期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Asymmetrical Quantum Encryption Protocol Based on Quantum Search Algorithm 被引量:2
1
作者 LUO Wenjun LIU Guanli 《China Communications》 SCIE CSCD 2014年第9期104-111,共8页
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f... Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required. 展开更多
关键词 quantum cryptography asymmetrical encryption information-theoreticalsecurity quantum search algorithms
下载PDF
Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
2
作者 Mugaruka Buduge Gulain Jeremie Ndikumagenge +2 位作者 Buhendwa Nyenyezi Justin Bulonza Masumbuko Alexis Katho Seba Jacques 《Journal of Information Security》 2024年第3期299-307,共9页
In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any mod... In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any modern company. A companys operational and historical data contains strategic and operational knowledge of ever-increasing added value. The emergence of a new paradigm: big data. Today, the value of the data scattered throughout this mother of knowledge is calculated in billions of dollars, depending on its size, scope and area of intervention. With the rise of computer networks and distributed systems, the threats to these sensitive resources have steadily increased, jeopardizing the existence of the company itself by drying up production and losing the interest of customers and suppliers. These threats range from sabotage to bankruptcy. For several decades now, most companies have been using encryption algorithms to protect and secure their information systems against the threats and dangers posed by the inherent vulnerabilities of their infrastructure and the current economic climate. This vulnerability requires companies to make the right choice of algorithms to implement in their management systems. For this reason, the present work aims to carry out a comparative study of the reliability and effectiveness of symmetrical and asymmetrical cryptosystems, in order to identify one or more suitable for securing academic data in the DRC. The analysis of the robustness of commonly used symmetric and asymmetric cryptosystems will be the subject of simulations in this article. 展开更多
关键词 Comparative Study CRYPTOSYSTEMS Symmetric encryption Asymmetric encryption
下载PDF
Preserving scheme for user’s confidential information in smart grid based on digital watermark and asymmetric encryption 被引量:5
3
作者 WANG Shou-xiang CHEN Hai-wen +4 位作者 ZHAO Qian-yu GUO Lu-yang DENG Xin-yu SIWei-guo SUN Zhi-qing 《Journal of Central South University》 SCIE EI CAS CSCD 2022年第2期726-740,共15页
As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand respons... As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand response.However,there is a growing risk of privacy disclosure with the wide installation of smart meters,for they transmit readings and sensitive data simultaneously.To guarantee the confidentiality of the sensitive information and authenticity of smart meter readings,we proposed a privacy-preserving scheme based on digital watermarking and elliptic-curve cryptography(ECC)asymmetric encryption.The sensitive data are encrypted using the public key and are hidden in the collected readings using digital watermark.Only the authorized user can extract watermark and can decrypt the confidential data using its private key.The proposed method realizes secure end-to-end confidentiality of the sensitive information.It has faster computing speed and can verify the data source and ensure the authenticity of readings.The example results show that the proposed method has little influence on the original data and unauthorized access cannot be completed within a reasonable time.On embedded hardware,the processing speed of the proposed method is better than the existing methods. 展开更多
关键词 sensitive information smart grid smart meter asymmetric encryption
下载PDF
Color-image encryption scheme based on channel fusion and spherical diffraction
4
作者 Jun Wang Yuan-Xi Zhang +2 位作者 Fan Wang Ren-Jie Ni Yu-Heng Hu 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第3期276-284,共9页
A secure encryption scheme for color images based on channel fusion and spherical diffraction is proposed in this paper. In the proposed encryption scheme, a channel fusion technology based on the discrete wavelet tra... A secure encryption scheme for color images based on channel fusion and spherical diffraction is proposed in this paper. In the proposed encryption scheme, a channel fusion technology based on the discrete wavelet transformation is used to transform color images into single-channel grayscale images, firstly. In the process of transformation, the hyperchaotic system is used to permutate and diffuse the information of red–green–blue(RGB) channels to reduce the correlation of channels. Then the fused image is encrypted by spherical diffraction transform. Finally, the complex-valued diffraction result is decomposed into two real parts by the improved equal module decomposition, which are the ciphertext and the private key. Compared with the traditional color image encryption schemes that encrypt RGB channels separately, the proposed scheme is highly secure and robust. 展开更多
