期刊文献+
共找到42篇文章
< 1 2 3 >
每页显示 20 50 100
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
1
作者 Ang Liu Qing Zhang +3 位作者 Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu 《Computers, Materials & Continua》 SCIE EI 2024年第7期1727-1751,共25页
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functio... The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security. 展开更多
关键词 IOT quantum blockchain public-key quantum signature quantum hash function
下载PDF
METHOD FOR CONSTRUCTING TAG-KEM SCHEMES WITH SHORT-MESSAGE PUBLIC-KEY ENCRYPTIONS 被引量:1
2
作者 陈原 陈丹 董庆宽 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期301-305,共5页
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ... Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one. 展开更多
关键词 information security public-key encryption chosen ciphertext security Tag-KEM scheme
下载PDF
A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE 被引量:2
3
作者 Jiang Zhengtao Hao Yanhua Wang Yumin 《Journal of Electronics(China)》 2005年第5期490-497,共8页
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is ... Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed. 展开更多
关键词 Probabilistic public-key encryption scheme LUCas sequence(LUC) Discrete logarithm Integer factorization
下载PDF
A JOINT SIGNATURE ENCRYPTION AND ERROR CORRECTION PUBLIC-KEY CRYPTOSYSTEM BASED ON ALGEBRAIC CODING THEORY
4
作者 李元兴 成坚 王新梅 《Journal of Electronics(China)》 1992年第1期33-39,共7页
A joint signature,encryption and error correction public-key cryptosystem is pre-sented based on an NP-completeness problem-the decoding problem of general linear codes inalgebraic coding theory,
关键词 CRYPTOLOGY public-key CRYPTOSYSTEM Error-correcting CODES
下载PDF
ATTACKS ON REAL POLYNOMIAL TYPE PUBLIC-KEY CRYPTOSYSTEMS AND DISCUSSION ON RELATED PROBLEMS
5
作者 李大兴 陆浪如 李大为 《Journal of Electronics(China)》 1994年第4期289-295,共7页
The real polynomial type public-key cryptosystems are broken up by computing the equivalent secure keys, then some computational problems related to securities of cryptosystems are discussed.
关键词 CRYPTANALYSIS public-key CRYPTOSYSTEM COMPUTATION
下载PDF
New Practical Algebraic Public-Key Cryptosystem and Some Related Algebraic and Computational Aspects
6
作者 S. K. Rososhek 《Applied Mathematics》 2013年第7期1043-1049,共7页
The most popular present-day public-key cryptosystems are RSA and ElGamal cryptosystems. Some practical algebraic generalization of the ElGamal cryptosystem is considered-basic modular matrix cryptosystem (BMMC) over ... The most popular present-day public-key cryptosystems are RSA and ElGamal cryptosystems. Some practical algebraic generalization of the ElGamal cryptosystem is considered-basic modular matrix cryptosystem (BMMC) over the modular matrix ring M2(Zn). An example of computation for an artificially small number n is presented. Some possible attacks on the cryptosystem and mathematical problems, the solution of which are necessary for implementing these attacks, are studied. For a small number n, computational time for compromising some present-day public-key cryptosystems such as RSA, ElGamal, and Rabin, is compared with the corresponding time for the ВММС. Finally, some open mathematical and computational problems are formulated. 展开更多
关键词 public-key CRYPTOSYSTEM MODULAR MATRIX RING
下载PDF
Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
7
作者 Hyun Sook Rhee 《Computers, Materials & Continua》 SCIE EI 2022年第10期69-85,共17页
