期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
METHOD FOR CONSTRUCTING TAG-KEM SCHEMES WITH SHORT-MESSAGE PUBLIC-KEY ENCRYPTIONS 被引量:1
1
作者 陈原 陈丹 董庆宽 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期301-305,共5页
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ... Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one. 展开更多
关键词 information security public-key encryption chosen ciphertext security Tag-KEM scheme
下载PDF
A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE 被引量:2
2
作者 Jiang Zhengtao Hao Yanhua Wang Yumin 《Journal of Electronics(China)》 2005年第5期490-497,共8页
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is ... Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed. 展开更多
关键词 Probabilistic public-key encryption scheme LUCas sequence(LUC) Discrete logarithm Integer factorization
下载PDF
Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
3
作者 Hyun Sook Rhee 《Computers, Materials & Continua》 SCIE EI 2022年第10期69-85,共17页
As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage... As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage,the data to be stored needs to be encrypted for this reason.Since“searchable encryption”is enable to search on the encrypted data without any decryption,it is one of convenient solutions for secure data management.A public key encryption with keyword search(for short,PEKS)is one of searchable encryptions.Abdalla et al.firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the“robust”ANO-CCA secure identity-based encryption(IBE).In this paper,we propose two generic constructions of consistent IND-CCA secure PEKS combining(1)a hierarchical identity based encryption(for short,HIBE)and a signature scheme or(2)a HIBE,an encapsulation,and a message authentication code(for short,MAC)scheme.Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker“ANO-CPA security(resp.,IND-CPA security)”of HIBE than“ANOCCA security(resp.,IND-CCA security)”of IBE required in for achieving IND-CCA secure(resp.,consistent)PEKS.Finally,we prove that our generic constructions satisfy IND-CCA security and consistency under the security models. 展开更多
关键词 Searchable encryption public-key encryption with keyword search chosen ciphertext security data privacy
下载PDF
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System 被引量:18
4
作者 Mamta Brij B.Gupta +3 位作者 Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1877-1890,共14页
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved... The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective search.Attribute-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud storage.However,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations.In a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE schemes.In the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain network.Thus,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical CCPS.With the assistance of blockchain technology,the proposed scheme offers two main benefits.First,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of failure.Second,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain network.Specifically,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus nodes.This eliminates the need of the trusted authority and reduces the burden of data users,respectively.Further,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret key associated with users.It has been verified both theoretically and practically in the performance analysis section. 展开更多
关键词 Cloud-based cyber-physical systems(CCPS) data encryption healthcare information search and retrieval keyword search public-key cryptosystems searchable encryption
下载PDF
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem
5
作者 Zhiyong Zheng Fengxia Liu Kun Tian 《Journal of Information Security》 2023年第4期366-395,共30页
