期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
One-way hash function construction based on the spatiotemporal chaotic system 被引量:2
1
作者 罗玉玲 杜明辉 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期84-93,共10页
Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the ... Based on the spatiotemporal chaotic system, a novel algorithm for constructing a one-way hash function is proposed and analysed. The message is divided into fixed length blocks. Each message block is processed by the hash compression function in parallel. The hash compression is constructed based on the spatiotemporal chaos. In each message block, the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function. The final hash value is generated by further compressing the mixed result of all the hash compression vulues. Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key, good statistical properties, and strong collision resistance. 展开更多
关键词 hash value spatiotemporal chaos hash compression function
下载PDF
A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing
2
作者 LI Xinyan XIAO Di +1 位作者 MOU Huajian ZHANG Rui 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第3期219-224,共6页
This paper proposes a verifiable secret image sharing scheme based on compressive sensing, secret sharing, and image hashing. In this scheme, Toeplitz matrix generated by two chaotic maps is employed as measurement ma... This paper proposes a verifiable secret image sharing scheme based on compressive sensing, secret sharing, and image hashing. In this scheme, Toeplitz matrix generated by two chaotic maps is employed as measurement matrix. With the help of Shamir threshold scheme and image hashing, the receivers can obtain the stored values and the hash value of image. In the verifying stage and restoring stage, there must be at least t legal receivers to get the effective information. By comparing the hash value of the restored image with the hash value of original image, the scheme can effectively prevent the attacker from tampering or forging the shared images. Experimental results show that the proposed scheme has good recovery performance, can effectively reduce space, and is suitable for real-time transmission, storage, and verification. 展开更多
关键词 compressive sensing secret sharing measurement matrix image hashing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部