerequipped with a quantum computer can extract the user's private key from thepublic key to generate a forged signature, destroy the structure of the blockchain,and threaten the security of the log system. Thus, blind signature on the lattice inpost-quantum blockchain brings new security features for log systems. In ourpaper, to address these, firstly, we propose a novel log system based on post-quantum blockchain that can resist quantum computing attacks. Secondly, we utilize apost-quantum blind signature on the lattice to ensure both security and blindnessof log system, which makes the privacy of log information to a large extent.Lastly, we enhance the security level of lattice-based blind signature under therandom oracle model, and the signature size grows slowly compared with others.We also implement our protocol and conduct an extensive analysis to prove theideas. The results show that our scheme signature size edges up subtly comparedwith others with the improvement of security level. 展开更多
关键词 Log system post-quantum blockchain LATTICE blind signature privacy protection
下载PDF
Rational Non-Hierarchical Quantum State Sharing Protocol 被引量:3
4
作者 Zhao Dou Gang Xu +1 位作者 xiubo chen Kaiguo Yuan 《Computers, Materials & Continua》 SCIE EI 2019年第2期335-347,共13页
Rational participants want to maximize their benefits.The protocol with rational participants will be more realistic than the protocol with honest,semi-honest and dishonest participants.We research the rational non-hi... Rational participants want to maximize their benefits.The protocol with rational participants will be more realistic than the protocol with honest,semi-honest and dishonest participants.We research the rational non-hierarchical quantum state sharing in this paper.General steps of some known quantum state sharing protocol are summarized.Based on these steps,a new rational protocol is proposed.It means that lots of common protocols could be modified to rational protocols.Our protocol is widely applicable.Analyses show that the proposed protocol is rational and secure.It is also all-win for agents.Furthermore,number of deceiving agents is considered to redefine the utilities of agents. 展开更多
关键词 Quantum secret sharing rational protocol general steps
下载PDF
Directional Modulation Based on a Quantum Genetic Algorithm for a Multiple-Reflection Model 被引量:1
5
作者 Yuwei Huang xiubo chen +2 位作者 Kaiguo Yuan Jianyi Zhang Biao Liu 《Computers, Materials & Continua》 SCIE EI 2020年第9期1771-1783,共13页
Directional modulation is one of the hot topics in data security researches.To fulfill the requirements of communication security in wireless environment with multiple paths,this study takes into account the factors o... Directional modulation is one of the hot topics in data security researches.To fulfill the requirements of communication security in wireless environment with multiple paths,this study takes into account the factors of reflections and antenna radiation pattern for directional modulation.Unlike other previous works,a novel multiple-reflection model,which is more realistic and complex than simplified two-ray reflection models,is proposed based on two reflectors.Another focus is a quantum genetic algorithm applied to optimize antenna excitation in a phased directional modulation antenna array.The quantum approach has strengths in convergence speed and the globe searching ability for the complicated model with the large-size antenna array and multiple paths.From this,a phased directional modulation transmission system can be optimized as regards communication safety and improve performance based on the constraint of the pattern of the antenna array.Our work can spur applications of the quantum evolutionary algorithm in directional modulation technology,which is also studied. 展开更多
关键词 Directional modulation quantum genetic algorithm phased antenna array multiple reflection
下载PDF
Cipherchain:A Secure and Efficient Ciphertext Blockchain via mPECK 被引量:2
6
作者 Hailin chen Gang Xu +5 位作者 Yuling chen xiubo chen Yixian Yang Ruibin Fan Kaixiang Zhang Huizhong Li 《Journal of Quantum Computing》 2020年第1期57-83,共27页
Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of plaintext.However,it inevitab... Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of plaintext.However,it inevitably brings the issues with respect to data privacy and operating performance.In this paper,we proposed a novel blockchain scheme called Cipherchain,which can process and maintain transaction data in the form of ciphertext while the characteristics of immutability and auditability are guaranteed.Specifically in our scheme,transactions can be encrypted locally based on a searchable encryption scheme called multi-user public key encryption with conjunctive keyword search(mPECK),and can be accessed by multiple specific participants after appended to the globally consistent distributed ledger.By introducing execution-consensus-update paradigm of transaction flow,Cipherchain cannot only make it possible for transaction data to exist in the form of ciphertext,but also guarantee the overall system performance not greatly affected by cryptographic operations and other local execution work.In addition,Cipherchain is a promising scheme to realize the technology combination of“blockchain+cloud computing”and“permissioned blockchain+public blockchain”. 展开更多
关键词 Blockchain Cipherchain cloud computing mPECK
下载PDF
Constructing the three-qudit unextendible product bases with strong nonlocality
7