We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. Thi... We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos [1] in 1978, and to some new problems that appeared in Peikert [2] as open questions 10 and open questions 11 a few years ago. Our scheme is completely different from the breakthrough work [3] of Gentry in 2009. Gentry’s bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function. To date, it remains the only known way of obtaining unbounded FHE. Our construction of an unbounded FHE scheme is straightforward and can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique. 展开更多
关键词 Fully Homomorphic encryption Ideal Lattices Chinese Remainder Theorem General Compact knapsacks Problem
下载PDF
Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes 被引量:1
6
作者 Qi-Qi Lai Bo Yang +3 位作者 Yong Yu Zhe Xia Yan-Wei Zhou Yuan Chen 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第6期1243-1260,共18页
Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the relat... Identity-based hash proof system is a basic and important primitive. Ittographic schemes and protocols that are secure against key-leakage attacks. In thisupdatable identity-based hash proof system, in which the related master secret keyis widely utilized to construct cryp-paper, we introduce the concept ofand the identity secret key can beupdated securely. Then, we instantiate this primitive based on lattices in the standard model. Moreover, we introduce anapplication of this new primitive by giving a generic construction of leakage-resilient public-key encryption schemes withanonymity. This construction can be considered as the integration of the bounded-retrieval model and the continual leakagemodel. Compared with the existing leakage-resilient schemes, our construction not only is more efficient but also can resistmuch more key leakage. 展开更多
关键词 public-key encryption IDENTITY-BASED HASH proof system lattice updatable leakage-resilience
原文传递
一种基于RSA的加密算法 被引量:14
7
作者 王茜 倪建伟 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第1期68-72,共5页
RSA加密算法是第一个较为完善的公开密钥算法,它的安全性主要依赖于大数分解的难度。在分析了RSA公钥加密系统和背包公钥密码系统存在的安全问题的基础上,将背包公钥密码的思想与RSA算法相结合,形成了一种新的加密算法,它不仅消除了RSA... RSA加密算法是第一个较为完善的公开密钥算法,它的安全性主要依赖于大数分解的难度。在分析了RSA公钥加密系统和背包公钥密码系统存在的安全问题的基础上,将背包公钥密码的思想与RSA算法相结合,形成了一种新的加密算法,它不仅消除了RSA的安全性完全依赖于大数因式分解难度的特性,并且在加密信息的同时,实现了用户身份的验证,有效地防止了中间人攻击。最后,对该算法在智能卡上的应用做了简要介绍。 展开更多
关键词 RSA加密算法 M—H背包公钥密码 身份验证 中间人攻击 智能卡
下载PDF
基于背包问题的可纠错数字签名方案 被引量:1
8
作者 邓宇乔 杜明辉 +1 位作者 梁亚玲 廖冰 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第6期46-49,共4页
因特网的高速发展导致普通的数字签名在网络传输过程中会出现传输错误,而传统的数字签名方案没有考虑纠错问题,因此无法对传输中可能出现的错误进行恢复.为了解决一般数字签名中的纠错问题,同时保证签名的效率,文中基于超递增向量背包... 因特网的高速发展导致普通的数字签名在网络传输过程中会出现传输错误,而传统的数字签名方案没有考虑纠错问题,因此无法对传输中可能出现的错误进行恢复.为了解决一般数字签名中的纠错问题,同时保证签名的效率,文中基于超递增向量背包问题的可解性,参考已提出的可纠错数字签名方案,利用矩阵的思想,提出了一种可纠错数字签名方案.该方案能纠正在网络传输中出错的消息,与现有几个纠错数字签名方案相比,其所需的附加数据和计算量都是最少的.文中还在随机预言机的模型下证明了该方案的安全性. 展开更多
关键词 数字签名 背包问题 超递增向量 纠错 RSA公钥加密算法
下载PDF
一种基于多背包的密码算法 被引量:1
9
作者 汤鹏志 左黎明 李黎青 《微计算机信息》 北大核心 2006年第08X期52-54,共3页
本文介绍了背包问题和L3-格基约简算法并加以深刻的分析,在此基础上提出了一种基于多背包的加密算法,该算法大大加强了背包加密算法的安全性,可以有效的对抗L3-格基约简算法。
关键词 子集和问题 背包公钥加密系统 背包问题 超递增背包序列
下载PDF
非超递增序列背包加密算法研究 被引量:1
10
作者 栗风永 徐江峰 《计算机工程与设计》 CSCD 北大核心 2011年第2期481-483,488,共4页
为了提高背包加密体制的安全性,对基于超递增序列的背包加密算法进行了分析,指出了利用非超递增序列构造背包所存在的难题,提出一种无冲突非超递增序列的构造方法,并给出严格的证明。依据该方法提出了一种基于无冲突非超递增序列的背包... 为了提高背包加密体制的安全性,对基于超递增序列的背包加密算法进行了分析,指出了利用非超递增序列构造背包所存在的难题,提出一种无冲突非超递增序列的构造方法,并给出严格的证明。依据该方法提出了一种基于无冲突非超递增序列的背包公钥加密算法,有效地避免了利用非超递增序列构造背包的过程中出现的难题。理论分析和仿真实验结果表明,该算法具有高的安全性能,在抵抗Shamir攻击和低密度攻击方面都具有良好的性能。 展开更多
关键词 公钥加密 非超递增序列 背包 冲突 低密度攻击
下载PDF
破译Merkle-Hellman背包加密方案的DNA计算模型
11
作者 李步军 孟大志 王继顺 《兰州交通大学学报》 CAS 2006年第4期76-79,共4页