As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage... As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage,the data to be stored needs to be encrypted for this reason.Since“searchable encryption”is enable to search on the encrypted data without any decryption,it is one of convenient solutions for secure data management.A public key encryption with keyword search(for short,PEKS)is one of searchable encryptions.Abdalla et al.firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the“robust”ANO-CCA secure identity-based encryption(IBE).In this paper,we propose two generic constructions of consistent IND-CCA secure PEKS combining(1)a hierarchical identity based encryption(for short,HIBE)and a signature scheme or(2)a HIBE,an encapsulation,and a message authentication code(for short,MAC)scheme.Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker“ANO-CPA security(resp.,IND-CPA security)”of HIBE than“ANOCCA security(resp.,IND-CCA security)”of IBE required in for achieving IND-CCA secure(resp.,consistent)PEKS.Finally,we prove that our generic constructions satisfy IND-CCA security and consistency under the security models. 展开更多
关键词 Searchable encryption public-key encryption with keyword search chosen ciphertext security data privacy
下载PDF
Distribution of Random Session Key Based on Key-Insulated Public-Key Cryptosystems
8
作者 LUHai-jun SUYun-xue ZHUYue-fei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期251-254,共4页
Based on the characteristic of key-insulated public-key cryptosystem, wepropose a distributed landora session keys distribution protocol without a key distribution center.The session key is generated by different user... Based on the characteristic of key-insulated public-key cryptosystem, wepropose a distributed landora session keys distribution protocol without a key distribution center.The session key is generated by different user and only used one time. So thekey is one-time key. Inaddition, the user who generates the next one-time key, is random selected by the current sessionkey. In the protocol of this paper, the characteristic of time in the key-insulated public-key, adistributed protocol, translates into the characteristic of spaee which every point has differentsecret key in the different period. At the same time, the system is fit for key management in AdHoe, and is a new scheme of key management in Ad Hoc. 展开更多
关键词 key-insulated public-key cryptosystem onetime key distributed cryptographyprotoeol distributed characteristic of space and time key management of Ad Hoc
下载PDF
密码体制中的正形置换的构造与记数 被引量:9
9
作者 亢保元 《电子与信息学报》 EI CSCD 北大核心 2002年第9期1294-1296,共3页
正形置换在密码体制中有重要应用,该文在前人工作的基础上,利用有限群的理论对正形置换的构造和记数问题进行了讨论,特别在正形置换的记数方面得到了有价值的结果。
关键词 密码 正形置换 构造 记数 有限群 保密通信
下载PDF
REESSE 2公开密钥密码体制 被引量:2
10
作者 苏盛辉 杨炳儒 《计算机科学》 CSCD 北大核心 2004年第9期148-151,共4页
作者综合利用超递增序列、杠杆函数和HASH函数的特性提出了能有效地抵御"极小点"攻击和"LOB-L3归约基"攻击的REESSE2公开密钥密码体制,详细描述了该体制的数学基础、密钥生成算法、加密算法和解密算法。文章对REES... 作者综合利用超递增序列、杠杆函数和HASH函数的特性提出了能有效地抵御"极小点"攻击和"LOB-L3归约基"攻击的REESSE2公开密钥密码体制,详细描述了该体制的数学基础、密钥生成算法、加密算法和解密算法。文章对REESSE2体制的安全性和优越性做了分析,并归纳了提高公钥密码体制安全性的两条途径。 展开更多
关键词 公开密钥密码体制 生成算法 加密算法 HASH函数 解密算法 攻击 公钥密码体制 安全性 数学基础 序列
下载PDF
基于椭圆曲线密码体制的代理多重签名方案研究 被引量:1
11
作者 许占文 于雷 张富勇 《沈阳工业大学学报》 EI CAS 2007年第1期95-98,共4页
椭圆曲线密码体制以其特有的优越性被用于进行数据加密和构建数字签名方案,同样也可以用来构建代理多重签名方案.为了提高数字签名系统的安全性,在研究第二类代理多重签名方案的基础上进行研究和设计,设计了一种新的基于椭圆曲线密码体... 椭圆曲线密码体制以其特有的优越性被用于进行数据加密和构建数字签名方案,同样也可以用来构建代理多重签名方案.为了提高数字签名系统的安全性,在研究第二类代理多重签名方案的基础上进行研究和设计,设计了一种新的基于椭圆曲线密码体制的代理多重签名方案,并在理论上验证了其正确性.方案的安全性是建立在目前还没有有效攻击方法的有限域非超奇异椭圆曲线离散对数问题之上的,比基于有限域的代理多重签名方案有更高的安全性. 展开更多
关键词 椭圆曲线密码体制 离散对数问题 代理多重签名 有限域
下载PDF
一种新的背包公钥密码体制 被引量:1
12
作者 王衍波 《解放军理工大学学报(自然科学版)》 EI 2001年第2期29-33,共5页
首先提出了一种新的背包公钥密码体制、一种方案构造者不必知道秘密的秘密共享方案 ;然后讨论了这一体制的安全性 ,并进一步论述了这种公钥体制秘密密钥的形式 ,提出了算法层次上的公钥体制的思想。
关键词 公钥密码体制 背包公钥密码体制 秘密共享方案
下载PDF
一种不需要分配中心的门限签名方案
13
