期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A Power Efficient Aggregation of Encrypted Data in Wireless Sensor Network
1
作者 HUANG Xingyang YANG Ming 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1563-1568,共6页
In-network data aggregation in wireless sensor network has been shown to improve scalability, prolong sensor network lifetimes and diminish computational demands. However, the node that plays the role of data aggregat... In-network data aggregation in wireless sensor network has been shown to improve scalability, prolong sensor network lifetimes and diminish computational demands. However, the node that plays the role of data aggregation will consume much more energy than common nodes and may quit the mission in advance due to energy exhausting because of taxing decryption and re-encryption operation; moreover, it will bring complex key management to ensure the security of the data and corresponding keys. This paper was designed specifically to address above problem based on the thought of privacy homomorphism, It can achieve the perfect security level equal to one-time pad with much lower energy consumption; moreover, it can be proved to resist the attack of node capture. Using the simulation and analysis, we show that our scheme consume the energy only about 21% of AED scheme. 展开更多
关键词 data aggregation privacy homomorphism perfect security network clustering wireless sensor network
下载PDF
Escrow-Free Certificate-Based Authenticated Key Agreement Protocol from Pairings 被引量:1
2
作者 WANG Shengbao CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期63-66,共4页
Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (C... Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart's protocol. 展开更多
关键词 authenticated key agreement (AK) certificatebased encryption (CBE) PAIRINGS session key escrow perfect forward security
下载PDF
Improvement of McCullagh-Barreto key agreement with KCI-security 被引量:1
3
作者 WANG Xiao-fen DONG Qing-kuan +1 位作者 ZHOU Yu XIAO Guo-zhen 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第2期68-71,79,共5页
McCullagh-Barreto key agreement protocol and its variant achieve perfect forward security and key generation center (KGC) forward security, but provide no resistance to key compromise impersonation attack (KCI att... McCullagh-Barreto key agreement protocol and its variant achieve perfect forward security and key generation center (KGC) forward security, but provide no resistance to key compromise impersonation attack (KCI attack). In this paper, we give a formal treatment of key compromise impersonation (KCI) attack and define the security notion against it. Then an variant of McCullagh-Barreto protocol is presented with only one more Hash operation. The improved protocol preserves perfect forward security and KGC forward security, and furthermore is proved to be secure against KCI attack under k-Gap-BCAA1 assumption. 展开更多
关键词 authenticated key agreement key compromise impersonation attack perfect forward security KGC forward security KCI-secure
原文传递
从完美保密到完美安全:基于密码学的内生安全分析
4
作者 金梁 胡晓言 邬江兴 《Security and Safety》 2023年第3期4-19,共16页
In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of i... In this paper,we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge.To prove the conjecture,we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain.Then,we inherit and apply the established ideas and means of Perfect Secrecy,and propose the concept,definition and corollaries of the perfect instinct function security(PIFS)corresponding to Perfect Secrecy.Furthermore,we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem.Finally,we prove that the DHR satisfying the“OneTime Reconstruction”constraint is the sufficient and necessary condition to achieve perfect security.This means that the existence of PIFS is also proven.The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the oneway transparent superiority of the attacker into a double-blind problem for both the attacker and the defender,which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks.Since the attackers are required to have the new powerful ability to crack the structure cryptogram,the threshold of cyber security is raised to at least the same level as cryptogram deciphering,thereafter the ubiquitous cyber threats are destined to be significantly reduced. 展开更多
关键词 perfect instinct function security perfect secrecy DHR endogenous security One-Time Reconstruction generalized safety and security perfect security
原文传递
Research on measurement-device-independent quantum key distribution based on an air-water channel
5
作者 周媛媛 周学军 +1 位作者 徐华彬 程康 《Optoelectronics Letters》 EI 2016年第6期469-472,共4页
A measurement-device-independent quantum key distribution(MDI-QKD) method with an air-water channel is researched. In this method, the underwater vehicle and satellite are the legitimate parties, and the third party i... A measurement-device-independent quantum key distribution(MDI-QKD) method with an air-water channel is researched. In this method, the underwater vehicle and satellite are the legitimate parties, and the third party is at the airwater interface in order to simplify the unilateral quantum channel to water or air. Considering the condition that both unilateral transmission distance and transmission loss coefficient are unequal, a perfect model of the asymmetric channel is built. The influence of asymmetric channel on system loss tolerance and secure transmission distance is analyzed. The simulation results show that with the increase of the channel's asymmetric degree, the system loss tolerance will descend, one transmission distance will be reduced while the other will be increased. When the asymmetric coefficient of channel is between 0.068 and 0.171, MDI-QKD can satisfy the demand of QKD with an air-water channel, namely the underwater transmission distance and atmospheric transmission distance are not less than 60 m and 12 km, respectively. 展开更多
关键词 underwater asymmetric unilateral party parties simplify satisfy perfect secure troposphere
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部