期刊文献+
共找到6,768篇文章
< 1 2 250 >
每页显示 20 50 100
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
1
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
Properties of Self-recoverable Mechanoluminescence Phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) and Its Information Encryption Application
2
作者 ZHANG Ting WANG Zhijun +3 位作者 WANG Dawei ZHAO Jinxin YANG Zhiping LI Panlai 《发光学报》 EI CAS CSCD 北大核心 2024年第9期1445-1455,共11页
A novel self-recoverable mechanoluminescent phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) was developed by the high-tem-perature solid-state reaction method,and its luminescence properties were investigated.Ca_(5)Ga_(6)O_(14)... A novel self-recoverable mechanoluminescent phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+) was developed by the high-tem-perature solid-state reaction method,and its luminescence properties were investigated.Ca_(5)Ga_(6)O_(14)∶Eu^(3+)can produce red mechanoluminescence,and importantly,it shows good repeatability.The mechanoluminescence of Ca_(5)Ga_(6)O_(14)∶Eu^(3+) results from the piezoelectric field generated inside the material under stress,rather than the charge carriers stored in the traps,which can be confirmed by the multiple cycles of mechanoluminescence tests and heat treatment tests.The mechanoluminescence color can be turned from red to green by co-doping varied concentrations of Tb^(3+),which may be meaningful for encrypted letter writing.The encryption scheme for secure communication was devised by harnessing mechanoluminescence patterns in diverse shapes and ASCII codes,which shows good encryption performance.The results suggest that the mechanoluminescence phosphor Ca_(5)Ga_(6)O_(14)∶Eu^(3+),Tb^(3+)may be applied to the optical information encryption. 展开更多
关键词 PHOSPHOR MECHANOLUMINESCENCE self-recoverable information encryption
在线阅读 下载PDF
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
3
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryption(ABE).
在线阅读 下载PDF
Novel encryption model for multimedia data 被引量:1
4
作者 Ye Dengpan~(1,2) & Lian Shiguo~3 1.The Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education,Wuhan 430072,P.R.China 2.School of Computer Science,Wuhan Univ.,Wuhan 430072,P.R.China 3.France Telecom R&D Beijing,Beijing 100080,P.R.China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第5期1081-1085,共5页
A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. An... A novel encryption model is proposed. It combines encryption process with compression process, and realizes compression and encryption at the same time. The model's feasibility and security are analyzed in detail. And the relationship between its security and compression ratio is also analyzed. 展开更多
关键词 multimedia encryption MODEL compression FEASIBILITY security.
在线阅读 下载PDF
Repeater jamming suppression method for pulse Doppler fuze based on identity recognition and chaotic encryption 被引量:7
5
作者 Jian Dai Xin-hong Hao +2 位作者 Qiang Liu Xiao-peng Yan Ping Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第3期1002-1012,共11页
Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a tradit... Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a traditional PD fuze increasingly emerges. Therefore, a repeater jamming suppression method for a PD fuze based on identity(ID) recognition and chaotic encryption is proposed. Every fuze has its own ID which is encrypted with different chaotic binary sequences in every pulse period of the transmitted signal. The thumbtack-shaped ambiguity function shows a good resolution and distance cutoff characteristic. The ability of anti-repeater jamming is emphatically analyzed, and the results at different signal-to-noise ratio(SNR) show a strong anti-repeater jamming ability and range resolution that the proposed method possesses. Furthermore, the anti-repeater jamming ability is influenced by processing gain, bit error rate(BER) and correlation function. The simulation result validates the theoretical analysis, it shows the proposed method can significantly improve the anti-repeater jamming ability of a PD fuze. 展开更多
