期刊文献+
共找到1,256篇文章
< 1 2 63 >
每页显示 20 50 100
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
1
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
在线阅读 下载PDF
MAVP-FE:Multi-Authority Vector Policy Functional Encryption with Efficient Encryption and Decryption 被引量:1
2
作者 WANG Jing HUANG Chuanhe +3 位作者 YANG Kan WANG Jinhai WANG Xiaomao CHEN Xi 《China Communications》 SCIE CSCD 2015年第6期126-140,共15页
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte... In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice. 展开更多
关键词 cloud storage data access control functional encryption hidden access policy efficiency
在线阅读 下载PDF
A Blockchain-Based Credible and Secure Education Experience Data Management Scheme Supporting for Searchable Encryption 被引量:5
3
作者 Zihan Li Zhaofeng Ma 《China Communications》 SCIE CSCD 2021年第6期172-183,共12页
With the in-depth application of new technologies such as big data in education fields,the storage and sharing model of student education records data still faces many challenges in terms of privacy protection and eff... With the in-depth application of new technologies such as big data in education fields,the storage and sharing model of student education records data still faces many challenges in terms of privacy protection and efficient transmission.In this paper,we propose a data security storage and sharing scheme based on consortium blockchain,which is a credible search scheme without verification.In our scheme,the implementation of data security storage is using the blockchain and storage server together.In detail,the smart contract provides protection for data keywords,the storage server stores data after data masking,and the blockchain ensures the traceability of query transactions.The need for precise privacy data is achieved by constructing a dictionary.Cryptographic techniques such as AES and RSA are used for encrypted storage of data,keywords,and digital signatures.Security analysis and performance evaluation shows that the availability,high efficiency,and privacy-preserving can be achieved.Meanwhile,this scheme has better robustness compared to other educational records data sharing models. 展开更多
关键词 blockchain big data data transmission smart contract searchable encryption
在线阅读 下载PDF
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
4
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 data encryption mobile phone cloud storage pseudo-random number
在线阅读 下载PDF
Data encryption based on a 9D complex chaotic system with quaternion for smart grid
5
作者 张芳芳 黄哲 +3 位作者 寇磊 李扬 曹茂永 马凤英 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第1期217-226,共10页
With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large a... With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large amount of sensitive information, and the requirements for data security and real-time transmission are gradually improved. In this paper, a new 9-dimensional(9D) complex chaotic system with quaternion is proposed for the encryption of smart grid data. Firstly, we present the mathematical model of the system, and analyze its attractors, bifurcation diagram, complexity,and 0–1 test. Secondly, the pseudo-random sequences are generated by the new chaotic system to encrypt power data.Finally, the proposed encryption algorithm is verified with power data and images in the smart grid, which can ensure the encryption security and real time. The verification results show that the proposed encryption scheme is technically feasible and available for power data and image encryption in smart grid. 展开更多
