期刊文献+
共找到1,754篇文章
< 1 2 88 >
每页显示 20 50 100
A new quantum key distribution resource allocation and routing optimization scheme
1
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
下载PDF
Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
2
作者 徐乐辰 张春辉 +1 位作者 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期204-208,共5页
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi... Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources. 展开更多
关键词 quantum key distribution heralded single-photon source decoy-state method
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
3
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
4
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
下载PDF
Elucidation of potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa
5
作者 Mingming Li Qiujin Zhu +4 位作者 Chao Qu Xiaohui Gong Yunhan Zhang Xin Zhang Shouwei Wang 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第4期2152-2160,共9页
Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.T... Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal. 展开更多
关键词 Dry-cured pork coppa Endogenous proteases PROTEOLYSIS key taste-active amino acids Volatile compounds
下载PDF
Countermeasure against blinding attack for single-photon detectors in quantum key distribution
6
作者 Lianjun Jiang Dongdong Li +12 位作者 Yuqiang Fang Meisheng Zhao Ming Liu Zhilin Xie Yukang Zhao Yanlin Tang Wei Jiang Houlin Fang Rui Ma Lei Cheng Weifeng Yang Songtao Han Shibiao Tang 《Journal of Semiconductors》 EI CAS CSCD 2024年第4期76-81,共6页
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin... Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security. 展开更多
关键词 quantum key distribution single photon detector blinding attack pulsed blinding attack COUNTERMEASURE quan-tum communication
下载PDF
National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization
7
《China Rare Earth Information》 2024年第1期F0002-F0002,共1页
National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The... National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.The key laboratory takes Baotou Research Institute of Rare Earths as the main research body,cooperating with scientific and technological strength from Lanzhou University and Changsha Research Institute of Mining and Metallurgy. 展开更多
关键词 key Earth LABORATORY
下载PDF
Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory
8
作者 Vincent Mbonigaba Fulgence Nahayo +1 位作者 Octave Moutsinga Okalas-Ossami Dieudonné 《Journal of Information Security》 2024年第1期53-62,共10页
In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has beco... In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys. 展开更多
关键词 key Wave ELECTROMAGNETIC CRYPTOGRAPHY POST Quantum Network Protocol PROPAGATION ALGORITHM
下载PDF
Current Status of Key Competencies among Medical Students: A Latent Profile Analysis
9
作者 Mengyao Xiao Li Yan +1 位作者 Yongping Xia Li Liu 《Open Journal of Applied Sciences》 2024年第2期450-465,共16页
The purpose of this study was to understand the overall level of key competencies of medical students and explore the potential profile of key competencies, promoting quality education, and improving the quality talen... The purpose of this study was to understand the overall level of key competencies of medical students and explore the potential profile of key competencies, promoting quality education, and improving the quality talent cultivation in medical colleges. A stratified random sampling method selected 734 medical students from four medical colleges in Chongqing Province of China. A general information questionnaire and a key competencies survey questionnaire were used to conduct the survey. The overall score and scores of each dimension of key competencies were analyzed. Latent profile analysis was conducted to classify the key competencies of medical students and compare the distribution differences of demographic variables among different categories. The results showed that 26% of medical students have never heard of the concept of key competencies, and 59% of them are not familiar with the content related to key competencies. The score of key competencies is 3.66 ± 0.60, with the highest score in the dimension of responsibility and the lowest score in the dimension of humanistic accomplishment. The latent profile analysis classified them into three categories: “low key competencies group (14.71%)”, “medium key competencies group (36.79%)”, and “high key competencies group (48.50%)”. The R3STEP regression analysis results showed statistically significant differences in educational level and whether they served as student cadres among different key competencies categories of medical students. This paper discusses three different potential key competencies categories among medical students, and the overall level of key competencies is relatively good. However, medical students lack a comprehensive and systematic understanding of key competencies. Humanistic accomplishment, healthy living, and practical innovation are the three dimensions with lower scores and should be given more attention. Medical colleges should integrate the concept of key competencies into teaching and implement it in medical practice to cultivate more high-quality medical talents for society. 展开更多
