期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE 被引量:2
1
作者 Jiang Zhengtao Hao Yanhua Wang Yumin 《Journal of Electronics(China)》 2005年第5期490-497,共8页
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is ... Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed. 展开更多
关键词 Probabilistic public-key encryption scheme LUCas sequence(LUC) Discrete logarithm Integer factorization
下载PDF
One AES S-box to increase complexity and its cryptanalysis 被引量:1
2
作者 Liu Jingmei Wei Baodian Wang Xinmei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期427-433,共7页
It is well known that the algebraic expression of AES S-box is very simple and only 9 terms are involved. Hence, AES security is suspected although there is no vulnerability on it so far. To eliminate the weakness of ... It is well known that the algebraic expression of AES S-box is very simple and only 9 terms are involved. Hence, AES security is suspected although there is no vulnerability on it so far. To eliminate the weakness of extremely small terms in the algebraic expression of AES S-box, one improved AES S-box is proposed, which preserves the algebraic degree invariable but significantly increases the number of its algebraic expression terms from 9 to 255. At the same times Boolean function has good characters in balance and strict avalanche criterion (SAC), etc. Finally, it is proved that the improved AES S-box scheme is secure against the powerful known differential and linear cryptanalysis. 展开更多
关键词 AES Sbox Strict avalanche criterion.
下载PDF
AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME 被引量:1
3
作者 Pang Liaojun Sun Xi Wang Yumin 《Journal of Electronics(China)》 2006年第5期731-735,共5页
Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selec... Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other partici- pants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each par- ticipant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir’s threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme. 展开更多
关键词 Secret sharing Threshold scheme Discrete logarithm
下载PDF
Publicly Verifiable Encryption Scheme for RSA
4
作者 JIA Xiao-yun LUO Shou-shan +1 位作者 CHEN Ping YUAN Chao-wei 《通讯和计算机(中英文版)》 2007年第1期23-26,34,共5页
关键词 计算机 安全保护 密码 RSA
下载PDF
A chaos-based image encryption algorithm using alternate structure 被引量:6
5
作者 ZHANG Yiwei WANG YuMin SHEN XuBang 《Science in China(Series F)》 2007年第3期334-341,共8页
Combined with two chaotic maps, a novel alternate structure is applied to image cryptosystem. In proposed algorithm, a general cat-map is used for permutation and diffusion, as well as the OCML (one-way coupled map l... Combined with two chaotic maps, a novel alternate structure is applied to image cryptosystem. In proposed algorithm, a general cat-map is used for permutation and diffusion, as well as the OCML (one-way coupled map lattice), which is applied for substitution. These two methods are operated alternately in every round of encryption process, where two subkeys employed in different chaotic maps are generated through the masterkey spreading. Decryption has the same structure with the encryption algorithm, but the masterkey in each round should be reversely ordered in decryption. The cryptanalysis shows that the proposed algorithm bears good immunities to many forms of attacks. Moreover, the algorithm features high execution speed and compact program, which is suitable for various software and hardware applications. 展开更多
关键词 chaotic encryption general cat-map OCML image encryption
原文传递
Error- and loss-tolerant bundle fragment authentication for space DTNs 被引量:2
6
作者 Xixiang LV Hui LI 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第6期1012-1023,共12页
To ensure the authenticity and integrity of bundles, the in-transit PDUs of bundle protocol (BP) in space delay/disruption-tolerant networks (DTNs), the bundle security protocol specification (IRTF RFC6257) sugg... To ensure the authenticity and integrity of bundles, the in-transit PDUs of bundle protocol (BP) in space delay/disruption-tolerant networks (DTNs), the bundle security protocol specification (IRTF RFC6257) suggested using a digital signature directly over each bundle. However, when bundle fragment services are needed, this mechanism suffers from heavy computational costs, bandwidth overheads and energy consumption. In this paper, we address the fragment authentication issue for BP by exploiting the combination of RS error correction and erasure codes with the help of batch transmission characteristic of DTNs. The RS error correction and erasure codes are adopted to allow the receivers to locate the false/injected fragments and reconstruct the only one signature shared by all fragments of a bundle, even if some other fragments are lost or routed to a different path. Getting only partial authentic fragments, a DTN node is able to detect and filter the false/injected fragments, and authenticate the origin of a bundle as well. Such an approach tolerates high delays, unexpected link disruption and the BP nature of routing fragments of the same bundle possibly via different paths. The performance analysis demonstrates that both of our schemes, which follow our generic idea based on RS codes, significantly reduce bandwidth overheads and computational costs as compared to the prior works. 展开更多
关键词 space-based delay tolerant networks bundle authentication information security.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部