关键词 Pulse Doppler fuze ID Chaotic binary code encryption Repeater jamming
在线阅读 下载PDF
Preserving scheme for user’s confidential information in smart grid based on digital watermark and asymmetric encryption 被引量:5
6
作者 WANG Shou-xiang CHEN Hai-wen +4 位作者 ZHAO Qian-yu GUO Lu-yang DENG Xin-yu SIWei-guo SUN Zhi-qing 《Journal of Central South University》 SCIE EI CAS CSCD 2022年第2期726-740,共15页
As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand respons... As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand response.However,there is a growing risk of privacy disclosure with the wide installation of smart meters,for they transmit readings and sensitive data simultaneously.To guarantee the confidentiality of the sensitive information and authenticity of smart meter readings,we proposed a privacy-preserving scheme based on digital watermarking and elliptic-curve cryptography(ECC)asymmetric encryption.The sensitive data are encrypted using the public key and are hidden in the collected readings using digital watermark.Only the authorized user can extract watermark and can decrypt the confidential data using its private key.The proposed method realizes secure end-to-end confidentiality of the sensitive information.It has faster computing speed and can verify the data source and ensure the authenticity of readings.The example results show that the proposed method has little influence on the original data and unauthorized access cannot be completed within a reasonable time.On embedded hardware,the processing speed of the proposed method is better than the existing methods. 展开更多
关键词 sensitive information smart grid smart meter asymmetric encryption
在线阅读 下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
7
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
在线阅读 下载PDF
Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain 被引量:1
8
作者 Ramadan Noha Ahmed HossamEldin H +1 位作者 El-khamy Said E Abd El-Samie Fathi E 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第9期2049-2057,共9页
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat... A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks. 展开更多
关键词 Backer map chaotic encryption fractional Fourier transform (FRFT) modified Logistic map
在线阅读 下载PDF
NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems 被引量:10
9
作者 XU Xiao-long ZHANG Qi-tong ZHOU Jing-lan 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第4期807-818,共12页
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untru... The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time. 展开更多
关键词 cloud storage data PRIVACY PROXY re-encryption multi-authority
在线阅读 下载PDF
Secure property of chaotic encryption system based on chaotic synchronization
10
作者 崔光亮 胡国杰 冯正进 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第1期57-62,共6页
The secure property of chaotic encryption system based on chaos synchronization from chosenciphertext attack under Kerckhoff principle is discussed. The key (parameter) of the receiver can be obtained by chosenciphert... The secure property of chaotic encryption system based on chaos synchronization from chosenciphertext attack under Kerckhoff principle is discussed. The key (parameter) of the receiver can be obtained by chosenciphertext attack. The encryption systems based on chaotic synchronization do not have high privacy. 展开更多
关键词 CHAOS chaos synchronization encryption system kerckhoff principle chosenciphertext attack
在线阅读 下载PDF
Broadcast group-oriented encryption secure against chosen ciphertext attack
11
作者 Ma Chunbo Ao Jun Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期811-817,共7页
A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in... A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in the designated group has the ability to independently decrypt a ciphertext. In contrast to traditional broadcast encryption, all the valid receivers in the proposed scheme compose the designated group. To take advantage of this property, a tab for the group is set and the matching private key for each member is generated. In addition, before decrypting a ciphertext, anyone in the scheme can verify the ciphertext, to ensure that the ciphertext is correct. This property is very important for large-scale group communication, as the gateway can filter incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given, to show that the proposed scheme is secure against the adaptively chosen ciphertext attack. 展开更多
