期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
标准模型下可证安全的多身份单密钥解密方案 被引量:1
1
作者 明洋 王育民 庞辽军 《计算机科学》 CSCD 北大核心 2010年第3期73-75,85,共4页
多身份单密钥解密方案是基于身份加密方案的一个变体,用户的一个解密密钥可以对应于多个公钥(身份),即单一的密钥可以解密多个不同公钥加密下的密文。在双线性对,提出标准模型下可证安全的多身份单密钥解密方案。在判定性q-TBDHE假设下... 多身份单密钥解密方案是基于身份加密方案的一个变体,用户的一个解密密钥可以对应于多个公钥(身份),即单一的密钥可以解密多个不同公钥加密下的密文。在双线性对,提出标准模型下可证安全的多身份单密钥解密方案。在判定性q-TBDHE假设下,证明了所提方案在适应性选择密文和身份攻击下是不可区分的。 展开更多
关键词 多身份单密钥解密 基于身份加密 标准模型 双线性对
下载PDF
对 KTANTAN32的单密钥中间相遇代数攻击
2
作者 陈万朴 张文英 李梦竹 《山东师范大学学报(自然科学版)》 CAS 2016年第1期48-52,共5页
KTANTAN 加密算法是在2009年 CHES 会议上提出的一种轻量级分组密码,KTANTAN 是一族加密算法,包括三种版本 KTANTAN32、KTANTAN48和 KTANTAN64.本文主要对其中的 KTANTAN32加密算法进行分析. KTANTAN32加密算法的轮函数具有较低的差... KTANTAN 加密算法是在2009年 CHES 会议上提出的一种轻量级分组密码,KTANTAN 是一族加密算法,包括三种版本 KTANTAN32、KTANTAN48和 KTANTAN64.本文主要对其中的 KTANTAN32加密算法进行分析. KTANTAN32加密算法的轮函数具有较低的差分扩散性,该算法采用线性密钥编排,这使得某些位密钥在后期的加密中才初次被使用,鉴于以上特性,中间相遇攻击方法适用于攻击 KTANTAN32算法.本文在254轮中间相遇攻击的基础上,使用代数方法对单密钥的算法进行中间匹配分析.中间相遇攻击的复杂度为275,在中间匹配阶段,本文使用代数分析不增加攻击复杂度,而且使用的是单密钥方法,不需要进行相关密钥分析,经过计算在中间匹配阶段共有11比特的状态进行匹配,即由向后加密和向前解密得到的两个第127轮的32比特状态值中有11比特是相等的. 展开更多
关键词 KTANTAN32 中间相遇攻击 代数分析 单密钥
下载PDF
8轮KASUMI算法单密钥攻击改进
3
作者 徐新龙 孔凡杰 韩文报 《信息工程大学学报》 2012年第5期531-539,共9页
文章对8轮KASUMI算法的中间相遇攻击结果进行了改进。主要通过改变给定密钥集和穷举密钥集,在多重循环的算法中,增加外层循环的计算量,使得减小了最内层循环的计算量。结果将0.25次FI函数的计算从最内层循环移到外层循环中,使得计算量... 文章对8轮KASUMI算法的中间相遇攻击结果进行了改进。主要通过改变给定密钥集和穷举密钥集,在多重循环的算法中,增加外层循环的计算量,使得减小了最内层循环的计算量。结果将0.25次FI函数的计算从最内层循环移到外层循环中,使得计算量降低了4.1%;同时存储量从249块降到了242块。 展开更多
关键词 KASUMI 单密钥攻击 中间相遇攻击
下载PDF
APPLE—II单密钥软加密系统简介
4
作者 黄远义 《苹果园》 1989年第4期39-40,共2页
关键词 单密钥 软件加密系统 微机
下载PDF
安全组播密钥更新的排队模型
5
作者 唐扬 刘辉 《计算机工程与设计》 CSCD 北大核心 2008年第11期2730-2732,2735,共4页
为安全组播的单密钥更新算法和批量更新算法建立排队论模型,用排队的观点说明了当单位时间内有多个成员需要加入或退出组播组时,单密钥更新算法的性能较低,会降低密钥管理协议的可扩展性。并说明了在这种情况下,批量密钥更新算法可以在... 为安全组播的单密钥更新算法和批量更新算法建立排队论模型,用排队的观点说明了当单位时间内有多个成员需要加入或退出组播组时,单密钥更新算法的性能较低,会降低密钥管理协议的可扩展性。并说明了在这种情况下,批量密钥更新算法可以在适当降低组播安全性的条件下,提高密钥管理协议的可扩展性。用仿真很好的证明了以上观点。 展开更多
关键词 安全组播 单密钥更新 批量密更新 管理算法 排队模型
下载PDF
WEB站点安全性研究 被引量:1
6
作者 吴迪 叶润国 陈震 《地球物理学进展》 CSCD 2002年第1期127-132,共6页
从单密钥加密、公用密钥加密、安全散列、数字签名等网络安全技术出发 ,讨论了网络通讯中的信息加密、信息完整性以及客户机服务器认证等技术知识 .并详细分析了SSL协议工作原理 .讨论了如何利用CA数字证书签发机构和SSL协议原理在Inter... 从单密钥加密、公用密钥加密、安全散列、数字签名等网络安全技术出发 ,讨论了网络通讯中的信息加密、信息完整性以及客户机服务器认证等技术知识 .并详细分析了SSL协议工作原理 .讨论了如何利用CA数字证书签发机构和SSL协议原理在Internet/Intranet中建立Web安全站点 .本文将以WindowsNT和UNIX环境为例 ,详细介绍安全Web站点的配置步骤 ,充分利用SSL的强大功能 ,以确保通信双方的信息安全性 . 展开更多
关键词 WEB站点 安全性研究 单密钥加密 公用密加密 数字证书 SSL CA 安全散列 数字签名 网络安全
下载PDF
Kerberos V5身份验证的过程 被引量:1
7
作者 薛海斌 王春梅 《杨凌职业技术学院学报》 2003年第2期64-65,共2页
安全始终是任何计算机系统都要考虑的主要问题之一 ,Kerberos身份验证是 Window 2 0 0 0提供的一种优秀的安全身份验证方法 ,本文就 Kerberos认证的过程、细节、以及其使用的局限性进行探讨。
关键词 KerberosV5 身份验证 计算机系统 安全性 TGS密 单密钥加密
下载PDF
一种安全广播的实用方法
8
作者 金茂顺 《密码与信息》 1998年第2期23-28,共6页
本文介绍一种基于Diffie-Hellman公开密钥分配概念的安全广播密码系统。首先回顾该系统用到的一些知识和技术精髓,再重点描述安全广播密码算法,并给出实例说明。最后,对系统的安全性和通信代价作了分析。
关键词 广播 安全性 单密钥 RSA
下载PDF
一种新型加密模式的提出 被引量:2
9
作者 吕丽萍 唐松生 于重玲 《信息网络安全》 2004年第6期27-28,31,共3页
文章介绍了一种基于同一层面的数据分块加密模式,并对该加密模式的性能进行了分析,在此基础上提出了一个具体的安全解决方案,并对该方案的安全性进行了讨论。
关键词 加密模式 同一层面 数据分块 安全性 对称密码 单密钥密码 加密格式
下载PDF
基于RC4算法的流密码原理与实现 被引量:2
10
作者 刘程远 《信息技术与网络安全》 2018年第9期31-33,41,共4页