作者 Bichen Che Zhao Dou +3 位作者 xiubo chen Yu Yang Jian Li Yixian Yang 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第6期170-182,共13页
Unextendible product bases(UPBs)are interesting members of a family of orthogonal product bases.Here,we investigate the construction of 3-qudit UPBs with strong nonlocality.First,a UPB set in C^(3)■C^(3)■C^(3)of siz... Unextendible product bases(UPBs)are interesting members of a family of orthogonal product bases.Here,we investigate the construction of 3-qudit UPBs with strong nonlocality.First,a UPB set in C^(3)■C^(3)■C^(3)of size 19 is presented based on the shift UPBs.By mapping the system to a Rubik’s cube,we provide a general method of constructing UPBs in C^(d)■C^(d)■C^(d)of size(d-1)^(3)+2d+5,whose corresponding Rubik’s cube is composed of four parts.Second,for the more general case where the dimensions of parties are different,we extend the classical tile structure to the 3-qudit system and propose the tri-tile structure.By means of this structure,a C^(4)■C^(4)■C^(5)system of size 38 is obtained based on a C^(3)■C^(3)■C^(4)system of size 19.Then,we generalize this approach to the C^(d1)■C^(d2)■C^(d3)system which also consists of four parts.Our research provides a positive answer to the open question raised in by Halder et al.[Phys.Rev.Lett.122040403(2019)],indicating that there do exist UPBs that can exhibit strong quantum nonlocality without entanglement. 展开更多
关键词 strong nonlocality unextendible product bases tri-tile structure construction method
下载PDF
Probabilistic quantum teleportation of shared quantum secret
8
作者 Hengji Li Jian Li xiubo chen 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第9期196-201,共6页
Very recently,Lee et al.proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys.Rev.Lett.124060501(2020)].This quantum network is encoded with a ma... Very recently,Lee et al.proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys.Rev.Lett.124060501(2020)].This quantum network is encoded with a maximally entangled GHZ state.In this paper,we consider a partially entangled GHZ state as the entanglement channel,where it can achieve,probabilistically,unity fidelity transfer of the state.Two kinds of strategies are given.One arises when an auxiliary particle is introduced and a general evolution at any receiver's location is then adopted.The other one involves performing a single generalized Bell-state measurement at the location of any sender.This could allow the receivers to recover the transmitted state with a certain probability,in which only the local Pauli operators are performed,instead of introducing an auxiliary particle.In addition,the successful probability is provided,which is determined by the degree of entanglement of the partially multipartite entangled state.Moreover,the proposed protocol is robust against the bit and phase flip noise. 展开更多
关键词 probabilistic quantum teleportation shared quantum secret partially entangled GHZ state
下载PDF
Data Anonymous Authentication for BIoMT with Proxy Group Signature
9
作者 Chaoyang Li Yalan Wang +3 位作者 Gang Xu xiubo chen Xiangjun Xin Jian Li 《Journal of Cyber Security》 2021年第4期207-216,共10页
Along with the increase of wearable medical device,the privacy leakage problem in the process of transmission between these edge medical devices.The blockchain-enabled Internet of Medical Things(BIoMT)has been develop... Along with the increase of wearable medical device,the privacy leakage problem in the process of transmission between these edge medical devices.The blockchain-enabled Internet of Medical Things(BIoMT)has been developed to reform traditional centralized medical system in recent years.This paper first introduces a data anonymous authentication model to protect user privacy and medical data in BIoMT.Then,a proxy group signature(PGS)scheme has been proposed based on lattice assumption.This scheme can well satisfy the anonymous authentication demand for the proposed model,and provide anti-quantum attack security for BIoMT in the future general quantum computer age.Moreover,the security analysis shows this PGS scheme is secure against the dynamical-almost-full anonymous and traceability.The efficiency comparison shows the proposed model and PGS scheme is more efficient and practical. 展开更多
关键词 Blockchain-enabled Internet of Medical Things anonymous authentication proxy group signature medical data
下载PDF
Blockchain data secure sharing protocol based on threshold Paillier algorithm
10
作者 Likai Jia xiubo chen +3 位作者 Luxi Liu Xiaoge Wang Ke Xiao Gang Xu 《High-Confidence Computing》 EI 2023年第4期7-12,共6页
With the development of Internet technology,secure storage and secure sharing of data have become increasingly important.Traditional data sharing schemes exist a series of problems including lack of security and low e... With the development of Internet technology,secure storage and secure sharing of data have become increasingly important.Traditional data sharing schemes exist a series of problems including lack of security and low efficiency.In this paper,we construct a secure and efficient data sharing scheme based on threshold Paillier algorithm and blockchain technology,which achieves secure data storage and sharing without a third-party institution.Firstly,we propose a(t,l)threshold Paillier blockchain data sharing scheme,which effectively prevents decryption failures caused by the loss of a single node’s private key.Secondly,we propose a combined on-chain and off-chain data storage scheme,we store the ciphertext on the cloud server and the ciphertext hash value on the blockchain,which not only ensures the integrity of the data but also solves the storage limitation problem on the blockchain.Finally,we use the simulation paradigm to prove the security of the scheme in the semi-honest model.The discussion results of the comparison and the analysis of performance show that the blockchain data security sharing scheme proposed in this paper has lower computational overhead and higher security than other similar schemes. 展开更多