背包公钥密码体制是第一个公钥体制,其攻击算法是NP完全问题.首先对背包问题和背包公钥体制进行了描述,然后给出了2种破译Merkle-Hellman背包加密方案DNA计算模型,即分步排除法和二分法,分步排除法是一种基本算法,二分法对分步排除法进... 背包公钥密码体制是第一个公钥体制,其攻击算法是NP完全问题.首先对背包问题和背包公钥体制进行了描述,然后给出了2种破译Merkle-Hellman背包加密方案DNA计算模型,即分步排除法和二分法,分步排除法是一种基本算法,二分法对分步排除法进行了改进,提高了破译背包密码的效率. 展开更多
关键词 DNA计算 背包问题 公钥密码体制 Merkle-Hellman背包加密方案
下载PDF
背包公钥密码安全新方案
12
作者 费向东 潘芳 潘郁 《计算机应用研究》 CSCD 北大核心 2018年第1期240-244,共5页
将M-H公钥密码改进为一个安全方案并不困难,但存在背包维数过大、密钥过长的问题,从而使密码失去实用性。为此提出一种低维数背包密码抵御明文恢复攻击的方法。通过向真实明文填充随机数,使得参与加密的明文长于密文,一个密文对应许多明... 将M-H公钥密码改进为一个安全方案并不困难,但存在背包维数过大、密钥过长的问题,从而使密码失去实用性。为此提出一种低维数背包密码抵御明文恢复攻击的方法。通过向真实明文填充随机数,使得参与加密的明文长于密文,一个密文对应许多明文,只有密文的指定接收者因掌握着陷门信息,可从密文恢复出真实明文。以此构造了一个背包密码安全新方案。新方案能抵御目前已知的各类攻击,所有运算的复杂度不超过二次方,信息率不是很高,但在可接受范围内;由于背包维数可以很小,密钥长度相应较短,存储性能大为改善。 展开更多
关键词 背包公钥密码 抗量子计算 安全性 密码性能 加密收缩量
下载PDF
一种基于背包问题的图像加密算法
13
作者 崔艳 张永红 《科学技术与工程》 2009年第23期7180-7182,共3页
提出了一种基于背包问题的数字图像公开密钥加密算法,利用该算法可以实现对图像的快速、安全加密。实验证明,该算法对图像加密效果良好。
关键词 超递增序列 背包问题 图像加密
下载PDF
基于“陷门收缩”原理的公钥算法
14
作者 刘双根 曹云忠 《四川工业学院学报》 2004年第4期49-50,56,共3页
 作者主要介绍一种基于"陷门收缩"原理的公钥算法,给出了私有密钥的构造方法,并对密码长度、保密强度进行了分析。
关键词 加密 解密 陷门收缩 算法
下载PDF
A leakage-resilient certificateless public key encryption scheme with CCA2 security 被引量:4
15
作者 Yan-wei ZHOU Bo YANG +1 位作者 Hao CHENG Qing-long WANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第4期481-493,共13页
In recent years,much attention has been focused on designing provably secure cryptographic primitives in the presence of key leakage.Many constructions of leakage-resilient cryptographic primitives have been proposed.... In recent years,much attention has been focused on designing provably secure cryptographic primitives in the presence of key leakage.Many constructions of leakage-resilient cryptographic primitives have been proposed.However,for any polynomial time adversary,most existing leakage-resilient cryptographic primitives cannot ensure that their outputs are random,and any polynomial time adversary can obtain a certain amount of leakage on the secret key from the corresponding output of a cryptographic primitive.In this study,to achieve better performance,a new construction of a chosen ciphertext attack 2(CCA2)secure,leakage-resilient,and certificateless public-key encryption scheme is proposed,whose security is proved based on the hardness of the classic decisional Diffie-Hellman assumption.According to our analysis,our method can tolerate leakage attacks on the private key.This method also achieves better performance because polynomial time adversaries cannot achieve leakage on the private key from the corresponding ciphertext,and a key leakage ratio of 1/2 can be achieved.Because of these good features,our method may be significant in practical applications. 展开更多
关键词 Certificatetess public-key encryption Leakage-resilience Provable security CCA2 security Decisional Diffie-Hellman
原文传递
Identity-based Encryption with Non-Interactive Opening 被引量:2
16
作者 范佳 唐小虎 +1 位作者 康立 路献辉 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期670-674,共5页
An identity-based encryption(IBE) was studied with non-interactively opening property that the plain text of a ciphertext can be revealed without affecting the security of the encryption system.Two kinds of non-intera... An identity-based encryption(IBE) was studied with non-interactively opening property that the plain text of a ciphertext can be revealed without affecting the security of the encryption system.Two kinds of non-interactive opening properties for IBE schemes were defined along with a concrete scheme in each case. 展开更多
关键词 identity-base encryption (IBE) public-key encryption with non-interactive opening (PKENO) identity-based encryption with non-interactive opening (IBENO)
原文传递
两种基于欧拉定理的背包概率加密体制
17
作者 王晓菲 徐赐文 +3 位作者 贾杰 郭远 李必涛 王金姣 《中央民族大学学报(自然科学版)》 2009年第1期82-85,共4页
本文根据欧拉定理对背包加密体制进行了改进,为了防止破译,采取了变形序列,将超递增序列转化为非超递增的伪随机序列,使得每次加密的密文都不同,加大了破译密文的难度.从而提高了背包加密体制的安全性.