作者 张秋余 张俊敏 余冬梅 《计算机工程与应用》 CSCD 北大核心 2007年第16期130-134,共5页
提出了具有(k,l)门限验证的(t,n)门限签名方案,它用于团体间的签名与验证,不需要分配中心(SDC)。在该方案中,签名团体中的任意t个参与者能代表团体对消息签名,而验证团体中的任意k个参与者能代表团体验证该签名。这里不需要SDC为两个团... 提出了具有(k,l)门限验证的(t,n)门限签名方案,它用于团体间的签名与验证,不需要分配中心(SDC)。在该方案中,签名团体中的任意t个参与者能代表团体对消息签名,而验证团体中的任意k个参与者能代表团体验证该签名。这里不需要SDC为两个团体中的所有参与者分配公钥和私钥,因此实际应用中,在通信和计算复杂性方面所提出的方案比先前的方案更加的实用、有效。 展开更多
关键词 密码系统 数字签名 椭圆曲线 秘密共享 门限密码系统
下载PDF
A NEW RSA CRYPTOSYSTEM HARDWARE IMPLEMENTATION BASED ON MONTGOMERY'S ALGORITHM 被引量:5
14
作者 LU Jun-ming(卢君明) +1 位作者 LIN Zheng-hui(林争辉) 《Journal of Shanghai Jiaotong university(Science)》 EI 2002年第1期46-49,共4页
RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was pres... RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was presented. Basically, a fast modular multiplication architecture based on Montgomery’s algorithm was proposed. Modular exponentiation algorithm scans encryption from right to left, so two modular multiplications can be processed parallel. The new architecture is also fit for an effective I/O interface. The time to calculate a modular exponentiation is about n 2 clock cycles. The proposed architecture has a data rate of 93.7 kb/s for 1 024 bit work with a 100 MHz clock. 展开更多
关键词 MONTGOMERY ALGORITHM MODULAR MULTIPLICATION RSA public-key crytosystem
下载PDF
基于MPLS网络的加密技术
15
作者 孙海峰 谷大武 顾健 《计算机工程》 CAS CSCD 北大核心 2004年第B12期320-322,共3页
MPLS(多协议标签交换)是一种可提供高性价比和多业务能力的交换技术,MPLS将成为未来网络演进中的核心技术之一。该文 首先从MPLS的基本概念着手,分析MPLS网络的特点和原理;接着分析了适合于MPLS网络的加密技术及密钥管理;最后讨论TMPLS... MPLS(多协议标签交换)是一种可提供高性价比和多业务能力的交换技术,MPLS将成为未来网络演进中的核心技术之一。该文 首先从MPLS的基本概念着手,分析MPLS网络的特点和原理;接着分析了适合于MPLS网络的加密技术及密钥管理;最后讨论TMPLS网络 密码设备的实现。 展开更多
关键词 多协议标签交换 标签分发协议 混合加密体制
下载PDF
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System 被引量:16
16
作者 Mamta Brij B.Gupta +3 位作者 Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1877-1890,共14页
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved... The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective search.Attribute-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud storage.However,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations.In a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE schemes.In the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain network.Thus,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical CCPS.With the assistance of blockchain technology,the proposed scheme offers two main benefits.First,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of failure.Second,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain network.Specifically,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus nodes.This eliminates the need of the trusted authority and reduces the burden of data users,respectively.Further,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret key associated with users.It has been verified both theoretically and practically in the performance analysis section. 展开更多
关键词 Cloud-based cyber-physical systems(CCPS) data encryption healthcare information search and retrieval keyword search public-key cryptosystems searchable encryption
下载PDF
Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls 被引量:1
17
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2011年第7期475-481,共7页
