Showing 241 - 260 results of 378 for search '"Cryptography"', query time: 0.04s Refine Results
  1. 241

    Application of public key infrastructure in telecom operators by Congli WANG, Jinhua WANG, Weijia XUE

    Published 2020-11-01
    “…With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.…”
    Get full text
    Article
  2. 242

    Control research and application of conventional operations without real-time networks by Zhengfeng ZHANG

    Published 2020-01-01
    “…On the basis of researching the timing agreement mechanism and mirror synchronization operation to ob-tain keys under the condition of no network,a logic control method was proposed based on cryptography control,non-real-time virtual communication and computing keys according to agreement,which could be well applied to dynamic authentication and switch operation of intelligent locks or switches without real-time communication net-work coverage.By using the intelligent terminal with the ability of agreed operation,a kind of “control network of cryptography” without real-time communication network was established,which could be used as a useful supple-ment to the IoT technology without communication coverage,as well as a remote object in a fixed location to transfer the right of management or use according to the order of calculation.By using the computing power of the terminal instead of the communication power of the remote end,without the need to build a backstage communication network and the communication expenses during the waiting period.…”
    Get full text
    Article
  3. 243

    Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform by Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU

    Published 2022-12-01
    “…With the development of wireless communication technology and the popularization of intelligent terminals, more and more cryptographic algorithms are applied to IoT devices to ensure the security of communication and data.Among them, the SM2 elliptic curve public key cryptography proposed by the State Cryptography Administration is an elliptic curve public key cryptography algorithm developed domestically, which has the advantages of high security and short key.SM2 has been widely deployed in various communication systems and is used in essential parts such as identity authentication and key negotiation.However, since SM2 involves large integer operations on finite fields, the computational cost is high, and its execution on a low-power embedded platform seriously affects the user experience.Therefore, an efficient implementation scheme of SM2 algorithm for low-power embedded platform was proposed for ARM-m series processors.Specifically, Thumb-2 instruction set was adopted to handle carry and save addressing cycles, basic operations such as modulo addition and sub-traction of large integers were optimized, and the number of available registers on the platform was combined to build efficient basic operations.Besides, based on the short multiplication and accumulation instruction cycle of ARM-m series processors, the implementation of Montgomery multiplication was optimized, and an efficient modular multiplication scheme was designed in combination with the CIOS algorithm.The scheme was no longer limited to Mersenne primes, and greatly improved the speed and flexibility of modular multiplication.Based on the theoretical analysis and experimental test, the window length selection method of the multiple point-scalar multiplication wNAF sliding window method on the embedded platform was given.The experimental test results show that the proposed scheme can effectively improve the computational efficiency of the SM2 algorithm on the resource-constrained low-power embedded platform.Without pre-calculation, the test signature speed can reach 0.204s/time, the signature verification speed is 0.388s/time, the encryption speed is 0.415s/time, and the decryption speed is 0.197s/time.…”
    Get full text
    Article
  4. 244
  5. 245

    Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks by Yang Lu, Jiguo Li

    Published 2014-01-01
    “…As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. …”
    Get full text
    Article
  6. 246

    Pairing Optimizations for Isogeny-Based Cryptosystems by Shiping Cai, Kaizhan Lin, Chang-An Zhao

    Published 2024-01-01
    “…In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. …”
    Get full text
    Article
  7. 247

    Efficient strong privacy protection and transferable attribute-based ticket scheme by Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG

    Published 2022-03-01
    “…To solve the problems of efficiency, flexibility, and privacy protection faced by electronic tickets, an efficient and transferable attribute-based ticket scheme with strong privacy protection was proposed.Firstly, a ticket issuing algorithm based on attribute disclosure was constructed by combining attribute-based credentials and set commitment.Secondly, the structure-preserving signature on equivalence class and dynamic malleable signature were used to reduce the computational complexity of the ticket issuance, and the ticket transfer and ticket verification with constant complexity were realized.In addition, to prevent the possibility of malicious verifiers guessing user information according to the seller’s identity, the scheme not only realized the anonymity of the user, but also realized the anonymity of the seller in the ticket verification for the first time.Finally, the security definition of the scheme was given, and its security was reduced to either well-known complexity cryptography assumptions or the security of proven cryptography primitives.Comparison and experimental results demonstrate that the proposed scheme is flexible and efficient.…”
    Get full text
    Article
  8. 248

