期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
格密码技术近期研究进展 被引量:10
1
作者 张平原 蒋瀚 +3 位作者 蔡杰 王晨光 郑志华 徐秋亮 《计算机研究与发展》 EI CSCD 北大核心 2017年第10期2121-2129,共9页
格理论最初是作为一种密码分析工具被引入到密码学中的,用于分析背包密码体制、RSA密码体制等.在1997年,Ajtai和Dwork第一次构造了一个基于格的密码体制Ajtai-Dwork,随后在1998年出现了NTRU密码体制.当时基于整数分解及离散对数的公钥... 格理论最初是作为一种密码分析工具被引入到密码学中的,用于分析背包密码体制、RSA密码体制等.在1997年,Ajtai和Dwork第一次构造了一个基于格的密码体制Ajtai-Dwork,随后在1998年出现了NTRU密码体制.当时基于整数分解及离散对数的公钥密码体制是主流,格密码一直没有得到足够的重视.直到2009年,Gentry基于格密码构造了首个全同态密码方案,格密码才得到了广泛的发展.2015年,Peikert在"格密码十年"一文中,对之前格密码的发展做了一个很好的总结.同在2015年,美国国家标准和技术研究院(National Institute of Standards and Technology,NIST)发布了"后量子密码报告",报告指出:由于量子计算技术的飞速发展,现有的公钥密码标准在量子计算下将不再安全.同时NIST在全球范围内展开了后量子密码算法标准的征集工作.格密码作为一类经典的抗量子密码,公认是后量子密码算法标准最有力的竞争者,近2年得到了飞速的发展,出现了许多优秀的研究成果.从基于格的零知识证明、格加密、格签名以及格密钥交换4个方面,对近2年格密码研究进行了总结,并对格密码的发展趋势进行了展望. 展开更多
关键词 密码 基于的零知识证明 格加密 签名 密钥交换
下载PDF
隐私保护近邻检测研究
2
作者 李增鹏 王思旸 王梅 《信息网络安全》 CSCD 北大核心 2024年第6期817-830,共14页
随着移动计算和物联网等新兴技术的飞速发展,基于位置的服务(Location Based Service,LBS)在人们日常生活中扮演着愈发重要的角色。许多应用(如移动交友)通过LBS获取、收集用户的精确位置,并通过执行距离计算来实现近距离用户发现等功... 随着移动计算和物联网等新兴技术的飞速发展,基于位置的服务(Location Based Service,LBS)在人们日常生活中扮演着愈发重要的角色。许多应用(如移动交友)通过LBS获取、收集用户的精确位置,并通过执行距离计算来实现近距离用户发现等功能。然而,LBS在为用户带来便利的同时,也使其面临着泄露隐私位置信息的风险。目前,大多数LBS应用均以明文形式记录用户精确位置,极易泄露用户的位置和移动模式等信息。此外,现有的能够保护用户隐私位置数据的研究工作存在一些缺陷,如通信开销高、通信时间长或计算安全性不足等。因此,文章提出一种保护用户位置隐私的高效近邻检测方法,该方法基于B/FV(Brakerski/Fan-Vercauteren)同态加密构造优化的圆范围内的隐私保护近邻检测协议。与现有的工作相比,文章方案使用基于格的加密,且具有较优的通信性能。此外,文章实现了基于B/FV同态加密的方案原型系统,并给出在具有高隐私保护要求和低算术速度限制的场景中的潜在应用,通过对该原型系统的实验结果表明,该方案在实际部署应用中具有广阔的应用前景。 展开更多
关键词 基于位置的服务 隐私保护近邻检测 同态加密 基于加密
下载PDF
基于GPU的错误学习加密算法
3
作者 马文隽 陈丹 《电子科技》 2013年第4期93-95,共3页
基于格的加密算法是可以抵抗量子攻击的后量子密码的一个重要候选,而基于错误学习的加密算法是具有强安全性证明的格加密算法。文中在GPU和CPU上实现了多比特错误学习加密算法。实验结果表明,除了在GPU得到了硬件加速比外,基于错误学习... 基于格的加密算法是可以抵抗量子攻击的后量子密码的一个重要候选,而基于错误学习的加密算法是具有强安全性证明的格加密算法。文中在GPU和CPU上实现了多比特错误学习加密算法。实验结果表明,除了在GPU得到了硬件加速比外,基于错误学习的加密算法的加解密时间结果使得该算法具有更好的实用性。 展开更多
关键词 错误学习 格加密 后量子密码 GPU
下载PDF
一种基于双勾函数的数据加密算法研究 被引量:4
4
作者 李宏伟 潘志远 黄继杰 《计算机技术与发展》 2022年第6期120-125,共6页
在量子计算及保密通信的背景下,传统的对称和非对称加密技术及应用需要继续深化研究。该文针对双勾曲线函数的特性进行了对称、非对称和格加密技术的研究,并探讨了其应用的场合。首先通过对其渐近线做垂直线以及线上点的X轴平行线,将明... 在量子计算及保密通信的背景下,传统的对称和非对称加密技术及应用需要继续深化研究。该文针对双勾曲线函数的特性进行了对称、非对称和格加密技术的研究,并探讨了其应用的场合。首先通过对其渐近线做垂直线以及线上点的X轴平行线,将明文数值对应为交替所做的垂直线和平行线的次数,用最后一次交点的X或Y值作为对应的密文。然后基于双勾函数的两个特征参数以及基点的选取,设计了对称加密算法和相应的非对称加密算法(DHC);并选择任意条双勾曲线函数作为格基来构成非线性的格空间,由此探讨了基于双勾曲线函数的格加密可能性。最后通过在PC工作站上的仿真测试,表明基于双勾函数的数据加密算法比椭圆曲线加密算法(ECC)快了好几百倍;进而通过将DHC算法应用到电力云培训仿真中,确保了云培训考核的安全性,表明了基于双勾函数的数据加密算法能很好地适用于快速加密的场合。 展开更多