在单密钥密码体制的通信中,加密与解密必须使用相同密钥,通信双方如何在不安全的网络环境下安全地交换、管理密钥以及应对密钥泄漏是保障密码安全的关键。流密码提供了一种安全的密钥交换方式,在拥有简单和速度优势的同时,通信双方无需... 在单密钥密码体制的通信中,加密与解密必须使用相同密钥,通信双方如何在不安全的网络环境下安全地交换、管理密钥以及应对密钥泄漏是保障密码安全的关键。流密码提供了一种安全的密钥交换方式,在拥有简单和速度优势的同时,通信双方无需在信道上交换密钥,从物理上避免了密钥进入公网环境。介绍了RC4流密码的原理、优点、在通信项目中的实际应用、保持密钥流同步的方法以及失去同步后恢复的方法。 展开更多
关键词 流密码 RC4 单密钥
下载PDF
A new group key management scheme based on keys tree, XOR operation and one-way function 被引量:1
11
作者 张勇 张翼 汪为农 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期54-58,共5页
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p... By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members. 展开更多
关键词 secure group communication group key management keys tree one-way function
下载PDF
Security Analysis and Improvement of Authentication Scheme Based on a One-way Hash Function and Diffie-Hellman Key Exchange Using Smart Card 被引量:1
12
作者 Kang-seok CHAE Dai-hoon KIM +1 位作者 Jae-duck CHOI Souh-wan JUNG 《Journal of Measurement Science and Instrumentation》 CAS 2010年第4期360-363,共4页
A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing a... A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing attack. In this paper, the author demonstrate that Yoon's scheme is vulnerable to the off-line password guessing attack by using a stolen smart card and the DoS attack by computational load at the re, note system. An improvement of Yoon's scheme to resist the above attacks is also proposed. 展开更多
关键词 AUTHENTICATION guessing attack DIFFIE-HELLMAN smart card
下载PDF
Performance of an Improved One-Way Error Reconciliation Protocol Based on Key Redistribution 被引量:2
13
作者 ZHAO Feng LI Jingling 《China Communications》 SCIE CSCD 2014年第6期63-70,共8页
In data post-processing for quantum key distribution, it is essential to have a highly efficient error reconciliation protocol. Based on the key redistribution scheme, we analyze a one-way error reconciliation protoco... In data post-processing for quantum key distribution, it is essential to have a highly efficient error reconciliation protocol. Based on the key redistribution scheme, we analyze a one-way error reconciliation protocol by data simulation. The relationship between the error correction capability and the key generation efficiency of three kinds of Hamming code are demonstrated. The simulation results indicate that when the initial error rates are (0,1.5%], (1.5,4%], and (4,11%], using the Hamming (31,26), (15,11), and (7,4) codes to correct the error, respectively, the key generation rate will be maximized. Based on this, we propose a modified one-way error reconciliation protocol which employs a mixed Hamming code concatenation scheme. The error correction capability and key generation rate are verified through data simulation. Using the parameters of the posterior distribution based on the tested data, a simple method for estimating the bit error rate (BER) with a given confidence interval is estimated. The simulation results show that when the initial bit error rate is 10.00%, after 7 rounds of error correction, the error bits are eliminated completely, and the key generation rate is 10.36%; the BER expectation is 2.96×10^-10, and when the confidence is 95% the corresponding BER upper limit is 2.17×10^-9. By comparison, for the single (7,4) Hamming code error reconciliation scheme at a confidence of 95%,the key generation rate is only 6.09%, while the BER expectation is 5.92x 10"9, with a BER upper limit of 4.34×10^-8. Hence, our improved protocol is much better than the original one. 展开更多
