期刊文献+
共找到1,481篇文章
< 1 2 75 >
每页显示 20 50 100
Distribution of Random Session Key Based on Key-Insulated Public-Key Cryptosystems
1
作者 LUHai-jun SUYun-xue ZHUYue-fei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期251-254,共4页
Based on the characteristic of key-insulated public-key cryptosystem, wepropose a distributed landora session keys distribution protocol without a key distribution center.The session key is generated by different user... Based on the characteristic of key-insulated public-key cryptosystem, wepropose a distributed landora session keys distribution protocol without a key distribution center.The session key is generated by different user and only used one time. So thekey is one-time key. Inaddition, the user who generates the next one-time key, is random selected by the current sessionkey. In the protocol of this paper, the characteristic of time in the key-insulated public-key, adistributed protocol, translates into the characteristic of spaee which every point has differentsecret key in the different period. At the same time, the system is fit for key management in AdHoe, and is a new scheme of key management in Ad Hoc. 展开更多
关键词 key-insulated public-key cryptosystem onetime key distributed cryptographyprotoeol distributed characteristic of space and time key management of Ad Hoc
在线阅读 下载PDF
A JOINT SIGNATURE ENCRYPTION AND ERROR CORRECTION PUBLIC-KEY CRYPTOSYSTEM BASED ON ALGEBRAIC CODING THEORY
2
作者 李元兴 成坚 王新梅 《Journal of Electronics(China)》 1992年第1期33-39,共7页
A joint signature,encryption and error correction public-key cryptosystem is pre-sented based on an NP-completeness problem-the decoding problem of general linear codes inalgebraic coding theory,
关键词 CRYPTOLOGY public-key cryptosystem Error-correcting CODES
在线阅读 下载PDF
ATTACKS ON REAL POLYNOMIAL TYPE PUBLIC-KEY CRYPTOSYSTEMS AND DISCUSSION ON RELATED PROBLEMS
3
作者 李大兴 陆浪如 李大为 《Journal of Electronics(China)》 1994年第4期289-295,共7页
The real polynomial type public-key cryptosystems are broken up by computing the equivalent secure keys, then some computational problems related to securities of cryptosystems are discussed.
关键词 CRYPTANALYSIS public-key cryptosystem COMPUTATION
在线阅读 下载PDF
New Practical Algebraic Public-Key Cryptosystem and Some Related Algebraic and Computational Aspects
4
作者 S. K. Rososhek 《Applied Mathematics》 2013年第7期1043-1049,共7页
The most popular present-day public-key cryptosystems are RSA and ElGamal cryptosystems. Some practical algebraic generalization of the ElGamal cryptosystem is considered-basic modular matrix cryptosystem (BMMC) over ... The most popular present-day public-key cryptosystems are RSA and ElGamal cryptosystems. Some practical algebraic generalization of the ElGamal cryptosystem is considered-basic modular matrix cryptosystem (BMMC) over the modular matrix ring M2(Zn). An example of computation for an artificially small number n is presented. Some possible attacks on the cryptosystem and mathematical problems, the solution of which are necessary for implementing these attacks, are studied. For a small number n, computational time for compromising some present-day public-key cryptosystems such as RSA, ElGamal, and Rabin, is compared with the corresponding time for the ВММС. Finally, some open mathematical and computational problems are formulated. 展开更多
关键词 public-key cryptosystem MODULAR MATRIX RING
在线阅读 下载PDF
Public-Key Cryptosystems with Secret Encryptor and Digital Signature
5
作者 Boris Verkhovsky 《International Journal of Communications, Network and System Sciences》 2013年第1期1-6,共6页