关键词 双勾函数 对称加密 非对称加密 曲线加密 格加密
下载PDF
一种基于格的隐私保护聚类数据挖掘方法 被引量:26
5
作者 崔一辉 宋伟 +2 位作者 王占兵 史成良 程芳权 《软件学报》 EI CSCD 北大核心 2017年第9期2293-2308,共16页
由于云计算的诸多优势,用户倾向于将数据挖掘和数据分析等业务外包到专业的云服务提供商,然而随之而来的是用户的隐私不能得到保证.目前,众多学者关注云环境下敏感数据存储的隐私保护问题,而隐私保护数据分析的相关研究还比较少.但是如... 由于云计算的诸多优势,用户倾向于将数据挖掘和数据分析等业务外包到专业的云服务提供商,然而随之而来的是用户的隐私不能得到保证.目前,众多学者关注云环境下敏感数据存储的隐私保护问题,而隐私保护数据分析的相关研究还比较少.但是如果仅仅为了保护数据隐私,而不对大数据进行挖掘分析,大数据也就失去了其潜在的巨大价值.提出了一种云计算环境下基于格的隐私保护数据挖掘方法,利用格加密构建隐私数据的安全同态运算方法,并且在此基础上实现了支持隐私保护的云端密文数据聚类分析数据挖掘服务.为保护用户数据隐私,用户将数据加密之后发布给云服务提供商,云服务提供商利用基于格的同态加密算法实现隐私保护的k-means、隐私保护层次聚类以及隐私保护DBSCAN数据挖掘服务,但云服务提供商并不能直接访问用户数据破坏用户隐私.与现有的隐私数据发布方法相比,隐私数据发布基于格的最接近向量困难问题(CVP)和最短向量困难问题(SVP)具有很高的安全性.同时,有效保持了密文数据间距离的精确性.与现有研究相比,挖掘结果也具有更高的精确性和可用性.对方法的安全性进行了理论分析,并设计实验对提出的隐私保护数据挖掘方法效率进行评估,实验结果表明,提出的基于格的隐私保护数据挖掘算法与现有的方法相比具有更高的数据分析精确性和计算效率. 展开更多
关键词 数据挖掘 隐私保护 隐私保护的数据挖掘 基于加密
下载PDF
基于BRLWE的物联网后量子加密技术研究 被引量:2
6
作者 高艺恬 陈立全 +2 位作者 屠天扬 高原 陈芊叶 《网络与信息安全学报》 2022年第5期140-149,共10页
随着量子计算机的发展,现有的公钥加密体系无法保障物联网通信的安全性。后量子加密算法所基于的数学难题目前还不能被量子计算机攻破,因此具备良好的抗量子安全性,尤其是基于格的公钥密码体制,有望成为下一代公钥加密体系的主流。然而... 随着量子计算机的发展,现有的公钥加密体系无法保障物联网通信的安全性。后量子加密算法所基于的数学难题目前还不能被量子计算机攻破,因此具备良好的抗量子安全性,尤其是基于格的公钥密码体制,有望成为下一代公钥加密体系的主流。然而,后量子加密算法存在计算量大、存储空间大等问题,如果将其直接应用于物联网终端的轻量级设备中,会降低物联网环境的通信效率。为了更好地保护物联网通信安全,保障物联网通信效率,提出了Sym-BRLWE(symmetrical binary RLWE)后量子加密算法。该算法在基于二进制环上容错学习(BRLWE,binary ring-learning with errors)问题的加密算法的基础上,改进了离散均匀分布上的随机数选取方式和多项式乘法的计算方式,从而满足物联网通信的效率要求,增加了加密安全性防护性措施以保证算法在取得高效率的同时具有高安全性,更加适应于物联网轻量设备。安全性分析表明,Sym-BRLWE加密算法具有高安全性,从理论上能够抵抗格攻击、时序攻击、简单能量分析和差分能量分析;仿真实验结果表明,Sym-BRLWE加密算法具有通信效率高的优势,加密解密效率高且密钥尺寸小,在模拟8 bit微型设备的二进制运算环境下,选择140 bit的抗量子安全级别参数时,相较于其他已有的基于BRLWE的加密算法,同等加密条件下Sym-BRLWE加密算法能够在加密总时间上减少30%~40%。 展开更多
关键词 后量子密码 物联网 公钥加密 基于加密 环上容错学习问题
下载PDF
Finite element numerical simulation of 2.5D direct current method based on mesh refinement and recoarsement 被引量:3
7
作者 张钱江 戴世坤 +3 位作者 陈龙伟 强建科 李昆 赵东东 《Applied Geophysics》 SCIE CSCD 2016年第2期257-266,416,417,共12页
To deal with the problem of low computational precision at the nodes near the source and satisfy the requirements for computational efficiency in inversion imaging and finite-element numerical simulations of the direc... To deal with the problem of low computational precision at the nodes near the source and satisfy the requirements for computational efficiency in inversion imaging and finite-element numerical simulations of the direct current method, we propose a new mesh refinement and recoarsement method for a two-dimensional point