关键词 BROADCAST group-oriented encryption chosen ciphertext attack public verification
在线阅读 下载PDF
New chaos-based encryption scheme for digital sequence
12
作者 Zhang Zhengwei Fan Yangyu Zeng Li 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期698-703,709,共7页
To enhance the anti-breaking performance of privacy information, this article proposes a new encryption method utilizing the leaping peculiarity of the periodic orbits of chaos systems. This method maps the secret seq... To enhance the anti-breaking performance of privacy information, this article proposes a new encryption method utilizing the leaping peculiarity of the periodic orbits of chaos systems. This method maps the secret sequence to several chaos periodic orbits, and a short sequence obtained by evolving the system parameters of the periodic orbits in another nonlinear system will be the key to reconstruct these periodic orbits. In the decryption end, the shadowing method of chaos trajectory based on the modified Newton-Raphson algorithm is adopted to restore these system parameters. Through deciding which orbit each pair coordinate falls on, the original digital sequence can be decrypted. 展开更多
关键词 encryption scheme LPO (leaping periodic orbits) chaos initial conditions parameter estimation nonlinear system
在线阅读 下载PDF
Image encryption based on a novel memristive chaotic system,Grain-128a algorithm and dynamic pixel masking
13
作者 HUANG Lilian SUN Yi +1 位作者 XIANG Jianhong WANG Linyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第3期534-550,共17页
In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov expon... In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks. 展开更多
关键词 memristive chaotic system super-wide parameter range image encryption Grain-128a algorithm dynamic pixel masking
在线阅读 下载PDF
Enhanced biometric encryption algorithm for private key protection in BioPKI system
14
作者 Cheol-Joo Chae Kwang-Nam Choi +2 位作者 Kiseok Choi Jae-Soo Kim Yong Ju Shin 《Journal of Central South University》 SCIE EI CAS 2014年第11期4286-4290,共5页
Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in ... Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in this PKI system. Recently, studies have been conducted on Bio PKI system that uses the biometric information of users in order to replace the password type of private key protection in PKI system. However, Bio PKI system also has vulnerability in that biometric information used for protection of private key cannot be reused once it is stolen or lost. So, we propose the method to protect the private key using FIDSEQi which binds sequence to biometric information. The proposed method enhances reusability of biometric information and presents higher attack complexity than the method of authentication by cross matching single biometric information. 展开更多
关键词 BioPKI system fingerprint biometric encryption secret share
在线阅读 下载PDF
Dynamic Encryption Technology in Ad-hoc Networks
15
作者 金朝晖 王顺满 +1 位作者 许楷 梁青 《Defence Technology(防务技术)》 SCIE EI CAS 2007年第3期221-225,共5页
A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption proc... A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption process effective in all communication process by continuous dynamic key generation together with synchronization, and its capability to cut back on system bandages to a greater extent, which is valuable for the ad-hoc circumstance. In addition, the rationality and effectiveness of this novel encryption method have been verified by the test results. 展开更多
关键词 通讯技术 动力编密码 对称形编密码 ad-hoc网
在线阅读 下载PDF
Air target recognition method against ISRJ for radio frequency proximity sensors using chaotic stream encryption