This paper describes and compares a variety of algorithms for secure transmission of information via open communication channels based on the discrete logarithm problem that do not require search for a generator (prim... This paper describes and compares a variety of algorithms for secure transmission of information via open communication channels based on the discrete logarithm problem that do not require search for a generator (primitive element). Modifications that simplify the cryptosystem are proposed, and, as a result, accelerate its performance. It is shown that hiding information via exponentiation is more efficient than other seemingly simpler protocols. Some of these protocols also provide digital signature/sender identification. Numeric illustrations are provided. 展开更多
关键词 Digital Signature Discrete LOGARITHM El Gamal Algorithm Generator Modular EXPONENTIATION Public Key cryptosystem Secure Communication SENDER Identification
在线阅读 下载PDF
Review of Public-Key Cryptosystem Based on the Error Correcting Code 被引量:1
6
作者 LI Zhongyuan QU Chengqin +1 位作者 ZHOU Xueguang ZHUO Lifeng 《Wuhan University Journal of Natural Sciences》 CAS 2014年第6期489-496,共8页
The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative anal... The paper review the public-key cryptosystems based on the error correcting codes such as Goppa code, BCH code, RS code, rank distance code, algebraic geometric code as well as LDPC code, and made the comparative analyses of the merits and drawbacks of them. The cryptosystem based on Goppa code has high security, but can be achieved poor. The cryptosystems based on other error correcting codes have higher performance than Goppa code. But there are still some disadvantages to solve. At last, the paper produce an assumption of the Niederreiter cascade combination cryptosystem based on double public-keys under complex circumstances, which has higher performance and security than the traditional cryptosystems. 展开更多
关键词 error correcting code public-key cryptosystem cascaded code safety
原文传递
Further research on public-key cryptosystems based on third-order recurrence sequence
7
作者 JIANG Zheng-tao SUN Xi +1 位作者 TIAN Lei WANG Yu-min 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2006年第3期287-290,共4页
Properties of third-order recurrence sequences were investigated and a new variant of the GH public-key cryptosystem,which was further improved to be a probabil-istic public-key cryptosystem,was proposed.Then security... Properties of third-order recurrence sequences were investigated and a new variant of the GH public-key cryptosystem,which was further improved to be a probabil-istic public-key cryptosystem,was proposed.Then security analysis of the proposed scheme was provided and it was proved that the one-wayness of the proposed scheme is equivalent to partial discrete logarithm and its semantic se-curity is equivalent to decisional Diffie-Hellman problem in ring extension.Finally,efficiency analysis of the proposed scheme was provided,and that these two encryption schemes need to transfer 2log N and 4log N bits data re-spectively. 展开更多
关键词 public-key cryptosystem third-order linear recurrence sequence (trapdoor)discrete logarithm integer factorization
原文传递
BREAKING A CLASS OF PUBLIC-KEY CRYPTOSYSTEMS WITH EUCLID ALGORITHM 被引量:1
8
作者 李大兴 张泽增 《Chinese Science Bulletin》 SCIE EI CAS 1991年第10期873-876,共4页
Okamoto public-key cryptosystem (abbr. OPKC)has drawn considerable attention for its convenience and rapidity of encryption and decryption. K. Koyama, A.Shamir, B. Vallee and others already analyzed it and presented s... Okamoto public-key cryptosystem (abbr. OPKC)has drawn considerable attention for its convenience and rapidity of encryption and decryption. K. Koyama, A.Shamir, B. Vallee and others already analyzed it and presented some attacks. This report gives OPKC an elementary attack, which can not only break completely both the systems of OPKC but also be used to attack other public-key cryptosystems similar to OPKC, such as 展开更多
关键词 public-key cryptosystem SECURITY EUCLID algorithm.