source. We introduce the mesh refinement and mesh recoarsement into the traditional structured mesh subdivision. By refining the horizontal grids, the singularity owing to the point source is minimized and the topography is simulated. By recoarsening the horizontal grids, the number of grid cells is reduced significantly and computational efficiency is improved. Model tests show that the proposed method solves the singularity problem and reduces the number of grid cells by 80% compared to the uniform grid refinement. 展开更多
关键词 Direct current resistivity method mesh refinement and recoarsement finiteelement method
下载PDF
MESH FREE ADAPTIVE ALGORITHM FOR SOLVING EULER EQUATIONS ON STRUCTURED GRID POINTS 被引量:1
8
作者 马志华 陈红全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2005年第4期271-275,共5页
A complete mesh free adaptive algorithm (MFAA), with solution adaptation and geometric adaptation, is developed to improve the resolution of flow features and to replace traditional global refinement techniques in s... A complete mesh free adaptive algorithm (MFAA), with solution adaptation and geometric adaptation, is developed to improve the resolution of flow features and to replace traditional global refinement techniques in structured grids. Unnecessary redundant points and elements are avoided by using the mesh free local clouds refinement technology in shock influencing regions and regions near large curvature places on the boundary. Inviscid compressible flows over NACA0012 and RAE2822 airfoils are computed. Finally numerical results validate the accuracy of the above method. 展开更多
关键词 mesh free adaptive algorithm local refinement Euler equations
下载PDF
抗量子密码学综述 被引量:3
9
作者 巫光福 江林伟 《长江信息通信》 2021年第7期55-60,共6页
现今社会的发展,无论是在医疗、科学研究还电子商务等众多领域中,加密系统都扮演着非常重要的角色。然而由于量子计算机的快速发展,对当前网络协议的安全性产生了威胁[1]。已经有科学家提出了一些理论可行的使用量子计算机能够在很短的... 现今社会的发展,无论是在医疗、科学研究还电子商务等众多领域中,加密系统都扮演着非常重要的角色。然而由于量子计算机的快速发展,对当前网络协议的安全性产生了威胁[1]。已经有科学家提出了一些理论可行的使用量子计算机能够在很短的时间内就能破解目前大部分我们正在使用的加密算法[2-3],因此迫切需要设计更强大的具有抵抗量子计算机攻击的加密系统。在过去的几十年里,人们对抗量子密码学以及相关的研究领域与主题进行了大量的研究[4-7],然而一直没有确定安全可靠的抗量子算法标准。文章以NIST(美国国家标准与技术研究所)抗量子密码算法征集计划所征集到的一些的抗量子密码算法为例,对不同的抗量子公钥加密算法和抗量子签名方案进行概述。 展开更多
关键词 抗量子密码学 基于加密体制 基于编码的加密体制 基于Hash的加密体制 基于多变量多项式的加密体制
下载PDF
A Parallel Algorithm for Adaptive Local Refinement of Tetrahedral Meshes Using Bisection 被引量:31
10
作者 Lin-Bo Zhang 《Numerical Mathematics(Theory,Methods and Applications)》 SCIE 2009年第1期65-89,共25页