关键词 Blockchain Secure sharing data Privacy protection Threshold Paillier cryptosystem
原文传递
Improving the efficiency of quantum hash function by dense coding of coin operators in discrete-time quantum walk 被引量:1
11
作者 YuGuang Yang Yuchen Zhang +3 位作者 Gang Xu xiubo chen Yi-Hua Zhou WeiMin Shi 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2018年第3期18-25,共8页
Li et al. first proposed a quantum hash function(QHF) in a quantum-walk architecture. In their scheme, two two-particle interactions, i.e., I interaction and π-phase interaction are introduced and the choice of I or ... Li et al. first proposed a quantum hash function(QHF) in a quantum-walk architecture. In their scheme, two two-particle interactions, i.e., I interaction and π-phase interaction are introduced and the choice of I or π-phase interactions at each iteration depends on a message bit. In this paper, we propose an efficient QHF by dense coding of coin operators in discrete-time quantum walk. Compared with existing QHFs, our protocol has the following advantages: the efficiency of the QHF can be doubled and even more; only one particle is enough and two-particle interactions are unnecessary so that quantum resources are saved. It is a clue to apply the dense coding technique to quantum cryptographic protocols, especially to the applications with restricted quantum resources. 展开更多
关键词 quantum cryptography quantum walk discrete-time quantum walk COLLISION birthday attack
原文传递
Robust QKD-based private database queries based on alternative sequences of single-qubit measurements 被引量:1
12
作者 YuGuang Yang ZhiChao Liu +2 位作者 xiubo chen YiHua Zhou WeiMin Shi 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第12期1-11,共11页
Quantum channel noise may cause the user to obtain a wrong answer and thus misunderstand the database holder for existing QKD-based quantum private query(QPQ) protocols. In addition, an outside attacker may conceal hi... Quantum channel noise may cause the user to obtain a wrong answer and thus misunderstand the database holder for existing QKD-based quantum private query(QPQ) protocols. In addition, an outside attacker may conceal his attack by exploiting the channel noise. We propose a new, robust QPQ protocol based on four-qubit decoherence-free(DF) states. In contrast to existing QPQ protocols against channel noise, only an alternative fixed sequence of single-qubit measurements is needed by the user(Alice) to measure the received DF states. This property makes it easy to implement the proposed protocol by exploiting current technologies. Moreover, to retain the advantage of flexible database queries, we reconstruct Alice's measurement operators so that Alice needs only conditioned sequences of single-qubit measurements. 展开更多
关键词 quantum cryptography quantum private query decoherence-free states collective noise
原文传递
An attribute-based access control scheme using blockchain technology for IoT data protection
13
作者 Zenghui Yang xiubo chen +5 位作者 Yunfeng He Luxi Liu Yinmei Che Xiao Wang Ke Xiao Gang Xu 《High-Confidence Computing》 EI 2024年第3期41-50,共10页
With the wide application of the Internet of Things(IoT),storing large amounts of IoT data and protecting data privacy has become a meaningful issue.In general,the access control mechanism is used to prevent illegal u... With the wide application of the Internet of Things(IoT),storing large amounts of IoT data and protecting data privacy has become a meaningful issue.In general,the access control mechanism is used to prevent illegal users from accessing private data.However,traditional data access control schemes face some non-ignorable problems,such as only supporting coarse-grained access control,the risk of centralization,and high trust issues.In this paper,an attribute-based data access control scheme using blockchain technology is proposed.To address these problems,attribute-based encryption(ABE)has become a promising solution for encrypted data access control.Firstly,we utilize blockchain technology to construct a decentralized access control scheme,which can grant data access with transparency and traceability.Furthermore,our scheme also guarantees the privacy of policies and attributes on the blockchain network.Secondly,we optimize an ABE scheme,which makes the size of system parameters smaller and improves the efficiency of algorithms.These optimizations enable our proposed scheme supports large attribute universe requirements in IoT environments.Thirdly,to prohibit attribute impersonation and attribute replay attacks,we design a challenge-response mechanism to verify the ownership of attributes.Finally,we evaluate the security and performance of the scheme.And comparisons with other related schemes show the advantages of our proposed scheme.Compared to existing schemes,our scheme has more comprehensive advantages,such as supporting a large universe,full security,expressive policy,and policy hiding. 展开更多
关键词 Attribute-based encryption Access control Blockchain IoT data protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部