期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
环LWE上高效的多密钥全同态加密方案 被引量:7
1
作者 车小亮 周昊楠 +3 位作者 杨晓元 周潭平 刘龙飞 李宁波 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2021年第1期87-95,共9页
基于RLWE问题的BGV型多密钥全同态加密方案具有较大的密文量和密钥量,且生成计算密钥的过程复杂,致使同态运算效率较低。针对该问题,提出了一种密钥量小、计算密钥生成效率高的BGV型多密钥全同态加密方案。首先,通过改进密文的扩展形式... 基于RLWE问题的BGV型多密钥全同态加密方案具有较大的密文量和密钥量,且生成计算密钥的过程复杂,致使同态运算效率较低。针对该问题,提出了一种密钥量小、计算密钥生成效率高的BGV型多密钥全同态加密方案。首先,通过改进密文的扩展形式,优化了计算密钥的生成算法,提高了计算密钥的生成效率;其次,利用低位比特丢弃技术,减小了计算密钥生成算法中的计算冗余,降低了计算开销;最后,根据优化的算法,结合模交换技术和密钥交换技术,构造了一种高效的层级BGV型多密钥全同态加密方案。相比于现有的层级BGV型多密钥全同态加密方案,新方案在满足IND-CPA安全的条件下,简化了计算密钥生成过程,降低了存储和计算开销,且同态运算过程中产生的噪声值较小,运算效率较高。 展开更多
关键词 全同态加 文扩展算法 计算密钥 交换 混合同态乘法
在线阅读 下载PDF
一种适用于Ad hoc空间网络的DPSKC密钥管理方案
2
作者 王松 俞能海 郝卓 《解放军理工大学学报(自然科学版)》 EI 北大核心 2009年第3期223-227,共5页
减少为Ad hoc空间网络中新成员分发子密钥的处理时延,防止组内成员的攻击及将组内成员的子密钥泄漏给新成员。针对Ad hoc空间网络的特点,提出了一种基于椭圆曲线密码学的新型Ad hoc空间网络密钥管理方案DPSKC。设计了分布式环境下的并... 减少为Ad hoc空间网络中新成员分发子密钥的处理时延,防止组内成员的攻击及将组内成员的子密钥泄漏给新成员。针对Ad hoc空间网络的特点,提出了一种基于椭圆曲线密码学的新型Ad hoc空间网络密钥管理方案DPSKC。设计了分布式环境下的并行子密钥计算技术和保密因子的分组传输技术,前者减少了为新成员分发子密钥的处理时延,后者可以防止组内成员的攻击以及将组内成员的子密钥泄漏给新成员。新方案在子密钥分发时延、安全性、计算和存储开销方面具有良好的性能。 展开更多
关键词 AD hoc空间网络 分布式并行子计算方案 分组传输
在线阅读 下载PDF
Attribute Based DRM Scheme with Dynamic Usage Control in Cloud Computing 被引量:3
3
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第4期50-63,共14页
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in... In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient. 展开更多
关键词 digital rights management cloud computing usage control attribute-based encryption homomorphic encryption
在线阅读 下载PDF
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
4
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua... The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 展开更多
关键词 ergodic matrix tensor problem resist quantum key exchange protocol ENCRYPTION
在线阅读 下载PDF
Securing Patient-Centric Personal Health Records Sharing System in Cloud Computing
5
作者 CHEN Danwei CHEN Linling +3 位作者 FAN Xiaowei HE Liwen PAN Su Hu Ruoxiang 《China Communications》 SCIE CSCD 2014年第A01期121-127,共7页
Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a n... Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus on the multiple data owner scenario, and divide the users in the system into multiple security domains that greatly reduce the key management complexity for owners and users. A high degree of patient privacy is guaranteed by exploiting hierarchical and multi- authority attribute-sets based encryption (HM- ASBE). Our system not only supports compound attributes due to flexible attribute sets combinations, but also achieves fine-grained access control. Our scheme supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. 展开更多
关键词 personal health records attribute- based encryption data privacy fine-grained access control
在线阅读 下载PDF
A Survey on Device-Independent Quantum Communications 被引量:4
6
作者 黄靖正 银振强 +4 位作者 陈巍 王双 李宏伟 郭光灿 韩正甫 《China Communications》 SCIE CSCD 2013年第2期1-10,共10页
Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of research... Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of researchers from diverse fields such as physics, mathematics, and computer science. We review the background and current state of quantum communications technology, with an emphasis on quantum key distribution, quantum random number generation, and a relatively hot topic: device independent protocols. 展开更多
关键词 quantum communications de-vice-independent quantum key distribution
在线阅读 下载PDF
Distributed Key Management Scheme against Sybil Attacks of Wireless Sensor Network
7
作者 Xu Junfeng Wang Yongjian 《China Communications》 SCIE CSCD 2012年第5期55-63,共9页
Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil a... Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil attacks, a new key distribution scheme for wireless sensor networks is presented. In this scheme, the key inforrmtion and node ID are associated, and then the attacker is dif-ficult to forge identity ID and the key inforrmtion corresponding to ID can not be forged. This scheme can use low-power to resist the Syhil attack and give full play to the resource advantages of the cluster head. The computing, storage and corrn^ni- cation is rminly undertaken by the cluster head o- verhead to achieve the lowest energy consumption and resist against nodes capture attack. Theoretical analysis and experimental results show that com- pared with the traditional scheme presented in Ref. [14], the capture rate of general nodes of cluster re-duces 40%, and the capture rate of cluster heads reduces 50%. So the scheme presented in this pa-per can improve resilience against nodes capture at- tack and reduce node power consumption. 展开更多
关键词 WSN sybil attack key distribution CLUSTER
在线阅读 下载PDF
A Symmetric Key Exchange Protocol Bsaed on Virtual S-Box 被引量:2
8
作者 YIN Yifeng GAN Yong WEN Heyu LI Tianbao 《China Communications》 SCIE CSCD 2014年第A02期46-52,共7页
Based on the theory of polymorphic virtual S-box, the paper presents a symmetric key exchange protocol to solve the problem of session keys delete shared in the computational complexity temporary trading scenario. Bot... Based on the theory of polymorphic virtual S-box, the paper presents a symmetric key exchange protocol to solve the problem of session keys delete shared in the computational complexity temporary trading scenario. Both parties jointly construct a highly nonlinear SPN core algorithm. The paper the connotation of polymorphic cipher theory, making use of the method of self-compiler based expansion factor to collect random parameter sets held by each of the parties containing its own information 5-tuple private keys array Kpa[5] and Kpb[5].The more efficient polymorphism virtual S-box is constructed. The method of secret split for the public key cryptography features can be implemented by symmetry cipher system. The research results will provide a theoretical basis to solve the key exchange problems for short- term communications partner based on symmetric cryptography. 展开更多
关键词 virtual S-box the virtual iterativefunction (VIF) secrecy sub-systems
在线阅读 下载PDF
Key Exchange Protocol Based on Tensor Decomposition Problem 被引量:1
9
作者 MAO Shaowu ZHANG Huanguo +3 位作者 WU Wanqing ZHANG Pei SONG Jun LIU Jinhui 《China Communications》 SCIE CSCD 2016年第3期174-183,共10页
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing.... The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols. 展开更多
关键词 key exchange resistant quantum hard problem tensor decomposition
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部