关键词 quantum key distribution error reconciliation data post-processing
下载PDF
Key Exchange Protocol Based on Tensor Decomposition Problem 被引量:1
14
作者 MAO Shaowu ZHANG Huanguo +3 位作者 WU Wanqing ZHANG Pei SONG Jun LIU Jinhui 《China Communications》 SCIE CSCD 2016年第3期174-183,共10页
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing.... The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols. 展开更多
关键词 key exchange resistant quantum hard problem tensor decomposition
下载PDF
椭圆曲线密码ML算法电路实现的功耗攻击
15
作者 韩煜 邹雪城 +1 位作者 刘政林 但永平 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第2期21-24,共4页
针对有限域GF(2163)上椭圆曲线密码(ECC)的ML算法电路,实现了一种简单有效的差分功耗分析(DPA)方法.该方法结合单密钥多数据攻击,按密钥比特对功耗轨迹分段差分运算.基于功耗仿真的实验结果表明:仅对单条功耗曲线进行差分分析就能够以... 针对有限域GF(2163)上椭圆曲线密码(ECC)的ML算法电路,实现了一种简单有效的差分功耗分析(DPA)方法.该方法结合单密钥多数据攻击,按密钥比特对功耗轨迹分段差分运算.基于功耗仿真的实验结果表明:仅对单条功耗曲线进行差分分析就能够以极短的时间恢复出密钥比特,从而证明ECC的ML算法实现只具备抗时间攻击和抗简单功耗分析攻击效果,却不能对抗DPA攻击. 展开更多
关键词 椭圆曲线密码 ML算法 功耗攻击 差分功耗分析 单密钥多数据
原文传递
Three-step semiquantum secure direct communication protocol 被引量:12
16
作者 ZOU XiangFu QIU DaoWen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第9期1696-1702,共7页
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only w... Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first.In the existing schemes,quantum secure direct communication is possible only when both parties are quantum.In this paper,we construct a three-step semiquantum secure direct communication(SQSDC)protocol based on single photon sources in which the sender Alice is classical.In a semiquantum protocol,a person is termed classical if he(she)can measure,prepare and send quantum states only with the fixed orthogonal quantum basis{|0,|1}.The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption.Therefore,the proposed SQSDC protocol is also completely robust.Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol.In the proposed protocol,we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed.Moreover,the proposed SQSDC protocol can be implemented with the existing techniques.Compared with many quantum secure direct communication protocols,the proposed SQSDC protocol has two merits:firstly the sender only needs classical capabilities;secondly to check Eves disturbing after the transmission of quantum states,no additional classical information is needed. 展开更多
关键词 quantum secure direct communication semiquantum complete robustness security
原文传递
Single-photon detection and its applications 被引量:8
17
作者 LIANG Yan ZENG HePing 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第7期1218-1232,共15页