Local mesh refinement is one of the key steps in the implementations of adaptive finite element methods. This paper presents a parallel algorithm for distributed memory parallel computers for adaptive local refinement... Local mesh refinement is one of the key steps in the implementations of adaptive finite element methods. This paper presents a parallel algorithm for distributed memory parallel computers for adaptive local refinement of tetrahedral meshes using bisection. This algorithm is used in PHG, Parallel Hierarchical Grid Chttp://lsec. cc. ac. cn/phg/), a toolbox under active development for parallel adaptive finite element solutions of partial differential equations. The algorithm proposed is characterized by allowing simukaneous refinement of submeshes to arbitrary levels before synchronization between submeshes and without the need of a central coordinator process for managing new vertices. Using the concept of canonical refinement, a simple proof of the independence of the resulting mesh on the mesh partitioning is given, which is useful in better understanding the behaviour of the biseetioning refinement procedure. 展开更多
关键词 Adaptive refinement BISECTION tetrahedral mesh parallel algorithm MPI.
下载PDF
Identity-Based Encryption with Keyword Search from Lattice Assumption 被引量:6
11
作者 Xiaojun Zhang Chunxiang Xu +1 位作者 Liming Mu Jie Zhao 《China Communications》 SCIE CSCD 2018年第4期164-178,共15页
Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor... Public key encryption scheme with keyword search (PEKS) enables us to search the encrypted data in a cloud server with a keyword, and no one can obtain any infor- mation about the encrypted data without the trapdoor corresponding to the keyword. The PEKS is useful to keep the management of large data storages secure such as those in a cloud. In this paper, to protect against quantum computer attacks, we present a lattice-based identity-based encryption scheme with key- word search. We have proved that our scheme can achieve ciphertext indistinguishability in the random oracle model, and our scheme can also achieve trapdoor security. In particular, our scheme can designate a unique tester to test and return the search results, therefore it does not need a secure channel. To the best of our knowledge, our scheme is the first iden- tity-based encryption scheme with keyword search from lattice assumption. 展开更多
关键词 public key encryption keywordsearch ciphertext indistinguishability latticeassumption.
