期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
云计算中数据信息加密安全存储仿真研究 被引量:7
1
作者 涂俊英 张学敏 《计算机仿真》 北大核心 2017年第12期431-434,共4页
对云计算中数据信息的加密安全存储,能够更好的解决数据信息的存储安全问题。对数据信息加密的安全存储,需要根据信息映射结果,获取信息存储的明文字节和密钥字节,完成云计算中数据信息加密安全存储。传统方法先利用非对称算法加密数据... 对云计算中数据信息的加密安全存储,能够更好的解决数据信息的存储安全问题。对数据信息加密的安全存储,需要根据信息映射结果,获取信息存储的明文字节和密钥字节,完成云计算中数据信息加密安全存储。传统方法先利用非对称算法加密数据明文,建立访问控制体系,但忽略了获取明文字节和密钥字节,导致信息加密存储效果不理想。提出基于改进密钥的云计算中数据信息加密安全存储方法。利用CP-ABE方法生成公钥和主密钥,定义为初始密钥,设定用户权限列表中每个用户访问的约束条件,引入帐篷映射和猫映射对存储的数据信息序列进行映射,获得其帐篷映射和猫映射的密钥,对映射结果进行整型数值化处理,获取信息存储的明文字节和密钥字节,以此为依据完成对云计算中数据信息加密安全存储。仿真证明所提方法加密性能高,能有效地保障云计算环境下信息存储的安全稳定性。 展开更多
关键词 云计算 数据信息 加密安全存储
下载PDF
基于双层国密加密的EDA安全存储应用建设方案
2
作者 吕辉 刘海亮 《中国集成电路》 2024年第10期37-39,91,共4页
本文以EDA仿真安全存储应用建设为目标,通过服务器加密与外置存储加密的双重国密加密方案,对EDA仿真应用提供多重保护,从而可以构建更加强壮、安全的应用系统。
关键词 国密加密安全存储 服务器加密 存储控制器加密
下载PDF
Identity-Based Encryption with Keyword Search from Lattice Assumption 被引量:6
3
作者 Xiaojun Zhang Chunxiang Xu +1 位作者 Liming Mu Jie Zhao 《China Communications》 SCIE CSCD 2018年第4期164-178,共15页
Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor... Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor corresponding to the keyword. The PEKS is useful to keep the management of large data storages secure such as those in a cloud. In this paper, to protect against quantum computer attacks, we present a lattice-based identity-based encryption scheme with key- word search. We have proved that our scheme can achieve ciphertext indistinguishability in the random oracle model, and our scheme can also achieve trapdoor security. In particular, our scheme can designate a unique tester to test and return the search results, therefore it does not need a secure channel. To the best of our knowledge, our scheme is the first iden- tity-based encryption scheme with keyword search from lattice assumption. 展开更多
关键词 public key encryption keywordsearch ciphertext indistinguishability latticeassumption.
下载PDF
Ad-Hoc Broadcast Encryption wit Dynamic Revocation
4
作者 王晓明 廖志委 《China Communications》 SCIE CSCD 2012年第5期129-140,共12页
In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based struct... In order to support the dynamics of the privileged users with low computation, communica- tion and storage overheads in receivers, a secure broadcast encryption scheme for ad hoc networks based on cluster-based structure is proposed, as Mu-Vmdharajan's scheme cannot securely remove subscribers with data redundancy. In the proposed scheme, we employ polynomial function and filter functions as the basic means of constructing broadcast encryption procedure in order to reduce computation and shortage overhead. Compared with existing schemes, our scheme requires low computation, corrmaunication and storage over- heads in receivers and can support the dynamics of the privileged users. Furthermore, our scheme can avoid n^assive message to exchange for estab-fishing the decryption key between members of the cluster. The analysis of security and perforrmnce shows that our scheme is more secure than Mu- Vmdharajan's scheme and has the same speed of encryption and decryption as theirs. So our scheme is particularly suitable for the devices with low power setting such as ad hoc networks. 展开更多
关键词 mobile ad hoc network broadcast en-cryption added and revoked members
下载PDF
ImgFS: a transparent cryptography for stored images using a filesystem in userspace 被引量:4
5
作者 Osama A. KHASHAN Abdullah M. ZIN Elankovan A. SUNDARARAJAN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第1期28-42,共15页
Real-time encryption and decryption of digital images stored on end-user devices is a challenging task due to the inherent features of the images. Traditional software encryption applications generally suffered from t... Real-time encryption and decryption of digital images stored on end-user devices is a challenging task due to the inherent features of the images. Traditional software encryption applications generally suffered from the expense of user con- venience, performance efficiency, and the level of security provided. To overcome these limitations, the concept of transparent encryption has been proposed. This type of encryption mechanism can be implemented most efficiently with kernel file systems. However, this approach has some disadvantages since developing a new file system and attaching it in the kernel level requires a deep understanding of the kernel internal data structure. A filesystem in userspace (FUSE) can be used to bridge the gap. Never- theless, ctwrent implementations of cryptographic FUSE-based file systems suffered from several weaknesses that make them less than ideal for deployment. This paper describes the design and implementation of ImgFS, a fully transparent cryptographic file system that resides on user space. ImgFS can provide a sophisticated way to access, manage, and monitor all encryption and key management operations for image files stored on the local disk without any interaction from the user. The development of ImgFS has managed to solve weaknesses that have been identified on cryptographic FUSE-based implementations. Experiments were carried out to measure the performance of ImgFS over image files' read and write against the cryptographic service, and the results indicated that while ImgFS has managed to provide higher level of security and transparency, its performance was competitive with other established cryptographic FUSE-based schemes of high performance. 展开更多
关键词 Storage image security Cryptographic file system Filesystem in userspace (FUSE) Transparent encryption
原文传递
Quasi-3-D Au mushrooms with programmable morphology for high-capacity flexible plasmonic encoding 被引量:1
6
作者 Dong Li Yinghui Sun +7 位作者 Yawen Wang Bo Zhao Wenkai Liang Yuanlan Liu Heng Gao Yaqi Ye Jiating Li Lin Jiang 《Science China Materials》 SCIE EI CAS CSCD 2022年第8期2227-2234,共8页
Plasmonic encoding composed of metallic nanostructures makes a great contribution to the practical application of information encryption.However,most reports have so far shown the preparation of single or binary plasm... Plasmonic encoding composed of metallic nanostructures makes a great contribution to the practical application of information encryption.However,most reports have so far shown the preparation of single or binary plasmonic encoding patterns because of the technical difficulty of assembling multiplex nanostructures on a single platform,which cannot satisfy the requirements of high encoding capacity for increasing information security.Herein,we developed a strategy based on plasma etching combined with in-situ growth to fabricate patterned arrays of quasi-three-dimensional(3-D)plasmonic Au nano-mushrooms with controlled morphologies,and successfully realized ideal high-capacity plasmonic encoding by arranging Au nano-mushrooms on one platform.On this basis,such multiplex encoding patterns have been transferred to the flexible substrate to realize the triple-mode encryption of the Morse code of"FUNSOM",indicating great prospects in the applications of information encryption and data storage. 展开更多
关键词 PLASMONIC ENCODING high capacity FLEXIBLE information protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部