关键词 Sustainable Education Medical Students key Competencies Latent Profile Analysis
下载PDF
Analysis of the Significance of Key Points of Patient Interventional Psychological Care and Pain Care
10
作者 Xiaoping Dai Chu Luo Jiawei Dai 《Journal of Clinical and Nursing Research》 2024年第3期66-71,共6页
Interventional therapy has become increasingly popular in clinical practice due to advancements in medical technology.However,patients often experience psychological and physiological pressure due to its invasive natu... Interventional therapy has become increasingly popular in clinical practice due to advancements in medical technology.However,patients often experience psychological and physiological pressure due to its invasive nature.The management of patient discomfort and tension is crucial to ensure effective treatment.Psychological and pain management are essential components of interventional therapy,as they significantly impact patient recovery and prognosis.This article discussed the importance of interventional psychological and pain care for patients,starting with the development and spread of interventional therapy.The significance of providing high-quality nursing services to patients and improving their quality of life was also discussed. 展开更多
关键词 Interventional treatment Psychological nursing Pain care key points Significance analysis
下载PDF
Real-Time Mosaic Method of Aerial Video Based on Two-Stage Key Frame Selection Method
11
作者 Minwen Yuan Yonghong Long Xin Li 《Open Journal of Applied Sciences》 2024年第4期1008-1021,共14页
A two-stage automatic key frame selection method is proposed to enhance stitching speed and quality for UAV aerial videos. In the first stage, to reduce redundancy, the overlapping rate of the UAV aerial video sequenc... A two-stage automatic key frame selection method is proposed to enhance stitching speed and quality for UAV aerial videos. In the first stage, to reduce redundancy, the overlapping rate of the UAV aerial video sequence within the sampling period is calculated. Lagrange interpolation is used to fit the overlapping rate curve of the sequence. An empirical threshold for the overlapping rate is then applied to filter candidate key frames from the sequence. In the second stage, the principle of minimizing remapping spots is used to dynamically adjust and determine the final key frame close to the candidate key frames. Comparative experiments show that the proposed method significantly improves stitching speed and accuracy by more than 40%. 展开更多
关键词 UAV Aerial Video Image Stiching key Frame Selection Overlapping Rate Remap Error
下载PDF
Performance of phase-matching quantum key distribution based on wavelength division multiplexing technology 被引量:1
12
作者 马海强 韩雁鑫 +1 位作者 窦天琦 李鹏云 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期103-107,共5页
Quantum key distribution(QKD) generates information-theoretical secure keys between two parties based on the physical laws of quantum mechanics. The phase-matching(PM) QKD protocol allows the key rate to break the qua... Quantum key distribution(QKD) generates information-theoretical secure keys between two parties based on the physical laws of quantum mechanics. The phase-matching(PM) QKD protocol allows the key rate to break the quantum channel secret key capacity limit without quantum repeaters, and the security of the protocol is demonstrated by using equivalent entanglement. In this paper, the wavelength division multiplexing(WDM) technique is applied to the PM-QKD protocol considering the effect of crosstalk noise on the secret key rate. The performance of PM-QKD protocol based on WDM with the influence of adjacent classical channels and Raman scattering is analyzed by numerical simulations to maximize the total secret key rate of the QKD, providing a reference for future implementations of QKD based on WDM techniques. 展开更多
关键词 quantum key distribution wavelength division multiplexing secret key rate
下载PDF
Technical development of operational in-situ marine monitoring and research on its key generic technologies in China 被引量:1
13
作者 Yunzhou Li Juncheng Wang 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2023年第10期117-126,共10页
In China,operational in-situ marine monitoring is the primary means of directly obtaining hydrological,meteorological,and oceanographic environmental parameters across sea areas,and it is essential for applications su... In China,operational in-situ marine monitoring is the primary means of directly obtaining hydrological,meteorological,and oceanographic environmental parameters across sea areas,and it is essential for applications such as forecast of marine environment,prevention and mitigation of disaster,exploitation of marine resources,marine environmental protection,and management of transportation safety.In this paper,we summarise the composition,development courses,and present operational status of three systems of operational in-situ marine monitoring,namely coastal marine automated network station,ocean data buoy and voluntary observing ship measuring and reporting system.Additionally,we discuss the technical development in these in-situ systems and achievements in the key generic technologies along with future development trends. 展开更多