A single-photon detector is an extremely sensitive device capable of registering photons,offering essential technical support for optics quantum information applications.We review herein our recent experimental progre... A single-photon detector is an extremely sensitive device capable of registering photons,offering essential technical support for optics quantum information applications.We review herein our recent experimental progress in the development and application of single-photon detection techniques.Techniques based on advanced self-differencing,low-pass filtering,frequency up-conversion and photon-number-resolving are introduced for attaining high-speed,high-efficiency,low-noise single-photon detection at infrared wavelengths.The advantages of high-speed single-photon detection are discussed in some applications,such as the laser ranging and quantum key distribution.The photon-number-resolving detection is shown to support efficient quantum random number generation. 展开更多
关键词 quantum optics PHOTODETECTION avalanche photodiode frequency up-conversion
原文传递
A measurement-device-independent quantum key distribution protocol with a heralded single photon source 被引量:8
18
作者 周媛媛 周学军 苏彬彬 《Optoelectronics Letters》 EI 2016年第2期148-151,共4页
With a heralded single photon source(HSPS), a measurement-device-independent quantum key distribution(MDIQKD) protocol is proposed, combined with a three-intensity decoy-state method. HSPS has the two-mode characteris... With a heralded single photon source(HSPS), a measurement-device-independent quantum key distribution(MDIQKD) protocol is proposed, combined with a three-intensity decoy-state method. HSPS has the two-mode characteristic, one mode is used as signal mode, and the other is used as heralded mode to reduce the influence of the dark count. The lower bound of the yield and the upper bound of the error rate are deduced and the performance of the MDI-QKD protocol with an HSPS is analyzed. The simulation results show that the MDI-QKD protocol with an HSPS can achieve a key generation rate and a secure transmission distance which are close to the theoretical limits of the protocol with a single photon source(SPS). Moreover, the key generation rate will improve with the raise of the senders' detection efficiency. The key generation rate of the MDI-QKD protocol with an HSPS is a little less than that of the MDI-QKD protocol with a weak coherent source(WCS) in the close range, but will exceed the latter in the far range. Furthermore, a farther transmission distance is obtained due to the two-mode characteristic of HSPS. 展开更多
关键词 photon coherent decoy secure exceed latter raise correction deduced limits
原文传递
Quantum proxy signature scheme with public verifiability 被引量:6
19
作者 ZHOU JingXian ZHOU YaJian +1 位作者 NIU XinXin YANG YiXian 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第10期1828-1832,共5页
In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be v... In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person.Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantumentanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key whenhe generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone canverify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be publicverified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme.Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal. 展开更多
关键词 quantum cryptography proxy signature quantum one-way function public verifiably
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部