关键词 9-dimensional complex chaotic system data encryption QUATERNION smart grid REAL-TIME
在线阅读 下载PDF
Digital image encryption with chaotic map lattices 被引量:8
6
作者 孙福艳 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期132-138,共7页
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o... This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency. 展开更多
关键词 image encryption image decryption chaotic map lattice CRYPTOGRAPHY spatiotemporal chaotic system
在线阅读 下载PDF
A Joint Encryption and Error Correction Method Used in Satellite Communications 被引量:3
7
作者 LINing LIN Kanfeng LIN Wenliang DENG Zhongliang 《China Communications》 SCIE CSCD 2014年第3期70-79,共10页
Due to the ubiquitous open air links and complex electromagnetic environment in the satellite communications,how to ensure the security and reliability of the information through the satellite communications is an urg... Due to the ubiquitous open air links and complex electromagnetic environment in the satellite communications,how to ensure the security and reliability of the information through the satellite communications is an urgent problem.This paper combines the AES(Advanced Encryption Standard) with LDPC(Low Density Parity Check Code) to design a secure and reliable error correction method — SEEC(Satellite Encryption and Error Correction).This method selects the LDPC codes,which is suitable for satellite communications,and uses the AES round key to control the encoding process,at the same time,proposes a new algorithm of round key generation.Based on a fairly good property in error correction in satellite communications,the method improves the security of the system,achieves a shorter key size,and then makes the key management easier.Eventually,the method shows a great error correction capability and encryption effect by the MATLAB simulation. 展开更多
关键词 data encryption error correctingcipher advanced encryption standard LDPCchannel coding satellite communications
在线阅读 下载PDF
An Efficient and Secure Aggregation Encryption Scheme in Edge Computing 被引量:2
8
作者 Junhua Wu Xiaofei Sheng +2 位作者 Guangshun Li Kan Yu Junke Liu 《China Communications》 SCIE CSCD 2022年第3期245-257,共13页
Edge computing is a highly virtualized paradigm that can services the Internet of Things(Io T)devices more efficiently.It is a non-trivial extension of cloud computing,which can not only meet the big data processing r... Edge computing is a highly virtualized paradigm that can services the Internet of Things(Io T)devices more efficiently.It is a non-trivial extension of cloud computing,which can not only meet the big data processing requirements of cloud computing,but also collect and analyze distributed data.However,it inherits many security and privacy challenges of cloud computing,such as:authentication and access control.To address these