In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov expon...In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks.展开更多
A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption proc...A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption process effective in all communication process by continuous dynamic key generation together with synchronization, and its capability to cut back on system bandages to a greater extent, which is valuable for the ad-hoc circumstance. In addition, the rationality and effectiveness of this novel encryption method have been verified by the test results.展开更多
The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article propose...The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article proposes a recognition method for RFPSs to identify the false targets caused by ISRJ.The proposed method is realized by assigning a unique identity(ID)to each RFPS,and each ID is a periodically and chaotically encrypted in every pulse period.The processing technique of the received signal is divided into ranging and ID decryption.In the ranging part,a high-resolution range profile(HRRP)can be obtained by performing pulse compression with the binary chaotic sequences.To suppress the noise,the singular value decomposition(SVD)is applied in the preprocessing.Regarding ID decryption,targets and ISRJ can be recognized through the encryption and decryption processes,which are controlled by random keys.An adaptability analysis conducted in terms of the peak-to-side lobe ratio(PSLR)and bit error rate(BER)indicates that the proposed method performs well within a 70-k Hz Doppler shift.A simulation and experimental results show that the proposed method achieves extremely stable target and ISRJ recognition accuracies at different signal-to-noise ratios(SNRs)and jamming-to-signal ratios(JSRs).展开更多
云辅助医疗物联网系统是智慧医疗领域发展的新趋势,患者隐私数据通常以密态的形式外包存储于云端,这将导致数据拥有者失去对自身数据的控制权限,并带来数据检索不便.针对上述问题,本文提出了一种支持策略隐藏的可搜索属性加密方案,结合...云辅助医疗物联网系统是智慧医疗领域发展的新趋势,患者隐私数据通常以密态的形式外包存储于云端,这将导致数据拥有者失去对自身数据的控制权限,并带来数据检索不便.针对上述问题,本文提出了一种支持策略隐藏的可搜索属性加密方案,结合密文策略属性加密与公钥可搜索加密的优势,确保云辅助(cloud-assisted Internet of Medical Things,IoMT)系统中共享数据的机密性,实现了敏感数据的细粒度访问控制并支持关键字搜索.并且,利用在线/离线加密和外包解密等方法降低了资源受限设备的计算开销,使得密文策略的属性加密方案可以在云辅助IoMT系统中实施.同时,引入策略隐藏技术,将属性加密访问策略中的属性值隐藏于密文中,防止数据拥有者的隐私泄露.在安全性方面,证明本方案的密文信息在选定访问结构和选择明文攻击下具有不可区分性,以及陷门信息在选择关键字攻击下具有不可区分性.最后,利用JPBC(Javapairing-based cryptography)密码库对本方案与其他相关方案在功能特性、通信开销和计算开销等方面进行对比,结果表明本方案在密钥生成和加密阶段计算效率更高且存储开销更低.展开更多
基金This work was supported by the National Natural Science Foundation of China(61203004)the Natural Science Foundation of Heilongjiang Province(F201220)the Heilongjiang Provincial Natural Science Foundation of Joint Guidance Project(LH2020F022).
文摘In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks.
基金Sponsored byNational Nature Science Foundation of China(60236010)Teaching and Research Awardfor Outstanding Teachersin Higher Education Insitutions of Ministry of Education of China
文摘A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption process effective in all communication process by continuous dynamic key generation together with synchronization, and its capability to cut back on system bandages to a greater extent, which is valuable for the ad-hoc circumstance. In addition, the rationality and effectiveness of this novel encryption method have been verified by the test results.
基金supported by the National Natural Science Foundation of China(Grant No.61973037)and(Grant No.61871414)Postdoctoral Fundation of China(Grant No.2022M720419)。
文摘The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article proposes a recognition method for RFPSs to identify the false targets caused by ISRJ.The proposed method is realized by assigning a unique identity(ID)to each RFPS,and each ID is a periodically and chaotically encrypted in every pulse period.The processing technique of the received signal is divided into ranging and ID decryption.In the ranging part,a high-resolution range profile(HRRP)can be obtained by performing pulse compression with the binary chaotic sequences.To suppress the noise,the singular value decomposition(SVD)is applied in the preprocessing.Regarding ID decryption,targets and ISRJ can be recognized through the encryption and decryption processes,which are controlled by random keys.An adaptability analysis conducted in terms of the peak-to-side lobe ratio(PSLR)and bit error rate(BER)indicates that the proposed method performs well within a 70-k Hz Doppler shift.A simulation and experimental results show that the proposed method achieves extremely stable target and ISRJ recognition accuracies at different signal-to-noise ratios(SNRs)and jamming-to-signal ratios(JSRs).
文摘云辅助医疗物联网系统是智慧医疗领域发展的新趋势,患者隐私数据通常以密态的形式外包存储于云端,这将导致数据拥有者失去对自身数据的控制权限,并带来数据检索不便.针对上述问题,本文提出了一种支持策略隐藏的可搜索属性加密方案,结合密文策略属性加密与公钥可搜索加密的优势,确保云辅助(cloud-assisted Internet of Medical Things,IoMT)系统中共享数据的机密性,实现了敏感数据的细粒度访问控制并支持关键字搜索.并且,利用在线/离线加密和外包解密等方法降低了资源受限设备的计算开销,使得密文策略的属性加密方案可以在云辅助IoMT系统中实施.同时,引入策略隐藏技术,将属性加密访问策略中的属性值隐藏于密文中,防止数据拥有者的隐私泄露.在安全性方面,证明本方案的密文信息在选定访问结构和选择明文攻击下具有不可区分性,以及陷门信息在选择关键字攻击下具有不可区分性.最后,利用JPBC(Javapairing-based cryptography)密码库对本方案与其他相关方案在功能特性、通信开销和计算开销等方面进行对比,结果表明本方案在密钥生成和加密阶段计算效率更高且存储开销更低.