学科分类
/ 1
19 个结果
  • 简介:EncryptedCommunicationtechniqueisanimportantmeasuretotheinformationsafety.BasedontheadvantagesoftwopublicencryptionalgorithmRSA&DES,anovelhighintensitypublicencryptionalgorithmChaosRandomHighIntensity(CHR)isproposedinthispaper.TheprincipleofCRHisdescribedandanalyzedindetail,andtheresultsofcomputersimulationhasproveditseffectivenessandcorrectness.

  • 标签: 加密技术 公共加密算法 混沌 信息安全
  • 简介:AtypeofdigitalchaoticeneryptionsystemwasproposedinRef.[1]whichusesaclassof1-Dpiecewiselinear(PWL)maptorealizechaoticencryptionanddecryptionsystemthroughtheinversesystemapproach.Inthegeneralstructureofencryptionsystem,adynamicalsystem∑(·)isusedtoconnectthelinearcombinationofn-orderdelaywiththeinputterminal.Inthispaperweshowthatthiscryptosystemcannotfrustratechosen-ciphertextattack.Atypeofchaoticencryptionsystembasedonself-synchronizingstreamcipherisproposed.Thissystemcanavoidchosen-ciphertextattackandhashighersecurity.

  • 标签: 安全分析 浑沌加密 离散化 网络安全
  • 简介:Thepaperproposesanovelalgorithmtogettheencryptionmatrix.Firstly,achaoticsequencegeneratedbyChebyshevchaoticneuralnetworksisconvertedintoaseriesoflow-orderintegermatricesfromwhichavailableencryptionmatricesareselected.Then,ahigherorderencryptionmatrixrelatingrealworldapplicationisconstructedbymeansoftensorproductionmethodbasedonselectedencryptionmatrices.Theresultsshowthattheproposedalgorithmcanproducea'one-timepadcipher'encryptionmatrixwithhighsecurity;andtheencryptionresultshavegoodchaosandauto-correlationwiththenaturalfrequencyoftheplaintextbeinghiddenandhomogenized.

  • 标签: CHEBYSHEV 混沌神经网络 整数矩阵 加密 构造方法 应用程序
  • 简介:量计算在最近的年里经历了快速的开发。由于可伸缩性上的限制,个人量计算机在不久的将来仍然似乎稍微不现实。为平常的用户的第一台实际的量计算机是可能的在云上。然而,仅当安全被保证,云计算的采纳是可能的。同构的加密是允许计算没有解密他们,在加密数据上被表现的一个密码的协议,因此遮蔽计算很好被适合。这里,我们首先在IBM云量计算机站台上使用了同构的加密。在我们的实验,当保护我们的隐私时,我们成功地为线性方程实现了一个量算法。这示范打开一条可行路径到云量信息技术的开发的下一个阶段。

  • 标签: 计算平台 同态加密 IBM 实验 量子计算机 量子信息技术
  • 简介:Thesecurityofthesymmetricprobabilisticencryptionschemebasedonchaoticattractorsofneuralnetworksisanalyzedanddiscussed.Firstly,thekeyuniquenessisprovedbyanalyzingtherotationtransformmatrixtoavoidtheattackoftheequivalentkey.Secondly,thedistributeduniformityofthenumbers'0'and'1'inthecorrespondingattractingdomainforeverychaoticattractorisanalyzedbythestatisticsmethod.Itistestifiedthatthedistributeduniformitycanbekeptifthesynapticmatrixoftheneuralnetworkischangedbyastandardpermutationmatrix.Twoannotationsbasedontheresultsaboveareproposedtoimprovetheapplicationsecurityoftheencryptionalgorithm.

  • 标签: 概率神经网络 混沌吸引子 对称加密 子算法 分布均匀性 注解
  • 简介:Inholographicencryption,doublerandom-phaseencodingintheFresneldomain(DRPEiFD)isaprevalentencryptionmethodbecauseitislenslessandsecure.However,noisesbringadverseeffectsduringdecryption.Inthisletter,weintroducequick-response(QR)codingduringencryptiontoresistnoises.WetransformtheoriginalinformationintoaQRcodeandthenencryptthecodeasahologramthroughDRPEiFD.Toretrievetheinput,wedecryptthehologramintheoppositemannertotheencryptionandsubsequentlyobtainaQRcodewithnoises.Byscanningthiscodewithproperapplicationsinsmartphones,wecanobtainanoise-freeretrieval.Numericalexperimentsandimagesscannedbyasmartphoneareshowntovalidateourproposedmethod.