In this paper an encryption-decryption algorithm based on two moduli is described: one in the real field of integers and another in the field of complex integers. Also the proper selection of cryptographic system para... In this paper an encryption-decryption algorithm based on two moduli is described: one in the real field of integers and another in the field of complex integers. Also the proper selection of cryptographic system parameters is described. Several numeric illustrations explain step-by-step how to precondition a plaintext, how to select secret control parameters, how to ensure feasibility of all private keys and how to avoid ambiguity in the process of information recovery. The proposed cryptographic system is faster than most of known public key cryptosystems, since it requires a small number of multiplications and additions, and does not require exponentiations for its implementation. 展开更多
关键词 ambiguity-free INFORMATION recovery complex modulus CRYPTOSYSTEM design cycling identity INFORMATION hiding PLAINTEXT preconditioning PRIMARY residue public-key cryptography secret controls threshold parameters
下载PDF
On the Selection of Random Numbers in the ElGamal Algorithm 被引量:4
18
作者 杨军 周贤伟 覃伯平 《Journal of Electronic Science and Technology of China》 2006年第1期55-58,共4页
The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are use... The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are used for the same algorithm. In the aspects of the sufficiency, necessity, security and computational overhead of parameter selection, this paper analyzes these criteria in a comparative manner and points out the insecurities in some textbook cryptographic schemes. Meanwhile, in order to enhance security a novel generalization of the EIGamal signature scheme is made by expanding the range of selecting random numbers at an acceptable cost of additional computation, and its feasibility is demonstrated. 展开更多
关键词 EIGamal algorithm digital signature public-key encryption randomnumber coprimeness
下载PDF
A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS 被引量:1
19
作者 Jiao Luyao Li Yifa Qiao Shuaiting 《Journal of Electronics(China)》 2013年第2期198-203,共6页
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our ne... This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our new scheme, named the Multi-layer MI (MMI) scheme, has a structure of multi-layer central map. Firstly, this article introduces the MI scheme and describes linearization attack and differential attack; then prescribes the designation of MMI in detail, and proves that MMI can resist both linearization attack and differential attack. Besides, this article also proves that MMI can resist recent eXtended Linearization (XL)-like methods. In the end, this article concludes that MMI also maintains the efficiency of MI. 展开更多
关键词 Multivariate Quadratic (MQ) public-key Cryptosystem (PKC) Matsumoto-Imai (MI) Central map Linearization attack Differential attack eXtended Linearization (XL)
下载PDF
A New Sequential Digital Multi-Signature Scheme
20
作者 Jia Xiaoyun Luo Shoushan +1 位作者 Chen Ping Yuan Chaowei 《China Communications》 SCIE CSCD 2007年第4期66-71,共6页
The paper proposes a new sequential digital multi-signature scheme based on Knapsack public-key cryptosystem,which is different from the existing scheme.The advantages of this scheme over the existing schemes are that... The paper proposes a new sequential digital multi-signature scheme based on Knapsack public-key cryptosystem,which is different from the existing scheme.The advantages of this scheme over the existing schemes are that it simplifies the signature generation process and speeds up the signature verification process.What’s more,the scheme reduces the cost of communication and redundancy operation, and improves efficiency,and can avoid cheating by signer efficiently,so the scheme has very broad application prospects. 展开更多
关键词 KNAPSACK public-key CRYPTOSYSTEM digital SIGNATURE SEQUENTIAL MULTI-SIGNATURE
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部