关键词 非超递增序列 概率加密 背包加密体制 贪心算法 伪随机序列
下载PDF
JAVA环境下的多背包密码算法
18
作者 朱俊刚 汪厚祥 《舰船电子工程》 2007年第1期66-68,197,共4页
介绍背包问题与普通背包加密算法和L3-格基约简算法破解背包问题的方法并加以深入的分析,同时介绍了如Chor-Rivest背包加密与解密算法,在此基础上提出了一种基于多背包的加密算法,该算法大大加强了背包加密算法的安全性,可以有效地对抗... 介绍背包问题与普通背包加密算法和L3-格基约简算法破解背包问题的方法并加以深入的分析,同时介绍了如Chor-Rivest背包加密与解密算法,在此基础上提出了一种基于多背包的加密算法,该算法大大加强了背包加密算法的安全性,可以有效地对抗L3-格基约简算法,具有实际的商业甚至军事价值。 展开更多
关键词 子集和问题 背包公钥加密系统 背包问题 超递增背包序列
下载PDF
On the Selection of Random Numbers in the ElGamal Algorithm 被引量:4
19
作者 杨军 周贤伟 覃伯平 《Journal of Electronic Science and Technology of China》 2006年第1期55-58,共4页
The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are use... The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are used for the same algorithm. In the aspects of the sufficiency, necessity, security and computational overhead of parameter selection, this paper analyzes these criteria in a comparative manner and points out the insecurities in some textbook cryptographic schemes. Meanwhile, in order to enhance security a novel generalization of the EIGamal signature scheme is made by expanding the range of selecting random numbers at an acceptable cost of additional computation, and its feasibility is demonstrated. 展开更多
关键词 EIGamal algorithm digital signature public-key encryption randomnumber coprimeness
下载PDF
基于混沌序列的医院无纸化办公网络自适应加密算法
20
作者 李星 闫国涛 《吉林大学学报(信息科学版)》 CAS 2023年第5期938-944,共7页
由于受医院网络自身稳定性的影响,导致无纸化办公网络数据易遭受攻击,为此提出基于混沌序列的医院无纸化办公网络自适应加密算法。通过随机数自动生成密匙,利用三维混沌系统生成混沌序列,产生置乱、分组的密匙序列。基于服务期望设计节... 由于受医院网络自身稳定性的影响,导致无纸化办公网络数据易遭受攻击,为此提出基于混沌序列的医院无纸化办公网络自适应加密算法。通过随机数自动生成密匙,利用三维混沌系统生成混沌序列,产生置乱、分组的密匙序列。基于服务期望设计节点调度算法调度医院无纸化办公网络节点,确保密匙加密时能调度到合适的网络节点。通过云存储与改进背包算法实现医院无纸化办公网络的自适应加密处理。在某医院无纸化办公网络中选取文字、图像以及视频3种数据进行测试。测试结果表明,加密后密文呈现数字状态,不容易引发攻击者的注意;3种数据密文与明文之间的均方误差均较大,最大为258.63;加密后3种数据的数据相关性均大幅减弱,说明该算法能破坏数据原本的相关性,具有良好的网络数据加密能力。 展开更多
关键词 混沌序列 密匙序列 节点调度 医院无纸化办公 改进背包算法 网络自适应加密
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部