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…Cryptography and steganography have similarities in terms of security. …”
    Get full text
    Article
  9. 249

    Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity by Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG

    Published 2015-12-01
    “…Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring automatically,with the actual signer’s personl idnetity easily hided.By in-depth analysis of several attribute-based threshold ring signature schemes proposed by the earlier reseachers,it is concluded that the malicious users with the complementary attributes can conspire to forge a valid signature.In order to compensate for the defect,the proposal first gives the formal definitions of the security characteristics in attribute-based threshold ring signature scheme,such as unforgeability,indistinguishability and anti-collusion attack.Then a new attribute-based alterable threshold ring signature scheme is presented,whose security is proven equivalent to the computational Diffie-Hellman problem.By introducing an random secret parameter in each user’s private key,the proposal can resist the collusion attacks.It is proven that the proposal can satisfy existential unforgeability and anti-collusion against the adaptive chosen message attack in therandom oracle model,and can meet the requirement of indistinguishability among the users with the same attributes.Besides,property analysis shows that the proposal has high efficiency.…”
    Get full text
    Article
  10. 250

    Optimized SM4 Hardware Implementations for Low Area Consumption by Ruolin Zhang, Zejun Xiang, Shasha Zhang, Xiangyong Zeng, Min Song

    Published 2024-01-01
    “…Our designs make SM4 competitive with many ciphers specifically designed for lightweight cryptography.…”
    Get full text
    Article
  11. 251

    Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks by Walter Tiberti, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, Fortunato Santucci

    Published 2020-10-01
    “…In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. …”
    Get full text
    Article
  12. 252
  13. 253

    Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB by Fariz Abid Darmawan, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. Cryptography is used to encrypt files by changing it, while Steganography inserts the file without changing it.for image, there is the branch that can be used to secure it, namely Visual Cryptography secret sharing scheme. …”
    Get full text
    Article
  14. 254

    Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework by Rihab Benaich, Youssef Gahi, Saida El Mendili

    Published 2025-02-01
    “…Findings indicate that this hybrid blockchain model, enhanced with quantum-resistant cryptography and decentralized governance, significantly improves EHR security. …”
    Get full text
    Article
  15. 255

    A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices by Alexander Klimm, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Müller-Glaser, Jürgen Becker

    Published 2011-01-01
    “…Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. …”
    Get full text
    Article
  16. 256

    On the Search for Supersingular Elliptic Curves and Their Applications by Ismel Martinez-Diaz, Rashad Ali, Muhammad Kamran Jamil

    Published 2025-01-01
    “…Elliptic curves with the special quality known as supersingularity have gained much popularity in the rapidly developing field of cryptography. The conventional method of employing random search is quite ineffective in finding these curves. …”
    Get full text
    Article
  17. 257

    Analysis of correspondence property for security protocols by YANG Ming, LUO Jun-zhou

    Published 2006-01-01
    “…Cryptographic protocol was specified as the procedure of challenge and response using cryptography, not only to confirm the existence of other principals but also to negotiate about some data such as session keys. …”
    Get full text
    Article
  18. 258

    PROBABILISTIC PROPERTIES OF THE INITIAL VALUES OF WEIGHTING FACTORS IN SYNCHRONIZED ARTIFICIAL NEURAL by V. F. Golikov, N. V. Brich

    Published 2015-05-01
    “…One of the most efficient ways for identical binary se quences generation is using methods of neural cryptography. The initial weight vestors values influence on speed of synchronization is analized. …”
    Get full text
    Article
  19. 259

    Password authentication scheme for mobile computing environment by LIU Jun, LIAO Jian-xin, ZHU Xiao-min, WANG Chun

    Published 2007-01-01
    “…By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.…”
    Get full text
    Article
  20. 260

    Algorithm of NAF scalar multiplication on ECC against SPA by Min WANG, Zhen WU

    Published 2012-09-01
    “…Against the problem that non-adjacent form(NAF)scalar multiplication on Elliptic curve cryptography(ECC) were not well resist the simple power attack(SPA),the implementation of NAF scalar multiplication and the mechanism of SPA attack were analyzed.Then a new algorithm,named equal power NAF scalar multiplication was presented.It was verified that equal power NAF scalar multiplication was efficient countermeasure against SPA attack by experimental analysis on power traces of the smartcard collected from the power analysis platform.…”
    Get full text
    Article