下载PDF
Formal Verification in 3oux Tripartite Diffie-Hellman Protocol
12
作者 祝烈煌 张子剑 +2 位作者 王峰 郭聪 袁彩霞 《China Communications》 SCIE CSCD 2012年第3期153-163,共11页
Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which d... Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which did not sacrifice the soundness of cryptography.Recently,Canetti and Herzog have proposed Universally Composable Symbolic Analysis(UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes.This scheme can analyze the protocols automatically and guarantee the soundness of cryptography.Therefore,we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman(JTDH) using UCSA.Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography. 展开更多
关键词 UCSA computationally sound JTDH group key exchange protocol
下载PDF
Improved Prefix Based Format-Preserving Encryption for Chinese Names 被引量:2
13
作者 Junwei Zou Peng Wang Hong Luo 《China Communications》 SCIE CSCD 2018年第3期78-90,共13页
In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, wh... In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, which usually contain some sensitive information of personal or analysis, will result in leakage of user privacy. Therefore, it is becoming increasingly important to protect privacy information in data publishing. In this paper, we focus on the multi-type self-identified format-preserving encryption. First, we introduce a multi-type self-identified format-preserving encryption system and discuss the encryption of various types of data in this system. Then, for the format preserving encryption(FPE) about Chinese name, we study from the encryption model construction and basic encryption scheme. The format-preserving encryption model about Chinese name is constructed and the concept of the name library is presented. Based on this, it is used to not only limit the message space to reduce complexity, but also ensure the cipher in accordance with the Chinese naming habits. In addition, according to the encryption and decryption model, format-preserving encryption process of Chinese name is designed. In order to add new names, the algorithm of name space expansion is proposed. Based on the Prefix, this paper put forward an algorithm named Cycle-Prefix, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption. Compared with the traditional Prefix algorithm, experiments show that Cycle-Prefix can not only complete the task of FPE for Chinese name, but also encrypt same plain text into different ciphers under the premise of similar efficiency with Prefix. 展开更多
关键词 Chinese name format-preservingencryption name library encryption model
下载PDF
Constructions of Cheating Immune Secret Sharing Functions 被引量:1
14
作者 卓泽朋 Zhang Weiguo Xiao Guozhen 《High Technology Letters》 EI CAS 2011年第1期102-105,共4页
Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanc... Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed. 展开更多
关键词 secret sharing Boolean function correlation immune strict avalanche criterion SAC) resilient function
下载PDF
A Self-synchronizing Stream Encryption Scheme Based on One-Dimensional Coupled Map Lattices
15
作者 MA Hui ZHU Kai-En CHEN Tian-Lun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第4期679-684,共6页
We present a self-synchronizing stream encryption scheme based on one-dimensional coupled map lattices which is introduced as a model with the essential features of spatiotemporal chaos, and of great complexity and di... We present a self-synchronizing stream encryption scheme based on one-dimensional coupled map lattices which is introduced as a model with the essential features of spatiotemporal chaos, and of great complexity and diffusion capability of the little disturbance in the initial condition. To evaluate the scheme, a series of statistical tests are employed, and the results show good random-look nature of the ciphertext. Furthermore, we apply our algorithm to encrypt a grey-scale image to show the key sensitivity. 展开更多
关键词 self-synchronizing stream ENCRYPTION one-dimensional coupled map lattices
下载PDF
A fast mapping method to evaluate immersed boundary hydrodynamic forces
16
作者 Shi-Jun Li Jun-Hua Pan Ming-Jiu Ni 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2022年第8期49-57,共9页
Immersed boundary method is a crucial method to deal with particle suspension flow.Particle shapes involved in such flow are usually simple geometry,such as sphere and ellipsoid,which can be conveniently represented b... Immersed boundary method is a crucial method to deal with particle suspension flow.Particle shapes involved in such flow are usually simple geometry,such as sphere and ellipsoid,which can be conveniently represented by the triangular surface grid.When the number of particles and resolution of the surface grid increase,calculating the hydrodynamic force on the particle surface through integration can be time-consuming.Hence,the present paper establishes a fast mapping method to evaluate immersed boundary hydrodynamic force.Firstly,the particle surface grid is generated by an initial triangular element grid.Subsequently,the initial surface grid is refined by bisection refinement to the desired resolution.The final step is to find the triangular element index on the particle triangular surface grid,which contains the projective point.Test cases show that the present mapping algorithm has good accuracy and efficiency for calculating hydrodynamic forces of particles. 展开更多
关键词 Hydrodynamic force Immersed boundary method Particle suspensions Mapping algorithm
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部