problem,we proposed a new efficient privacy-preserving aggregation scheme for edge computing.Our scheme consists of two steps.First,we divided the data of the end users with the Simulated Annealing Module Partition(SAMP)algorithm.And then,the end sensors and edge nodes performed respectively differential aggregation mechanism with the Differential Aggregation Encryption(DAE)algorithm which can make noise interference and encryption algorithm with trusted authority(TA).Experiment results show that the DAE can preserve user privacy,and has significantly less computation and communication overhead than existing approaches. 展开更多
关键词 Edge computing data aggregation encryption Simulated annealing
在线阅读 下载PDF
Improving Security and Sharing in Online Social Efficiency for Encrypted Data Networks 被引量:2
9
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第3期104-117,共14页
Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we p... Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we propose a secure data sharing scheme in 0SNs based on ciphertext-policy attribute- based proxy re-encryption and secret sharing. In order to protect users' sensitive data, our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider. Our scheme presents a multiparty access control model, which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy. Further, we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider. We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext. Moreover, our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy. The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs. 展开更多
关键词 data sharing online socialnetworks multiparty access control attribute-based encryption attribute revocation
在线阅读 下载PDF
FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
10
作者 Fei Yu Zinan Zhang +3 位作者 Hui Shen Yuanyuan Huang Shuo Cai Sichun Du 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第2期109-118,共10页
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and d... A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed,and implemented on FPGA.Then,a new pseudo-random number generator(PRNG)based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T). 展开更多
关键词 memristive Hopfield neural network(MHNN) pseudo-random number generator(PRNG) FPGA image encryption decryption system
在线阅读 下载PDF
Air target recognition method against ISRJ for radio frequency proximity sensors using chaotic stream encryption
11
作者 Jian-feng Li Jian Dai +2 位作者 Xin-hong Hao Xiao-peng Yan Xin-wei Wang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第10期267-279,共13页
The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article propose... The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article proposes a recognition method for RFPSs to identify the false targets caused by ISRJ.The proposed method is realized by assigning a unique identity(ID)to each RFPS,and each ID is a periodically and chaotically encrypted in every pulse period.The processing technique of the received signal is divided into ranging and ID decryption.In the ranging part,a high-resolution range profile(HRRP)can be obtained by performing pulse compression with the binary chaotic sequences.To