原文传递
New Public-Key Cryptosystem Based on the Morphism of Polynomials Problem 被引量:1
9
作者 Houzhen Wang Huanguo Zhang +2 位作者 Shaowu Mao Wanqing Wu Liqiang Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期302-311,共10页
During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it ... During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it is universally regarded as a difficult task, as in the Knapsack cryptosystems, to design a secure MPKC scheme (especially an encryption scheme) employing the existing trapdoor construction. In this paper, we propose a new key-exchange scheme and an MPKC scheme based on the Morphism of Polynomials (MP) problem. The security of the proposed schemes is provably reducible to the conjectured intractability of a new difficult problem, namely the Decisional Multivariate Diffie-Hellman (DMDH) problem derived from the MP problem. The proposed key agreement is one of several non-number-theory-based protocols, and is a candidate for use in the post-quantum era. More importantly, by slightly modifying the protocol, we offer an original approach to designing a secure MPKC scheme. Furthermore, the proposed encryption scheme achieves a good tradeoff between security and efficiency, and seems competitive with traditional MPKC schemes. 展开更多
关键词 public key cryptosystem key exchange Multivariate Public Key Cryptography (MPKC) Morphism ofPolynomials (MP) problem
原文传递
Secure and Energy Efficient Design of Multi-Modular Exponential Techniques for Public-Key Cryptosystem
10
作者 Utkarsh Tiwari Satyanarayana Vollala +2 位作者 N.Ramasubramanian B.Sameedha Begum G.Lakshminarayanan 《Journal of Communications and Information Networks》 EI CSCD 2022年第3期309-323,共15页
The present paper proposes a secure design of the energy-efficient multi-modular exponential techniques that use store and reward method and store and forward method.Computation of the multi-modular exponentiation can... The present paper proposes a secure design of the energy-efficient multi-modular exponential techniques that use store and reward method and store and forward method.Computation of the multi-modular exponentiation can be performed by three novel algorithms:store and reward,store and forward 1-bit(SFW1),and store and forward 2-bit(SFW2).Hardware realizations of the proposed algorithms are analyzed in terms of throughput and energy.The experimental results show the proposed algorithms SFW1 and SFW2 increase the throughput by orders of 3.98% and 4.82%,reducing the power by 5.32% and 6.15% and saving the energy in the order of 3.95% and 4.75%,respectively.The proposed techniques can prevent possible side-channel attacks and timing attacks as a consequence of an inbuilt confusion mechanism.Xilinx Vivado-21 on Virtex-7 evaluation board and integrated computer application for recognizing user services(ICARUS)Verilog simulation and synthesis tools are used for field programmable gate array(FPGA)for hardware realization.The hardware compatibility of proposed algorithms has also been checked using Cadence for application specific integrated circuit(ASIC). 展开更多
关键词 public-key cryptography RSA multimodular exponentiation modular multiplication Montgomery multiplication
原文传递
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
11
作者 Ang Liu Qing Zhang +3 位作者 Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu 《Computers, Materials & Continua》 SCIE EI 2024年第7期1727-1751,共25页
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functio... The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security. 展开更多
关键词 IOT quantum blockchain public-key quantum signature quantum hash function
在线阅读 下载PDF
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
12
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
在线阅读 下载PDF
Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
13
作者 Mugaruka Buduge Gulain Jeremie Ndikumagenge +2 位作者 Buhendwa Nyenyezi Justin Bulonza Masumbuko Alexis Katho Seba Jacques 《Journal of Information Security》 2024年第3期299-307,共9页
In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any mod... In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any modern company. A companys operational and historical data contains strategic and operational knowledge of ever-increasing added value. The emergence of a new paradigm: big data. Today, the value of the data scattered throughout this mother of knowledge is calculated in billions of dollars, depending on its size, scope and area of intervention. With the rise of computer networks and distributed systems, the threats to these sensitive resources have steadily increased, jeopardizing the existence of the company itself by drying up production and losing the interest of customers and suppliers. These threats range from sabotage to bankruptcy. For several decades now, most companies have been using encryption algorithms to protect and secure their information systems against the threats and dangers posed by the inherent vulnerabilities of their infrastructure and the current economic climate. This vulnerability requires companies to make the right choice of algorithms to implement in their management systems. For this reason, the present work aims to carry out a comparative study of the reliability and effectiveness of symmetrical and asymmetrical cryptosystems, in order to identify one or more suitable for securing academic data in the DRC. The analysis of the robustness of commonly used symmetric and asymmetric cryptosystems will be the subject of simulations in this article. 展开更多
