The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher...The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent.展开更多
Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking meth...Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking methodology, applicable to the conventional schemes. In the proposed cryptographic scheme, the plaintext spans over a pre-specified finite-time interval, which is modulated through parameter modulation, and masked chaotically by a nonlinear mechanism. An efficient iterative learning algorithm is exploited for decryption, and the sufficient condition for convergence is derived, by which the learning gain can be chosen. Case studies are conducted to demonstrate the effectiveness of the proposed masking method.展开更多
针对衰减-时延混合模型的欠定盲分离,提出一种改进欠定语音盲分离算法。利用独立语音在时频域上的近似稀疏性,改进提出势函数面-聚类方法,通过此方法可直接获得源信号的个数和各声源方位信息,省去传统聚类方法中衰减-时延的配对步骤,新...针对衰减-时延混合模型的欠定盲分离,提出一种改进欠定语音盲分离算法。利用独立语音在时频域上的近似稀疏性,改进提出势函数面-聚类方法,通过此方法可直接获得源信号的个数和各声源方位信息,省去传统聚类方法中衰减-时延的配对步骤,新势函数法具有较好的适应性。分离阶段,利用势函数面聚类方法估计声源信号方位信息重构声源相对传递函数,采用非线性时频掩蔽方法分离感兴趣目标语音信号,实现了不同方位信息声源信号的欠定分离。仿真实验表明了此分离方法的可行性和有效性,弱混响条件下的分离信号输出信噪比平均达到了16 d B。展开更多
基金the Hunan Provincial Natrual Science Foundation of China(2022JJ30103)“the 14th Five-Year”Key Disciplines and Application Oriented Special Disciplines of Hunan Province(Xiangjiaotong[2022]351)the Science and Technology Innovation Program of Hunan Province(2016TP1020).
文摘The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent.
基金supported by National Natural Science Foundation of China(No.61174034)
文摘Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking methodology, applicable to the conventional schemes. In the proposed cryptographic scheme, the plaintext spans over a pre-specified finite-time interval, which is modulated through parameter modulation, and masked chaotically by a nonlinear mechanism. An efficient iterative learning algorithm is exploited for decryption, and the sufficient condition for convergence is derived, by which the learning gain can be chosen. Case studies are conducted to demonstrate the effectiveness of the proposed masking method.
文摘针对衰减-时延混合模型的欠定盲分离,提出一种改进欠定语音盲分离算法。利用独立语音在时频域上的近似稀疏性,改进提出势函数面-聚类方法,通过此方法可直接获得源信号的个数和各声源方位信息,省去传统聚类方法中衰减-时延的配对步骤,新势函数法具有较好的适应性。分离阶段,利用势函数面聚类方法估计声源信号方位信息重构声源相对传递函数,采用非线性时频掩蔽方法分离感兴趣目标语音信号,实现了不同方位信息声源信号的欠定分离。仿真实验表明了此分离方法的可行性和有效性,弱混响条件下的分离信号输出信噪比平均达到了16 d B。