  • 标签: 加密方法 快速响应 全息图 抗噪音 安全 双随机相位编码
  • 简介:Certificatelessencryptionattractsalotofattentionsofarbyeliminatingthekeyescrowprobleminidentity-basedencryptionandpublickeycertificatesinthetraditionalpublickeycryptography.Byconsideringthethreatfromthekeyexposure,itisdesirabletoincorporatetheideaofkey-insulatedcryptosystemintothecertificatelessencryption.Inthispaper,wehavedesignedanefficientcertificatelesskeyinsulatedencryption(CL-KIE)schemetoachievethisgoal.Byourapproach,thecomputationalperformanceofourschemehasbeenimprovedsignificantlyintermsofreductiononrunningtimeandstorage.WealsogavethesecurityproofofthenewCL-KIEschemeagainstthechosenplaintextattacks(CPAs)intherandomoracle,consideringtheassumptionofthecomputationalDiffie-Hellman(CDH)problem.

  • 标签: CERTIFICATELESS cryptography keyinsulated pairing-free random oracle
  • 简介:Anovelbroadcastencryptionschemeforgroupcommunicationscenariosindistributednetworksispresented.Inthescheme,anyoneisallowedtoencryptamessageanddistributeittoadesignatedgroup.Eachmemberinthedesignatedgrouphastheabilitytoindependentlydecryptaciphertext.Incontrasttotraditionalbroadcastencryption,allthevalidreceiversintheproposedschemecomposethedesignatedgroup.Totakeadvantageofthisproperty,atabforthegroupissetandthematchingprivatekeyforeachmemberisgenerated.Inaddition,beforedecryptingaciphertext,anyoneintheschemecanverifytheciphertext,toensurethattheciphertextiscorrect.Thispropertyisveryimportantforlarge-scalegroupcommunication,asthegatewaycanfilterincorrectciphertextandalleviatethereceiver'sworkload.Finally,aproofintherandomoraclemodelisgiven,toshowthattheproposedschemeissecureagainsttheadaptivelychosenciphertextattack.

  • 标签: 广播 选择性密码攻击 编码方法 通信安全
  • 简介:Anopticalimageencryptionsystemwithadaptivesteganographyusingred,green,andblue(RGB)channelintegrationisproposed.Theopticalimageencryptionsystememploysadoublerandomphaseencodingalgorithmtoencryptanddecryptcolorimages.TheRGBchannelinacolorimageisfirstintegratedintoalargegrayscaleimage.Thentheintegratedimageisencryptedbytworandomphasemasks.Thesecretdataisthenembeddedintotheencryptedimagewithaspecifichidingsequencegeneratedbythezero-LSB(leastsignificantbits)sortingtechniquewhichisacontent-dependentandlowdistortiondataembeddingmethod.Experimentalresultsshowthattheproposedmethodhasagoodperformanceinbothhidingcapacityanddecryptedimagequality.

  • 标签: 加密系统 光学图像 RGB 隐身 整合 渠道
  • 简介:密文政策基于属性的可查找的加密(CP-ABSE)能为数据分享和检索完成有细密纹理的存取控制,并且安全deduplication能由消除副本拷贝节省存储空间。然而,有很少策划支持可查找的加密和安全deduplication。在这份报纸,支持安全块级的deduplication的一个大宇宙CP-ABSE计划在混合的云机制下面被建议。在建议计划,在密文被插入到花蕾过滤器树(BFT)以后,私人云能由匹配标签高效地执行有细密纹理的deduplication,并且公共的云能用同构的可查找的方法并且关键词匹配高效地寻找。最后,建议计划能在选择分发攻击下面完成隐私块级(PRV-CDA-B)固定deduplication并且隐藏火柴(MC)可查找的安全。与存在计划相比,建议计划在同时支持有细密纹理的存取控制,块级的deduplication和有效搜索有优点。