关键词 Comparative Study cryptosystemS Symmetric Encryption Asymmetric Encryption
在线阅读 下载PDF
针对物联网设备的旁路攻击及防御方法的研究
14
作者 何乐生 冯毅 +2 位作者 岳远康 杨崇宇 胡崇辉 《通信学报》 北大核心 2025年第2期166-175,共10页
物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提... 物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提出了安全密钥管理方案及改进的S盒设计,作为旁路攻击防御方法。验证平台由两级差分放大器和抗干扰有限冲激响应(FIR)滤波器构成,能够捕捉微弱的功耗变化,并设计了针对轻量级加密算法的两轮相关能量攻击。通过获取正确密钥相关系数置信度的评估方法,在对PRESENT算法的3 000条功耗曲线进行10 000次攻击后,成功率超过96%,正确密钥的相关性均值均超过0.6,在95%的置信水平下,拥有狭窄的置信区间,而采用改进后的算法进行相同实验时,攻击成功率仅为9.12%。 展开更多
关键词 物联网安全 轻量级密码 旁路攻击 相关能量分析
在线阅读 下载PDF
METHOD FOR CONSTRUCTING TAG-KEM SCHEMES WITH SHORT-MESSAGE PUBLIC-KEY ENCRYPTIONS 被引量:1
15
作者 陈原 陈丹 董庆宽 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期301-305,共5页
Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a ... Tag key encapsulation mechanism (Tag-KEM)/data encapsulation mechanism (DEM) is a hybrid framework proposed in 2005. Tag-t(EM is one of its parts by using public-key encryption (PKE) technique to encapsulate a symmetric key. In hybrid encryptions, the long-raessage PKE is not desired due to its slow operation. A general method is presented for constructing Tag-KEM schemes with short-message PKEs. The chosen ciphertext security is proved in the random oracle model. In the method, the treatment of the tag part brings no additional ciphertext redundancy. Among all the methods for constructing Tag-KEM, the method is the first one without any validity checking on the tag part, thus showing that the Tag-KEM/DEM framework is superior to KEM+DEM one. 展开更多
关键词 information security public-key encryption chosen ciphertext security Tag-KEM scheme
在线阅读 下载PDF
Multivariate Public-Key Encryption Scheme Based on Error Correcting Codes 被引量:4
16
作者 王后珍 沈昌祥 +1 位作者 徐正全 张焕国 《China Communications》 SCIE CSCD 2011年第4期23-31,共9页
Advances in quantum computers pose potential threats to the currently used public-key cryptographic algorithms such as RSA and ECC.As a promising candidate against attackers equipped with quantum computational power,M... Advances in quantum computers pose potential threats to the currently used public-key cryptographic algorithms such as RSA and ECC.As a promising candidate against attackers equipped with quantum computational power,Multivariate Public-Key Cryptosystems(MPKCs)has attracted increasing attention in recently years.Unfortunately,the existing MPKCs can only be used as multivariate signature schemes,and the way to construct an efficient MPKC enabling secure encryption remains unknown.By employing the basic MQ-trapdoors,this paper proposes a novel multivariate encryption scheme by combining MPKCs and code-based public-key encryption schemes.Our new construction gives a positive response to the challenges in multivariate public key cryptography.Thorough analysis shows that our scheme is secure and efficient,and its private key size is about 10 times smaller than that of McEliece-type cryptosystems. 展开更多
关键词 CRYPTOGRAPHY multivariate public key cryptosystems Goppa codes
在线阅读 下载PDF
Enhanced NTRU cryptosystem eliminating decryption failures 被引量:3
17
作者 Yao Jun Zeng Guihua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期890-895,共6页
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt... An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU. 展开更多
关键词 NTRU cryptosystem polynomial algebra decryption failure lattice reduction.
在线阅读 下载PDF
A NEW RSA CRYPTOSYSTEM HARDWARE IMPLEMENTATION BASED ON MONTGOMERY'S ALGORITHM 被引量:5
18
作者 LU Jun-ming(卢君明) +1 位作者 LIN Zheng-hui(林争辉) 《Journal of Shanghai Jiaotong university(Science)》 EI 2002年第1期46-49,共4页
RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was pres... RSA public key crypto system is a relatively safe technology, which is widely used in today’s secure electronic communication. In this paper, a new implementation method to optimize a 1 024 bit RSA processor was presented. Basically, a fast modular multiplication architecture based on Montgomery’s algorithm was proposed. Modular exponentiation algorithm scans encryption from right to left, so two modular multiplications can be processed parallel. The new architecture is also fit for an effective I/O interface. The time to calculate a modular exponentiation is about n 2 clock cycles. The proposed architecture has a data rate of 93.7 kb/s for 1 024 bit work with a 100 MHz clock. 展开更多
关键词 MONTGOMERY ALGORITHM MODULAR MULTIPLICATION RSA public-key crytosystem
在线阅读 下载PDF
A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network 被引量:1
19
作者 王兴元 鲍雪梅 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期232-240,共9页
In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (... In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hard- ware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosys- tem is secure and practical, and suitable for image encryption. 展开更多
关键词 image encryption block cryptosystem chaotic neural network coupled map lattice
在线阅读 下载PDF
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
20
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
在线阅读 下载PDF
上一页 1 2 75 下一页 到第
使用帮助 返回顶部