suppress the noise,the singular value decomposition(SVD)is applied in the preprocessing.Regarding ID decryption,targets and ISRJ can be recognized through the encryption and decryption processes,which are controlled by random keys.An adaptability analysis conducted in terms of the peak-to-side lobe ratio(PSLR)and bit error rate(BER)indicates that the proposed method performs well within a 70-k Hz Doppler shift.A simulation and experimental results show that the proposed method achieves extremely stable target and ISRJ recognition accuracies at different signal-to-noise ratios(SNRs)and jamming-to-signal ratios(JSRs). 展开更多
关键词 Interrupted-sampling repeater jamming(ISRJ) Radio frequency proximity sensors(RFPS) Chaotic stream encryption Air target recognition Identity(ID)decryption
在线阅读 下载PDF
A Privacy Protection Scheme for Verifiable Data Element Circulation Based on Fully Homomorphic Encryption
12
作者 Song Jiyuan Gao Hongmin +3 位作者 Ye Keke Shen Yushi Ma Zhaofeng Feng Chengzhi 《China Communications》 2025年第4期223-235,共13页
With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in p... With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in privacy protection and data verification,especially for sensitive data.Existing schemes often suffer from inefficiency and high overhead.We propose a privacy protection scheme using BGV homomorphic encryption and Pedersen Secret Sharing.This scheme enables secure computation on encrypted data,with Pedersen sharding and verifying the private key,ensuring data consistency and immutability.The blockchain framework manages key shards,verifies secrets,and aids security auditing.This approach allows for trusted computation without revealing the underlying data.Preliminary results demonstrate the scheme's feasibility in ensuring data privacy and security,making data available but not visible.This study provides an effective solution for data sharing and privacy protection in blockchain applications. 展开更多
关键词 blockchain technology data element cir-culation data privacy homomorphic encryption se-cret sharing trusted computation
在线阅读 下载PDF
支持模式隐藏的多关键词公钥可搜索加密方案
13
作者 聂旭云 成驰 +4 位作者 耿聪 廖泽宇 焦丽华 陈瑞东 陈大江 《通信学报》 北大核心 2025年第3期131-143,共13页
为了解决现有多用户可搜索加密方案无法隐藏访问模式和搜索模式、抵抗关键词猜测等攻击的问题,提出了一种全新的支持多用户、多关键词搜索的公钥可搜索加密方案。该方案能够在分布式系统中支持多写者/多读者功能,并利用安全比特分解(SBD... 为了解决现有多用户可搜索加密方案无法隐藏访问模式和搜索模式、抵抗关键词猜测等攻击的问题,提出了一种全新的支持多用户、多关键词搜索的公钥可搜索加密方案。该方案能够在分布式系统中支持多写者/多读者功能,并利用安全比特分解(SBD)协议,多密钥隐私保护外包计算(EPOM)和随机引入假阳性的方法,实现对访问模式与搜索模式的隐藏。同时,该方案支持多写者/多读者表示每个用户加密和上传数据,并搜索所有经授权的加密数据。该方案可通过在多个服务器上并行搜索来加速搜索处理,并仅需为所有读者维护一份加密索引。理论分析和实验结果表明,所提方案在满足陷门和密文的不可区分、多类布尔搜索、搜索和访问模式隐私的前提下,执行效率接近同类型的公钥可搜索加密最优方案。 展开更多
关键词 模式隐藏 多关键词 多写者/多读者 公钥可搜索加密 数据共享安全
在线阅读 下载PDF
融合图像识别与地理信息的电力设备送样监测技术
14
作者 刘志伟 宁克 +2 位作者 刘星廷 侯滨 王海旗 《电子设计工程》 2025年第3期106-110,共5页
为提高送样过程的透明度和安全性,防止电力设备遭到非法干扰与损伤,优化送样过程的准确性及质量,文中提出了一种基于图像识别和地理信息的电力设备采样监测技术。该技术采用基于深度学习算法的图像特征提取技术对视频监控进行目标识别,... 为提高送样过程的透明度和安全性,防止电力设备遭到非法干扰与损伤,优化送样过程的准确性及质量,文中提出了一种基于图像识别和地理信息的电力设备采样监测技术。该技术采用基于深度学习算法的图像特征提取技术对视频监控进行目标识别,并通过SAR快速获取目标特征及其相对位置,实现对抽检物体的识别和全流程监控。同时,采用椭圆曲线技术构建基于地理位置信息的视频加密策略,实现了对监控视频的安全保护。以电力设备抽检视频为数据样本进行的验证分析结果表明,所提检测方法的相关指标比同类型方法提升约10%,识别结果均保持在85%以上,可以准确地对抽检全过程进行监测,并能够分析处理抽检过程中的位置变化信息,具有更高的安全性。 展开更多