16
作者 Jian-feng Li Jian Dai +2 位作者 Xin-hong Hao Xiao-peng Yan Xin-wei Wang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第10期267-279,共13页
The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article propose... The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article proposes a recognition method for RFPSs to identify the false targets caused by ISRJ.The proposed method is realized by assigning a unique identity(ID)to each RFPS,and each ID is a periodically and chaotically encrypted in every pulse period.The processing technique of the received signal is divided into ranging and ID decryption.In the ranging part,a high-resolution range profile(HRRP)can be obtained by performing pulse compression with the binary chaotic sequences.To suppress the noise,the singular value decomposition(SVD)is applied in the preprocessing.Regarding ID decryption,targets and ISRJ can be recognized through the encryption and decryption processes,which are controlled by random keys.An adaptability analysis conducted in terms of the peak-to-side lobe ratio(PSLR)and bit error rate(BER)indicates that the proposed method performs well within a 70-k Hz Doppler shift.A simulation and experimental results show that the proposed method achieves extremely stable target and ISRJ recognition accuracies at different signal-to-noise ratios(SNRs)and jamming-to-signal ratios(JSRs). 展开更多
关键词 Interrupted-sampling repeater jamming(ISRJ) Radio frequency proximity sensors(RFPS) Chaotic stream encryption Air target recognition Identity(ID)decryption
在线阅读 下载PDF
基于SM2可链接环签名的联盟链隐私保护方法
17
作者 高改梅 杜苗莲 +3 位作者 刘春霞 杨玉丽 党伟超 邸国霞 《计算机应用》 北大核心 2025年第5期1564-1572,共9页
为应对联盟链中身份信息和交易数据隐私泄露的挑战,提出一种基于SM2可链接环签名的联盟链隐私保护方法(PPMCB-SM2LRS)。首先,针对可链接环签名(LRS)方案存在安全性不足、追溯性差的问题,结合SM2数字签名重新设计LRS,旨在增强交易方身份... 为应对联盟链中身份信息和交易数据隐私泄露的挑战,提出一种基于SM2可链接环签名的联盟链隐私保护方法(PPMCB-SM2LRS)。首先,针对可链接环签名(LRS)方案存在安全性不足、追溯性差的问题,结合SM2数字签名重新设计LRS,旨在增强交易方身份隐私保护的同时还能够追溯作恶的交易用户;其次,基于优化后的Paillier同态加密算法提出一种分级加密策略,实现隐私数据的“可见不可用”,以提高联盟链中交易数据验证的隐私性和机密性。安全性分析表明,所提方法具备正确性、不可伪造性、条件匿名性和可链接性。实验结果表明,与同类型LRS方案相比,PPMCB-SM2LRS具有更小的计算开销,且在签名生成与确认阶段的平均耗时有显著降低,同时符合密码技术发展的自主可控性原则。 展开更多
关键词 隐私保护 联盟链 SM2数字签名 可链接环签名 Paillier同态加密
在线阅读 下载PDF
基于全同态加密保护医疗隐私的逻辑回归方案
18
作者 李杰 马海英 曹东杰 《广西大学学报(自然科学版)》 北大核心 2025年第1期173-185,共13页
针对现有的医疗数据模型训练方案中存在隐私泄露和收敛速度慢的问题,提出基于全同态加密保护医疗隐私的逻辑回归方案。该方案首先利用Nesterov梯度下降法矫正逻辑回归算法中模型梯度的更新位置,加快其收敛速度,增大接近最优值的可能性,... 针对现有的医疗数据模型训练方案中存在隐私泄露和收敛速度慢的问题,提出基于全同态加密保护医疗隐私的逻辑回归方案。该方案首先利用Nesterov梯度下降法矫正逻辑回归算法中模型梯度的更新位置,加快其收敛速度,增大接近最优值的可能性,保证收敛精度;然后,利用全同态加密算法(CKKS)加密初始模型参数和医疗数据,使其在保护医疗数据隐私的前提下执行改进后的逻辑回归算法。为了提高模型训练中每轮迭代的效率,该方案通过减少2个向量的内积密文中的同态乘法计算次数,减小计算开销和噪声;利用极小极大近似多项式拟合Sigmoid函数,使医疗数据始终以密文的形式在不可信第三方服务器进行模型训练。通过合理的安全性假设,证明本方案在不可信的环境中进行模型训练时,能够确保医疗数据和模型参数的隐私安全。通过在真实数据集上测试本方案和相关方案的模型训练速度和精度,实验结果表明,本方案不仅具有较高的计算效率,而且提高了模型训练精度。 展开更多
关键词 全同态加密算法 梯度下降法 医疗隐私保护 逻辑回归
在线阅读 下载PDF
基于同态加密的可验证隐私保护联邦学习方案
19
作者 郭显 王典冬 +2 位作者 冯涛 成玉丹 蒋泳波 《电子与信息学报》 北大核心 2025年第4期1113-1125,共13页
现有基于同态加密的联邦学习安全和隐私保护方案中,仍面临着服务器伪造聚合结果或与用户合谋导致隐私数据泄露风险。针对上述问题,该文提出抗合谋的隐私保护和可验证联邦学习方案。首先,通过结合秘密共享算法实现密钥的生成和协作解密,... 现有基于同态加密的联邦学习安全和隐私保护方案中,仍面临着服务器伪造聚合结果或与用户合谋导致隐私数据泄露风险。针对上述问题,该文提出抗合谋的隐私保护和可验证联邦学习方案。首先,通过结合秘密共享算法实现密钥的生成和协作解密,并采用同态加密等密码学原语进一步保护模型,防止用户与服务器的合谋攻击。然后基于双线性聚合签名算法使每个用户能够独立验证服务器提供的聚合结果。同时,为了鼓励更多拥有高质量数据的用户参与进来,该文提出一种激励机制,为用户提供相应的奖励。安全性分析表明,该文方案对系统中存在的合谋攻击具有鲁棒性。最后,理论分析和实验验证结果表明该方案具有可靠性、可行性和有效性。 展开更多
关键词 联邦学习 同态加密 隐私保护 可验证
在线阅读 下载PDF
面向智慧油气勘探开发系统的多维密态数据聚合技术研究与应用
20
作者 张晓均 张豪 +1 位作者 李兴鹏 张经伟 《计算机工程与科学》 北大核心 2025年第4期634-643,共10页
工业物联网(IIoT)技术使得智慧油气勘探开发系统加速了场区数据汇聚,打破了信息孤岛壁垒,同时勘探开发关键数据的机密性、完整性、认证性等信息安全保障也越来越重要。对此,提出了面向智慧油气勘探开发系统的多维密态数据聚合方案。该... 工业物联网(IIoT)技术使得智慧油气勘探开发系统加速了场区数据汇聚,打破了信息孤岛壁垒,同时勘探开发关键数据的机密性、完整性、认证性等信息安全保障也越来越重要。对此,提出了面向智慧油气勘探开发系统的多维密态数据聚合方案。该方案结合超递增序列,改进了同态加密算法,设计了随机盲化秘密参数,即使解密私钥遭泄露,油气勘探开发系统终端设备传输的重要数据也不会被窃取。可信中心根据勘探开发系统中各通信实体的真实身份产生对应的私钥,彼此可以根据对方的身份灵活地协商可认证的会话密钥,计算基于哈希函数的消息认证码。这样,控制中心可以轻量级地验证数据集成平台服务器发送的聚合密文的完整性,解密各个场区关键数据的聚合值,掌握勘探开发状态参数的平均值,实现对智慧油气勘探开发系统的实时监督与调控。安全性分析和性能评估结果表明,所提方案可以安全高效地部署在智慧油气勘探开发环境。 展开更多
关键词 智慧油气勘探开发系统 同态加密 密态聚合 消息认证码 完整性验证
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部