  • 标签: 块级的 deduplication 可查找的加密 大宇宙 BFT
  • 简介:当前基于身份(标志)cryptosystem缺乏两大政党的认证和用户的私人钥匙的机制分发。一些基于标志的signcryption计划和基于标志的证实的关键协议协议被介绍了,但是他们不能完全解决这个问题。一个新奇基于标志的认证计划基于基于标志的加密(IBE)和指纹哈希方法被建议在IBE计划解决困难,它包括证实发送者的消息接收装置,证实用户并且把私人钥匙传给他们的信任权威(TA)。而且,计划从终端扩大指纹认证的应用程序到网络并且免于指纹数据制造。指纹认证方法由二个因素组成。这个方法联合一个标志例如,给USB钥匙调音,与用户由混合有指纹特征的一个假散乱数字的指纹回锅肉丁。安全和试验性的效率满足实际应用的要求。

  • 标签: ID识别 编码 双线性配对 指纹鉴别
  • 简介:Randomphasemasksplayakeyroleinopticalimageencryptionschemesbasedondoublerandomphasetechnique.Inthispaper,amixedchaoticmethodisproposed,whichcanefficientlysolvesomeweaknessesthatone-dimensional(1-D)singlechaoticmapsencountertogeneraterandomphasemasks.Basedonthechaoticrandomphasemasks,opticalimageencryptionanddecryptionarerealizedwithasingle-shotdigitalholographictechnique.Intheproposedencryptionscheme,theinitialvalueandparametersofmixedchaoticmapsserveassecretkeys,whichisconvenientforthekeymanagementandtransmission.Moreover,italsopossesseshighresistanceagainststatisticalattack,brute-forceattack,noiseattackandshearattack.Simulationresultsandsecurityanalysisverifythevalidityandsecurityoftheproposedencryptionscheme.

  • 标签: Image ENCRYPTION MIXED CHAOTIC MAPS Digital
  • 简介:ResearchdemonstratesthataFresnelhologramcanbegeneratedandsimultaneouslyencryptednumericallybasedonasecretsymmetrickeyformedbythemaximallengthsequence(M-sequence).Themethodcanbedirectlyextendedtoencryptavideoholographicclipinaframe-by-framemanner.However,giventhelimitedcombinationofsignalsinthefamilyofM-sequence,hackingthesecretkeythroughtrialanderrorcanbetimeconsumingbutnotdifficult.Inthisletter,weproposeamethodthatisdifficulttocrackwithbruteforceforencryptingaholographicvideosequence.AnM-sequenceisfirstrandomlyassignedtoencrypteachframeoftheholographicvideosignal.Subsequently,theindexoftheselectedM-sequence,whichisnecessarytodecryptthehologram,isencryptedwiththeRSAalgorithmbeforetransmittingtothereceivingend.Atthereceivingend,thedecoderisprovidedwithaprivatekeytorecovertheindexforeachframe,andthecorrespondingM-sequenceisusedtodecrypttheencodedhologram.

  • 标签: 菲涅耳全息图 混合加密 视频序列 计算机生成 数值 对称密钥加密
  • 简介:Identity-basedhashproofsystemisabasicandimportantprimitive.Ittographicschemesandprotocolsthataresecureagainstkey-leakageattacks.Inthisupdatableidentity-basedhashproofsystem,inwhichtherelatedmastersecretkeyiswidelyutilizedtoconstructcryp-paper,weintroducetheconceptofandtheidentitysecretkeycanbeupdatedsecurely.Then,weinstantiatethisprimitivebasedonlatticesinthestandardmodel.Moreover,weintroduceanapplicationofthisnewprimitivebygivingagenericconstructionofleakage-resilientpublic-keyencryptionschemeswithanonymity.Thisconstructioncanbeconsideredastheintegrationofthebounded-retrievalmodelandthecontinualleakagemodel.Comparedwiththeexistingleakage-resilientschemes,ourconstructionnotonlyismoreefficientbutalsocanresistmuchmorekeyleakage.

  • 标签: public-key ENCRYPTION IDENTITY-BASED HASH proof system