关键词 marine observation technology operational in-situ marine monitoring C-MAN station ocean data buoy VOS measuring and reporting system achievements in the key technologies development trend
下载PDF
Security of the traditional quantum key distribution protocols with finite-key lengths
14
作者 冯宝 黄海东 +3 位作者 卞宇翔 贾玮 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期120-124,共5页
Quantum key distribution(QKD)in principle can provide unconditional secure communication between distant parts.However,when finite-key length is taken into account,the security can only be ensured within certain secur... Quantum key distribution(QKD)in principle can provide unconditional secure communication between distant parts.However,when finite-key length is taken into account,the security can only be ensured within certain security level.In this paper,we adopt the Chernoff bound analysis method to deal with finite-key-size effects,carrying out corresponding investigations on the relationship between the key generation rate and security parameters for different protocols,including BB84,measurement-device-independent and twin-field QKD protocols.Simulation results show that there exists a fundamental limit between the key rate and the security parameters.Therefore,this study can provide valuable references for practical application of QKD,getting a nice balance between the key generation rate and the security level. 展开更多
关键词 quantum key distribution BB84 measurement-device-independent quantum key distribution twin-field quantum key distribution
下载PDF
Preface to Special Issue on Advanced Optoelectronic and Electronic Devices toward Future Displays--Celebration of the 10th anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies at HKUST
15
作者 Hoi-Sing Kwok Zhiyong Fan 《Journal of Semiconductors》 EI CAS CSCD 2023年第9期1-2,共2页
This year marks the tenth anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies(SKLADOT)at the Hong Kong University of Science and Technology(HKUST).The predecessor of SKLADOT w... This year marks the tenth anniversary of the State Key Laboratory of Advanced Displays and Optoelectronics Technologies(SKLADOT)at the Hong Kong University of Science and Technology(HKUST).The predecessor of SKLADOT was the Center for Display Research(CDR)which was started in 1995.Thus display research has a long history at HKUST. 展开更多
关键词 ADO key UST
下载PDF
Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT
16
作者 M.Suresh Kumar T.Purosothaman 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期925-938,共14页
The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive... The expanding and ubiquitous availability of the Internet of Things(IoT)have changed everyone’s life easier and more convenient.Same time it also offers a number of issues,such as effectiveness,security,and excessive power consumption,which constitute a danger to intelligent IoT-based apps.Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member.A centralized trustworthy system,which is in charge of key distribution and upgrades,is used to maintain group keys.To provide longitudinal access controls,Software Defined Network(SDN)based security controllers are employed for group administration services.Cloud service providers provide a variety of security features.There are just a few software security answers available.In the proposed system,a hybrid protocols were used in SDN and it embeds edge system to improve the security in the group communication.Tree-based algorithms compared with Group Key Establishment(GKE)and Multivariate public key cryptosystem with Broadcast Encryption in the proposed system.When all factors are considered,Broadcast Encryption(BE)appears to become the most logical solution to the issue.BE enables an initiator to send encrypted messages to a large set of recipients in a efficient and productive way,meanwhile assuring that the data can only be decrypted by defining characteristic.The proposed method improves the security,efficiency of the system and reduces the power consumption and minimizes the cost. 展开更多
关键词 Internet of things ENCRYPTION DECRYPTION group key software defined network public key SECURITY
下载PDF
An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT
17
作者 Lupeng Zhang Pingchuan Wang +4 位作者 Yuming Zhang Zongzheng Chi Ning Tong Lei Wang Fengqi Li 《Digital Communications and Networks》 SCIE CSCD 2023年第4期809-816,共8页
