期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An Energy Trading Method Based on Alliance Blockchain and Multi-Signature
1
作者 Hongliang Tian Jiaming Wang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1611-1629,共19页
Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes... Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes raise uncertainties in energy transactions.The broadcast consensus authentication slows transaction speeds,and frequent single-point transactions in multi-node settings pose key exposure risks without protective measures during user signing.To address these,an alliance blockchain scheme is proposed,reducing the resource-intensive identity verification among nodes.It integrates multi-signature functionality to fortify user resources and transac-tion security.A novel multi-signature process within this framework involves neutral nodes established through central nodes.These neutral nodes participate in multi-signature’s signing and verification,ensuring user identity and transaction content privacy.Reducing interactions among user nodes enhances transaction efficiency by minimizing communication overhead during verification and consensus stages.Rigorous assessments on reliability and operational speed highlight superior security performance,resilient against conventional attack vectors.Simulation shows that compared to traditional solutions,this scheme has advantages in terms of running speed.In conclusion,the alliance blockchain framework introduces a novel approach to tackle blockchain’s limitations in energy transactions.The integrated multi-signature process,involving neutral nodes,significantly enhances security and privacy.The scheme’s efficiency,validated through analytical assessments and simulations,indicates robustness against security threats and improved transactional speeds.This research underscores the potential for improved security and efficiency in blockchain-enabled energy trading systems. 展开更多
关键词 Alliance blockchain MULTI-SIGNATURE energy trading security performance transaction efficiency
下载PDF
Color image encryption scheme based on chaotic systems
2
作者 Min Xiangshen Fan Jiulun +1 位作者 Zhang Xuefeng Ren Fang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第2期39-48,共10页
To improve the security of the color image encryption scheme,a color image encryption scheme based on chaotic systems is proposed. Firstly, the proposed scheme sets the color image as a three-dimensional matrix which ... To improve the security of the color image encryption scheme,a color image encryption scheme based on chaotic systems is proposed. Firstly, the proposed scheme sets the color image as a three-dimensional matrix which is scrambled by affine transformation. Second, the Logistic chaotic sequence applied to generate the control parameter and auxiliary key is used to encrypt the three-dimensionaL matrix. Here, we mainly focus on two methods for encryption processes. One is to generate a chaotic sequence by Logistic map and Henon map, which is used to perform XOR operation with the scrambled components R', G', B' respectively. The other one is to adopt a binary Logistic sequence to select the pixel position for the scrambled components R', G', B' image, and then applying the Henon map and Logistic map with the auxiliary key to perform the replacement encryption. Based on this, an encrypted image is synthesized. Simulation results show that the proposed image encryption scheme can implement better encryption and achieve higher security performance. 展开更多
关键词 color image cncryption chaotic systems affine transformation Logistic map Henon map security performance
原文传递
Single-Cycle Bit Permutations with MOMR Execution
3
作者 李佩露 杨骁 史志杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第5期577-585,共9页
Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of ope... Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of operations in symmetric-key and public-key cryptographic algorithms that are not common in previous general-purpose workloads: advanced bit operations within a word and multi-word operations. We define MOMR (Multiple Operands Multiple Results) execution or datarich execution as a unified solution to both challenges. It allows arbitrary n-bit permutations to be achieved in one or two cycles, rather than O(n) cycles as in existing RISC processors. It also enables significant acceleration of multiword multiplications needed by public-key ciphers. We propose two implementations of MOMR: one employs only hardware changes while the other uses Instruction Set Architecture (ISA) support. We show that MOMR execution leverages available resources in typical multi-issue processors with minimal additional cost. Multi-issue processors enhanced with MOMR units provide additional speedup over standard multi-issue processors with the same datapath. MOMR is a general architectural solution for word-oriented processor architectures to incorporate datarich operations. 展开更多
关键词 PERMUTATION bit permutations CRYPTOGRAPHY cryptographic acceleration security multi-word operation datarich execution MOMR instruction set architecture ISA PROCESSOR high performance secure computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部