The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functio...The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.展开更多
针对格基环签名方案的陷门基尺寸过大以及环成员的公钥需要数字证书认证的问题,提出一种NTRU(Number Theory Research Unit)格上的身份基环签名方案(NTRU-IBRS)。首先,使用NTRU格上的陷门生成算法生成系统的主公私钥对;然后,将主私钥作...针对格基环签名方案的陷门基尺寸过大以及环成员的公钥需要数字证书认证的问题,提出一种NTRU(Number Theory Research Unit)格上的身份基环签名方案(NTRU-IBRS)。首先,使用NTRU格上的陷门生成算法生成系统的主公私钥对;然后,将主私钥作为陷门信息并对单向函数进行求逆运算以得到环成员的私钥;最后,基于小整数解(SIS)问题使用拒绝抽样技术生成环签名。安全性分析表明,NTRU-IBRS在随机预言机模型下具有匿名性以及适应性选择消息和身份攻击下的存在不可伪造性。性能分析与实验仿真表明,与理想格上的环签名方案和NTRU格上的身份基可链接环签名方案相比,在存储开销方面,NTRU-IBRS的系统私钥长度下降了0~99.6%,签名私钥长度的下降了50.0%~98.4%;在时间开销方面,NTRU-IBRS的总时间开销减少了15.3%~21.8%。将NTRU-IBRS应用于动态车联网(IoV)场景中,模拟结果表明NTRU-IBRS在车辆交互期间能够同时保证隐私安全和提高通信效率。展开更多
随着云计算技术的发展和隐私保护的需要,同态加密域中的可逆数据隐藏已成为一项研究热点。加密域可逆数据隐藏方案大多利用了图像中像素点之间的相关性及冗余,适用范围受到了一定的限制。为了提高数据隐藏方案的适用性和嵌入容量,针对NT...随着云计算技术的发展和隐私保护的需要,同态加密域中的可逆数据隐藏已成为一项研究热点。加密域可逆数据隐藏方案大多利用了图像中像素点之间的相关性及冗余,适用范围受到了一定的限制。为了提高数据隐藏方案的适用性和嵌入容量,针对NTRU(Number Theory Research Unit)加密系统,提出了一种基于多项式划分的可逆数据隐藏方案。该方案将NTRU加密系统中的多项式空间划分为用于表示原始载体的明文段和用于隐藏数据的数据隐藏段,可用于在多种加密的数字媒体中隐藏数据。接收者可以从密文中直接提取一部分隐藏的数据,并能从解密得到的明文中提取另一部分隐藏的数据,并无损地恢复原始明文。在实验部分,分别以灰度图像和文本为例,对所提算法的可行性进行验证。实验结果表明,对于一个以8比特表示的明文值,其密文中最多可以隐藏N-8比特的数据,其中N为NTRU加密系统中的参数;当N取503时,在一个密文中最多可以隐藏495比特的数据,并能无损地恢复出原始明文值。与现有的同类方案相比,该方案所提的NTRU域可逆数据隐藏算法具有较高的嵌入容量和较强的适用性。展开更多
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA)....With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency.展开更多
基金supported by National Key RD Program of China(Grant No.2022YFB3104402,the Research on Digital Identity Trust System for Massive Heterogeneous Terminals in Road Traffic System)the Fundamental Research Funds for the Central Universities(Grant Nos.3282023015,3282023035,3282023051)National First-Class Discipline Construction Project of Beijing Electronic Science and Technology Institute(No.3201012).
文摘The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.
文摘针对格基环签名方案的陷门基尺寸过大以及环成员的公钥需要数字证书认证的问题,提出一种NTRU(Number Theory Research Unit)格上的身份基环签名方案(NTRU-IBRS)。首先,使用NTRU格上的陷门生成算法生成系统的主公私钥对;然后,将主私钥作为陷门信息并对单向函数进行求逆运算以得到环成员的私钥;最后,基于小整数解(SIS)问题使用拒绝抽样技术生成环签名。安全性分析表明,NTRU-IBRS在随机预言机模型下具有匿名性以及适应性选择消息和身份攻击下的存在不可伪造性。性能分析与实验仿真表明,与理想格上的环签名方案和NTRU格上的身份基可链接环签名方案相比,在存储开销方面,NTRU-IBRS的系统私钥长度下降了0~99.6%,签名私钥长度的下降了50.0%~98.4%;在时间开销方面,NTRU-IBRS的总时间开销减少了15.3%~21.8%。将NTRU-IBRS应用于动态车联网(IoV)场景中,模拟结果表明NTRU-IBRS在车辆交互期间能够同时保证隐私安全和提高通信效率。
文摘随着云计算技术的发展和隐私保护的需要,同态加密域中的可逆数据隐藏已成为一项研究热点。加密域可逆数据隐藏方案大多利用了图像中像素点之间的相关性及冗余,适用范围受到了一定的限制。为了提高数据隐藏方案的适用性和嵌入容量,针对NTRU(Number Theory Research Unit)加密系统,提出了一种基于多项式划分的可逆数据隐藏方案。该方案将NTRU加密系统中的多项式空间划分为用于表示原始载体的明文段和用于隐藏数据的数据隐藏段,可用于在多种加密的数字媒体中隐藏数据。接收者可以从密文中直接提取一部分隐藏的数据,并能从解密得到的明文中提取另一部分隐藏的数据,并无损地恢复原始明文。在实验部分,分别以灰度图像和文本为例,对所提算法的可行性进行验证。实验结果表明,对于一个以8比特表示的明文值,其密文中最多可以隐藏N-8比特的数据,其中N为NTRU加密系统中的参数;当N取503时,在一个密文中最多可以隐藏495比特的数据,并能无损地恢复出原始明文值。与现有的同类方案相比,该方案所提的NTRU域可逆数据隐藏算法具有较高的嵌入容量和较强的适用性。
文摘With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA).A modified version of the traditional N-Th Degree Truncated Polynomial Ring(NTRU)cryptosystem called NTRU Prime has been developed to reduce the attack surface.In this paper,the Signcryption scheme was proposed,and it is most efficient than others since it reduces the complexity and runs the time of the code execution,and at the same time,provides a better security degree since it ensures the integrity of the sent message,confidentiality of the data,forward secrecy when using refreshed parameters for each session.Unforgeability to prevent the man-in-the-middle attack from being active or passive,and non-repudiation when the sender can’t deny the recently sent message.This study aims to create a novel NTRU cryptography algorithm system that takes advantage of the security features of curve fitting operations and the valuable characteristics of chaotic systems.The proposed algorithm combines the(NTRU Prime)and Shamir’s Secret Sharing(SSS)features to improve the security of the NTRU encryption and key generation stages that rely on robust polynomial generation.Based on experimental results and a comparison of the time required for crucial exchange between NTRU-SSS and the original NTRU,this study shows a rise in complexity with a decrease in execution time in the case when compared to the original NTRU.It’s encouraging to see signs that the suggested changes to the NTRU work to increase accuracy and efficiency.