Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes...Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes raise uncertainties in energy transactions.The broadcast consensus authentication slows transaction speeds,and frequent single-point transactions in multi-node settings pose key exposure risks without protective measures during user signing.To address these,an alliance blockchain scheme is proposed,reducing the resource-intensive identity verification among nodes.It integrates multi-signature functionality to fortify user resources and transac-tion security.A novel multi-signature process within this framework involves neutral nodes established through central nodes.These neutral nodes participate in multi-signature’s signing and verification,ensuring user identity and transaction content privacy.Reducing interactions among user nodes enhances transaction efficiency by minimizing communication overhead during verification and consensus stages.Rigorous assessments on reliability and operational speed highlight superior security performance,resilient against conventional attack vectors.Simulation shows that compared to traditional solutions,this scheme has advantages in terms of running speed.In conclusion,the alliance blockchain framework introduces a novel approach to tackle blockchain’s limitations in energy transactions.The integrated multi-signature process,involving neutral nodes,significantly enhances security and privacy.The scheme’s efficiency,validated through analytical assessments and simulations,indicates robustness against security threats and improved transactional speeds.This research underscores the potential for improved security and efficiency in blockchain-enabled energy trading systems.展开更多
To improve the security of the color image encryption scheme,a color image encryption scheme based on chaotic systems is proposed. Firstly, the proposed scheme sets the color image as a three-dimensional matrix which ...To improve the security of the color image encryption scheme,a color image encryption scheme based on chaotic systems is proposed. Firstly, the proposed scheme sets the color image as a three-dimensional matrix which is scrambled by affine transformation. Second, the Logistic chaotic sequence applied to generate the control parameter and auxiliary key is used to encrypt the three-dimensionaL matrix. Here, we mainly focus on two methods for encryption processes. One is to generate a chaotic sequence by Logistic map and Henon map, which is used to perform XOR operation with the scrambled components R', G', B' respectively. The other one is to adopt a binary Logistic sequence to select the pixel position for the scrambled components R', G', B' image, and then applying the Henon map and Logistic map with the auxiliary key to perform the replacement encryption. Based on this, an encrypted image is synthesized. Simulation results show that the proposed image encryption scheme can implement better encryption and achieve higher security performance.展开更多
Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of ope...Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of operations in symmetric-key and public-key cryptographic algorithms that are not common in previous general-purpose workloads: advanced bit operations within a word and multi-word operations. We define MOMR (Multiple Operands Multiple Results) execution or datarich execution as a unified solution to both challenges. It allows arbitrary n-bit permutations to be achieved in one or two cycles, rather than O(n) cycles as in existing RISC processors. It also enables significant acceleration of multiword multiplications needed by public-key ciphers. We propose two implementations of MOMR: one employs only hardware changes while the other uses Instruction Set Architecture (ISA) support. We show that MOMR execution leverages available resources in typical multi-issue processors with minimal additional cost. Multi-issue processors enhanced with MOMR units provide additional speedup over standard multi-issue processors with the same datapath. MOMR is a general architectural solution for word-oriented processor architectures to incorporate datarich operations.展开更多
文摘Blockchain,known for its secure encrypted ledger,has garnered attention in financial and data transfer realms,including the field of energy trading.However,the decentralized nature and identity anonymity of user nodes raise uncertainties in energy transactions.The broadcast consensus authentication slows transaction speeds,and frequent single-point transactions in multi-node settings pose key exposure risks without protective measures during user signing.To address these,an alliance blockchain scheme is proposed,reducing the resource-intensive identity verification among nodes.It integrates multi-signature functionality to fortify user resources and transac-tion security.A novel multi-signature process within this framework involves neutral nodes established through central nodes.These neutral nodes participate in multi-signature’s signing and verification,ensuring user identity and transaction content privacy.Reducing interactions among user nodes enhances transaction efficiency by minimizing communication overhead during verification and consensus stages.Rigorous assessments on reliability and operational speed highlight superior security performance,resilient against conventional attack vectors.Simulation shows that compared to traditional solutions,this scheme has advantages in terms of running speed.In conclusion,the alliance blockchain framework introduces a novel approach to tackle blockchain’s limitations in energy transactions.The integrated multi-signature process,involving neutral nodes,significantly enhances security and privacy.The scheme’s efficiency,validated through analytical assessments and simulations,indicates robustness against security threats and improved transactional speeds.This research underscores the potential for improved security and efficiency in blockchain-enabled energy trading systems.
基金supported by the National Natural Science Foundation of China(61301091)the Natural Science Basic Research Plan in Shaanxi Province of China(2015JQ6262)+1 种基金the Open Foundation of State Key Laboratory of Information Security(2015-MS-14)the New Star Team of Xi’an University of Posts and Telecommunications
文摘To improve the security of the color image encryption scheme,a color image encryption scheme based on chaotic systems is proposed. Firstly, the proposed scheme sets the color image as a three-dimensional matrix which is scrambled by affine transformation. Second, the Logistic chaotic sequence applied to generate the control parameter and auxiliary key is used to encrypt the three-dimensionaL matrix. Here, we mainly focus on two methods for encryption processes. One is to generate a chaotic sequence by Logistic map and Henon map, which is used to perform XOR operation with the scrambled components R', G', B' respectively. The other one is to adopt a binary Logistic sequence to select the pixel position for the scrambled components R', G', B' image, and then applying the Henon map and Logistic map with the auxiliary key to perform the replacement encryption. Based on this, an encrypted image is synthesized. Simulation results show that the proposed image encryption scheme can implement better encryption and achieve higher security performance.
文摘Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of operations in symmetric-key and public-key cryptographic algorithms that are not common in previous general-purpose workloads: advanced bit operations within a word and multi-word operations. We define MOMR (Multiple Operands Multiple Results) execution or datarich execution as a unified solution to both challenges. It allows arbitrary n-bit permutations to be achieved in one or two cycles, rather than O(n) cycles as in existing RISC processors. It also enables significant acceleration of multiword multiplications needed by public-key ciphers. We propose two implementations of MOMR: one employs only hardware changes while the other uses Instruction Set Architecture (ISA) support. We show that MOMR execution leverages available resources in typical multi-issue processors with minimal additional cost. Multi-issue processors enhanced with MOMR units provide additional speedup over standard multi-issue processors with the same datapath. MOMR is a general architectural solution for word-oriented processor architectures to incorporate datarich operations.