The Sixth-Generation(6G)enhances the Industrial Internet of Things(IIoT)communication efficiency and further raises security requirements.It is crucial to construct a post-quantum security communication channel betwee... The Sixth-Generation(6G)enhances the Industrial Internet of Things(IIoT)communication efficiency and further raises security requirements.It is crucial to construct a post-quantum security communication channel between any pair of industrial equipment.Recent work shows that two legitimate devices can directly extract symmetrical secret keys in information-theoretic secure by measuring their common wireless channels.However,existing schemes may cause a high bit mismatch rate in IIoT with high noise.In addition,the physical layer key extraction scheme widely uses passive attack assumptions,which also contradicts the high-security requirements of IIoT.By analyzing and modeling IIoT systems and channels,we propose an Adaptive and Robust Secret Key Extraction scheme(ARSKE)from high noise wireless channels in 6G-enabled IIoT.To eliminate the non-reciprocity of the wireless channel,we design a smoothing method as the preprocessing module.Then,we propose a Robust Secure Reconciliation technique that can effectively resist active attacks by jointly designing the information reconciliation and privacy amplification phases.Extensive real-world experiments are conducted to test the effectiveness and robustness of our scheme. 展开更多
关键词 SECURITY key extraction Resource-constrained devices PRIVACY
下载PDF
Celebrating the 20th Anniversary of the Key Laboratory of Chinese Internal Medicine of Ministry of Education
18
《Journal of Traditional Chinese Medical Sciences》 CAS 2023年第2期F0003-F0003,共1页
The Key Laboratory of Chinese Internal Medicine of Ministry of Education,established in 2002,was the first key laboratory approved by the Ministry of Education for the discipline of Chinese medicine.It is also one of ... The Key Laboratory of Chinese Internal Medicine of Ministry of Education,established in 2002,was the first key laboratory approved by the Ministry of Education for the discipline of Chinese medicine.It is also one of Beijing's municipal key lab-oratories.Based at the Dongzhimen Hospital,which is part of Beijing University of Chinese Medicine,the laboratory con-ducts basic and applicd basic rescarch into Chinese medicine to meet the national strategic needs of prevention and treatment of major discases.It devotes itself to the continuation and innova-tive development of Chinese medicine. 展开更多
关键词 INTERNAL PREVENTION key
下载PDF
Research progress in quantum key distribution
19
作者 张春雪 吴丹 +3 位作者 崔鹏伟 马俊驰 王玥 安俊明 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第12期129-143,共15页
Quantum key distribution(QKD)is a sophisticated method for securing information by leveraging the principles of quantum mechanics.Its objective is to establish a confidential key between authorized partners who are co... Quantum key distribution(QKD)is a sophisticated method for securing information by leveraging the principles of quantum mechanics.Its objective is to establish a confidential key between authorized partners who are connected via both a quantum channel and a classical authentication channel.This paper presents a comprehensive overview of QKD protocols,chip-based QKD systems,quantum light sources,quantum detectors,fiber-based QKD networks,space-based QKD systems,as well as the applications and prospects of QKD technology. 展开更多
关键词 quantum key distribution(QKD) SOURCES detectors CHIP
下载PDF
A New Sine-Ikeda Modulated Chaotic Key for Cybersecurity
20
作者 S.Hanis 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期865-878,共14页
In the recent past,the storage of images and data in the cloud has shown rapid growth due to the tremendous usage of multimedia applications.In this paper,a modulated version of the Ikeda map and key generation algori... In the recent past,the storage of images and data in the cloud has shown rapid growth due to the tremendous usage of multimedia applications.In this paper,a modulated version of the Ikeda map and key generation algorithm are proposed,which can be used as a chaotic key for securely storing images in the cloud.The distinctive feature of the proposed map is that it is hyperchaotic,highly sensitive to initial conditions,and depicts chaos over a wide range of con-trol parameter variations.These properties prevent the attacker from detecting and extracting the keys easily.The key generation algorithm generates a set of sequences using a designed chaos map and uses the harmonic mean of the gen-erated sequences as the seed key.Furthermore,the control parameters are modi-fied after each iteration.This change in the control parameters after each iteration makes it difficult for an attacker to predict the key.The designed map was tested mathematically and through simulations.The performance evaluation of the map shows that it outperforms other chaotic maps in terms of its parameter space,Lya-punov exponent,bifurcation entropy.Comparing the designed chaotic map with existing chaotic maps in terms of average cycle length,maximum Lyapunov exponent,approximate entropy,and a number of iterations,it is found to be very effective.The existence of chaos is also proved mathematically using Schwartz’s derivative theorem.The proposed key generation algorithm was tested using the National Institute of Standards and Technology(NIST)randomness test with excellent results. 展开更多
关键词 BIFURCATION CHAOS entropy keyspace CYBERSECURITY key generation
下载PDF
上一页 1 2 88 下一页 到第
使用帮助 返回顶部