关键词 channel fusion hyper-chaotic system asymmetric encryption spherical diffraction
下载PDF
Secure and Robust Optical Multi-Stage Medical Image Cryptosystem
5
作者 Walid El-Shafai Moustafa H.Aly +2 位作者 Abeer D.Algarni Fathi E.Abd El-Samie Naglaa F.Soliman 《Computers, Materials & Continua》 SCIE EI 2022年第1期895-913,共19页
Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transfor... Due to the rapid growth of telemedicine and healthcare services,color medical image security applications have been expanded precipitously.In this paper,an asymmetric PTFrFT(Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested.Two different phases in the fractional Fourier and output planes are provided as deciphering keys.Accordingly,the ciphering keys will not be employed for the deciphering procedure.Thus,the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH(Optical Scanning Holography)and DRPE(Double Random Phase Encoding)algorithms.One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the onedimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components.More comparisons on various colormedical images are examined and analyzed to substantiate the cryptosystem efficacy.The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure.It has terrific cryptography performance compared to conventional cryptography algorithms,even in the presence of noise and severe channel attacks. 展开更多
关键词 Optical encryption medical image security symmetric and asymmetric encryption OSH DRPE PTFrFT
下载PDF
High-security multi-constellation shaping modulation with asymmetric encryption
6
作者 姜蕾 刘博 +7 位作者 任建新 吴翔宇 Rahat Ullah 毛雅亚 陈帅东 马一澜 赵立龙 田凤 《Chinese Optics Letters》 SCIE EI CAS CSCD 2024年第4期14-19,共6页
This Letter proposes a high-security modulation scheme for optical transmission systems.By using multi-constellation shaping and asymmetric encryption,the information security can be enhanced and quantum computer crac... This Letter proposes a high-security modulation scheme for optical transmission systems.By using multi-constellation shaping and asymmetric encryption,the information security can be enhanced and quantum computer cracking can be effectively resisted.Three-dimensional(3D)carrier-less amplitude phase modulation is utilized to superposition and transmit 3D signals.Experimental verification is conducted using a seven-core weakly coupled fiber platform.The results demonstrate that the proposed scheme can effectively protect the system from any illegal attacker. 展开更多
关键词 multi-core transmission asymmetric encryption multi-constellation shaping
原文传递
Instantiate Random Oracles in OAEP with Pseudorandom Functions
7
作者 JIA Xiaoying LI Hongda LI Bao 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期651-656,共6页
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti... This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes. 展开更多
关键词 random oracle(RO) model INSTANTIATION optimal asymmetric encryption padding(OAEP) indistinguishable securitity against adaptive chosen ciphertext attack (IND-CCA2)
原文传递
CNNs-based end-to-end asymmetric encrypted communication system
8
作者 Yongli An Zebing Hu +1 位作者 Haoran Cai Zhanlin Ji 《Intelligent and Converged Networks》 EI 2023年第4期313-325,共13页
In this paper,we propose an asymmetric encrypted end-to-end communication system based on convolutional neural networks to solve the problem of secure transmission in the end-to-end wireless communication system.The s... In this paper,we propose an asymmetric encrypted end-to-end communication system based on convolutional neural networks to solve the problem of secure transmission in the end-to-end wireless communication system.The system generates a key generator through a convolutional neural network as a bridge.The private and public keys establish a key pair relationship of arbitrary length sequence information.The transmitter and receiver consist of autoencoders based on convolutional neural networks.For data confidentiality requirements,we design the loss function of the end-to-end communication model based on a convolutional neural network.We also design bugs based on different predictions about the information the system eavesdropper has.Simulation results show that the system performs well on additive Gaussian white noise and Rayleigh fading channels.A legitimate party can establish a secure transmission under a designed communication system;an illegal eavesdropper without a key cannot accurately decode it. 展开更多
关键词 end-to-end communication system convolutional neural network asymmetric encryption loss function physical layer security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部