关键词 电力设备送样 深度学习 图像识别 地理信息 数据加密 椭圆曲线
在线阅读 下载PDF
云计算环境下多模态异构网络数据安全存储方法
15
作者 李晓静 杨秀杰 《现代电子技术》 北大核心 2025年第6期63-67,共5页
为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建... 为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建包括客户端、服务器端、云存储服务插件、元数据存储的私有云存储架构。私有云存储架构采用虚拟化加解密方式,运行基于匿名广播加密的数据加密算法,引入拉格朗日插值方法,利用数据对应的会话密钥实现多模态异构网络数据的安全存储。实验结果表明,所提方法能够高效地存储多模态异构网络数据,数据传输的吞吐量高于3 Mb/s,加解密耗时低,存储的完整性高。 展开更多
关键词 云计算环境 多模态 异构网络 数据安全 存储方法 匿名广播加密 云存储架构
在线阅读 下载PDF
基于改进Blowfish的用户隐私信息存储加密方法
16
作者 刘忠铁 《电子设计工程》 2025年第4期6-9,16,共5页
在用户信息的管理中,由于涉及大量敏感和隐私数据,未经授权的访问将严重威胁用户数据的安全。为此,提出基于改进Blowfish算法的用户隐私信息存储与加密方法。遵循Blowfish算法的改进和优化原则,深入挖掘用户数据中的隐私信息,并设计相... 在用户信息的管理中,由于涉及大量敏感和隐私数据,未经授权的访问将严重威胁用户数据的安全。为此,提出基于改进Blowfish算法的用户隐私信息存储与加密方法。遵循Blowfish算法的改进和优化原则,深入挖掘用户数据中的隐私信息,并设计相应的隐私信息密钥模板。利用这一密钥模板,规划隐私信息的加密策略,构建隐私信息存储机制,确保用户数据的访问和操作受到严格限制。实验结果表明,该方法实现了对特定隐私信息的精细化控制,确保只有授权的数据主机能够访问这些信息,从而有效防止了未授权访问的风险。 展开更多
关键词 改进Blowfish算法 用户隐私信息 存储加密 密钥模板 数据授权
在线阅读 下载PDF
基于多空间数据查询安全共享算法研究
17
作者 谈伙荣 《信息技术》 2025年第1期68-73,79,共7页
针对信息共享的安全性,文中提出一种基于多空间数据的安全共享算法。结合R树和TOP-K方法,对多空间数据进行分割,实现对多个维度的隐私保护,提高数据处理效率;采用RSA算法对数据进行加密和权限控制,防止未经授权的访问和数据泄露;引入拉... 针对信息共享的安全性,文中提出一种基于多空间数据的安全共享算法。结合R树和TOP-K方法,对多空间数据进行分割,实现对多个维度的隐私保护,提高数据处理效率;采用RSA算法对数据进行加密和权限控制,防止未经授权的访问和数据泄露;引入拉普拉斯机制对多空间数据进行加噪处理,以平衡隐私保护和数据准确性。使用K-means算法在Oldenburg数据集和SPE数据集中进行聚类后开展实验,结果显示,该算法在保护隐私的同时,具有较好的查询性能。 展开更多
关键词 多空间数据 隐私保护 加密技术 差分隐私技术 共享算法
在线阅读 下载PDF
基于加密区块链的双创信息交互技术研究
18
作者 程顺达 祝婕 +2 位作者 关胜江 程杰 窦彤 《现代电子技术》 北大核心 2025年第3期92-96,共5页
针对共享双创网络平台数据传输过程中普遍存在隐私性差且安全性较低的问题,文中基于区块链和数据加密技术提出一种信息共享算法。该区块链模型的网络层使用了多台局域网计算机节点,并在数据传输时采用混合加密算法DES⁃ECC,从而使安全性... 针对共享双创网络平台数据传输过程中普遍存在隐私性差且安全性较低的问题,文中基于区块链和数据加密技术提出一种信息共享算法。该区块链模型的网络层使用了多台局域网计算机节点,并在数据传输时采用混合加密算法DES⁃ECC,从而使安全性与加解密效率相比单一加密算法均有所提升。共识机制还通过使用PBFT算法增强了模型的整体鲁棒性。同时,将算法部署在Hadoop分布式存储架构中,以提高数据传输的速度及吞吐量,且利用Namenode容灾机制进一步保证了数据的安全性。实验测试结果表明,所提加密算法的破译难度较高,而加解密时长仅需约1260 ms,其共识机制吞吐量与时延性能也较为理想,可以实现对双创平台中的大数据进行高效、安全、透明的共享与传输。 展开更多
关键词 区块链 DES加密 ECC加密 拜占庭容错机制 HADOOP平台 双创数据共享
在线阅读 下载PDF
基于区块链的电子病历安全高效共享方法
19
作者 谷占新 马利民 +1 位作者 王佳慧 张伟 《信息安全研究》 北大核心 2025年第1期74-80,共7页
针对医疗机构之间共享电子病历所面临的挑战,如隐私泄露风险和低效的检索问题,提出一种基于区块链的电子病历高效加密检索与共享方案.首先,该方案一方面通过在云服务器上存储加密后的电子病历,并在联盟链上实施检索过程,有效地实现了存... 针对医疗机构之间共享电子病历所面临的挑战,如隐私泄露风险和低效的检索问题,提出一种基于区块链的电子病历高效加密检索与共享方案.首先,该方案一方面通过在云服务器上存储加密后的电子病历,并在联盟链上实施检索过程,有效地实现了存储与检索的分离;另一方面加入混淆陷门集合,从而显著降低了关键字猜测攻击的风险.其次,考虑到医疗数据的特殊性,提出一种优化的倒排索引结构,有效解决了处理大量电子病历时的检索效率问题.最后,基于此索引结构,开发了一种密文检索算法,该算法通过结合可搜索加密中的陷门技术和倒排索引中的关键字密文,实现了高效的密文检索.实验结果显示,该方案在实现隐私保护的前提下,成功解决了医疗行业电子病历共享的问题,同时显著提升了系统的运行效率. 展开更多
关键词 区块链 可搜索加密 隐私保护 国密算法 数据共享
在线阅读 下载PDF
基于对比学习和预训练Transformer的流量隐匿数据检测方法
20
作者 何帅 张京超 +3 位作者 徐笛 江帅 郭晓威 付才 《通信学报》 北大核心 2025年第3期221-233,共13页
为解决海量加密流量难表征、恶意行为难感知以及隐私数据归属难识别的问题,提出了一种基于对比学习和预训练Transformer的流量隐匿数据检测方法。考虑加密流量的高度复杂性、非结构化的特点以及传统下游任务的微调方法在加密流量领域的... 为解决海量加密流量难表征、恶意行为难感知以及隐私数据归属难识别的问题,提出了一种基于对比学习和预训练Transformer的流量隐匿数据检测方法。考虑加密流量的高度复杂性、非结构化的特点以及传统下游任务的微调方法在加密流量领域的效果不佳的挑战,数据报文通过提取数据包序列被转换为类似自然语言处理中的词元。然后利用预训练Transformer模型将浅层表征转换为适用于多种加密流量下游任务的通用流量表征。通过将流量中的隐匿数据检测问题转换为相似性分析问题,基于对比学习的思想设计了一种差异性敏感的Transformer模型架构,同时使用样本的正负样本对增强模型对流量差异性的感知能力,并提出使用信息对比估计作为加密流量下游任务微调的损失函数。实验结果表明,所提方法在检测准确率、精确率、召回率以及F1分数等方面优于主流方法。 展开更多
关键词 流量隐匿数据检测 预训练Transformer模型 对比学习 加密流量
在线阅读 下载PDF
上一页 1 2 63 下一页 到第
使用帮助 返回顶部