期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
CRYPTANALYSIS OF AN EXTENDED MQ SIGNATURE SYSTEM HTTM
1
作者 Jing Zhengjun Yu Zhimin +2 位作者 Gu Chunsheng Wu Fangsheng Zhao Xiaorong 《Journal of Electronics(China)》 2013年第5期491-499,共9页
Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.pro... Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.proposed a novel multivariate signature scheme with Hash-based Tame Transformation and Minus(HTTM)in 2011.For this extended MQ-based signature,we can transform it into an SFLASH variant by splitting and merging HT transformation,and solve an equivalent private key corresponding to the public key of HTTM.Thus,the adversary can forge legitimate signature for any message by using this equivalent private key. 展开更多
关键词 Multivariate Quadratic(MQ) problem CRYPTANALYSIS Equivalent private key Forging signature Hash-based Tame Transformation and Minus(HTTM
下载PDF
Trusted Cluster-Based Communication for Wireless Sensor Network Using Meta-Heuristic Algorithms
2
作者 Pankaj Kumar Sharma Uma Shankar Modani 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1935-1951,共17页
The mobile transient and sensor network’s routing algorithm detects available multi-hop paths between source and destination nodes.However,some methods are not as reliable or trustworthy as expected.Therefore,finding... The mobile transient and sensor network’s routing algorithm detects available multi-hop paths between source and destination nodes.However,some methods are not as reliable or trustworthy as expected.Therefore,finding a reliable method is an important factor in improving communication security.For further enhancement of protected communication,we suggest a trust cluster based secure routing(TCSR)framework for wireless sensor network(WSN)using optimization algorithms.First,we introduce an efficient cluster formation using a modified tug of war optimization(MTWO)algorithm,which provides loadbalanced clusters for energy-efficient data transmission.Second,we illustrate the optimal head selection using multiple design constraints received signal strength,congestion rate,data loss rate,and throughput of the node.Those parameters are optimized by a butterfly optimal deep neural network(BO-DNN),which provides first-level security towards the selection of the best head node.Third,we utilize the lightweight signcryption to encrypt the data between two nodes during data transmission,which provides second-level security.The model provides an estimation of the trust level of each route to help a source node to select the most secure one.The nodes of the network improve reliability and security by maintaining the reliability component.Simulation results showed that the proposed scheme achieved 45.6%of delivery ratio. 展开更多
关键词 Trust model WSN secure routing cluster formation load-balanced clusters
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部