-
241
Application of public key infrastructure in telecom operators
Published 2020-11-01“…With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be strengthened.A scheme of constructing unified telecom public key infrastructure with strict hierarchical structure was proposed,that is,establishing a national telecom root CA as a trust anchor,and each major telecom operator becomes an independent sub-ca,forming a certificate trust chain of “national telecom root CA- telecom operator sub-ca” and providing PKI security services.This scheme can not only realize the mutual recognition between telecom operators,but also help unify the telecom public key infrastructure to become a globally trusted electronic authentication service provider,so as to have more influence and say in the formulation of international certification standards.…”
Get full text
Article -
242
Control research and application of conventional operations without real-time networks
Published 2020-01-01“…On the basis of researching the timing agreement mechanism and mirror synchronization operation to ob-tain keys under the condition of no network,a logic control method was proposed based on cryptography control,non-real-time virtual communication and computing keys according to agreement,which could be well applied to dynamic authentication and switch operation of intelligent locks or switches without real-time communication net-work coverage.By using the intelligent terminal with the ability of agreed operation,a kind of “control network of cryptography” without real-time communication network was established,which could be used as a useful supple-ment to the IoT technology without communication coverage,as well as a remote object in a fixed location to transfer the right of management or use according to the order of calculation.By using the computing power of the terminal instead of the communication power of the remote end,without the need to build a backstage communication network and the communication expenses during the waiting period.…”
Get full text
Article -
243
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
Published 2022-12-01“…With the development of wireless communication technology and the popularization of intelligent terminals, more and more cryptographic algorithms are applied to IoT devices to ensure the security of communication and data.Among them, the SM2 elliptic curve public key cryptography proposed by the State Cryptography Administration is an elliptic curve public key cryptography algorithm developed domestically, which has the advantages of high security and short key.SM2 has been widely deployed in various communication systems and is used in essential parts such as identity authentication and key negotiation.However, since SM2 involves large integer operations on finite fields, the computational cost is high, and its execution on a low-power embedded platform seriously affects the user experience.Therefore, an efficient implementation scheme of SM2 algorithm for low-power embedded platform was proposed for ARM-m series processors.Specifically, Thumb-2 instruction set was adopted to handle carry and save addressing cycles, basic operations such as modulo addition and sub-traction of large integers were optimized, and the number of available registers on the platform was combined to build efficient basic operations.Besides, based on the short multiplication and accumulation instruction cycle of ARM-m series processors, the implementation of Montgomery multiplication was optimized, and an efficient modular multiplication scheme was designed in combination with the CIOS algorithm.The scheme was no longer limited to Mersenne primes, and greatly improved the speed and flexibility of modular multiplication.Based on the theoretical analysis and experimental test, the window length selection method of the multiple point-scalar multiplication wNAF sliding window method on the embedded platform was given.The experimental test results show that the proposed scheme can effectively improve the computational efficiency of the SM2 algorithm on the resource-constrained low-power embedded platform.Without pre-calculation, the test signature speed can reach 0.204s/time, the signature verification speed is 0.388s/time, the encryption speed is 0.415s/time, and the decryption speed is 0.197s/time.…”
Get full text
Article -
244
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
Published 2024-01-01Get full text
Article -
245
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Published 2014-01-01“…As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. …”
Get full text
Article -
246
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. …”
Get full text
Article -
247
Efficient strong privacy protection and transferable attribute-based ticket scheme
Published 2022-03-01“…To solve the problems of efficiency, flexibility, and privacy protection faced by electronic tickets, an efficient and transferable attribute-based ticket scheme with strong privacy protection was proposed.Firstly, a ticket issuing algorithm based on attribute disclosure was constructed by combining attribute-based credentials and set commitment.Secondly, the structure-preserving signature on equivalence class and dynamic malleable signature were used to reduce the computational complexity of the ticket issuance, and the ticket transfer and ticket verification with constant complexity were realized.In addition, to prevent the possibility of malicious verifiers guessing user information according to the seller’s identity, the scheme not only realized the anonymity of the user, but also realized the anonymity of the seller in the ticket verification for the first time.Finally, the security definition of the scheme was given, and its security was reduced to either well-known complexity cryptography assumptions or the security of proven cryptography primitives.Comparison and experimental results demonstrate that the proposed scheme is flexible and efficient.…”
Get full text
Article -
248
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…Cryptography and steganography have similarities in terms of security. …”
Get full text
Article -
249
Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity
Published 2015-12-01“…Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring automatically,with the actual signer’s personl idnetity easily hided.By in-depth analysis of several attribute-based threshold ring signature schemes proposed by the earlier reseachers,it is concluded that the malicious users with the complementary attributes can conspire to forge a valid signature.In order to compensate for the defect,the proposal first gives the formal definitions of the security characteristics in attribute-based threshold ring signature scheme,such as unforgeability,indistinguishability and anti-collusion attack.Then a new attribute-based alterable threshold ring signature scheme is presented,whose security is proven equivalent to the computational Diffie-Hellman problem.By introducing an random secret parameter in each user’s private key,the proposal can resist the collusion attacks.It is proven that the proposal can satisfy existential unforgeability and anti-collusion against the adaptive chosen message attack in therandom oracle model,and can meet the requirement of indistinguishability among the users with the same attributes.Besides,property analysis shows that the proposal has high efficiency.…”
Get full text
Article -
250
Optimized SM4 Hardware Implementations for Low Area Consumption
Published 2024-01-01“…Our designs make SM4 competitive with many ciphers specifically designed for lightweight cryptography.…”
Get full text
Article -
251
Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks
Published 2020-10-01“…In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. …”
Get full text
Article -
252
Decentralized identifiers based IoT data trusted collection
Published 2025-02-01Get full text
Article -
253
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…Abstract Information security is important so that files that are confidential can be protected from unauthorized persons, therefor there is Cryptography and Steganograph. Cryptography is used to encrypt files by changing it, while Steganography inserts the file without changing it.for image, there is the branch that can be used to secure it, namely Visual Cryptography secret sharing scheme. …”
Get full text
Article -
254
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01“…Findings indicate that this hybrid blockchain model, enhanced with quantum-resistant cryptography and decentralized governance, significantly improves EHR security. …”
Get full text
Article -
255
A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Published 2011-01-01“…Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. …”
Get full text
Article -
256
On the Search for Supersingular Elliptic Curves and Their Applications
Published 2025-01-01“…Elliptic curves with the special quality known as supersingularity have gained much popularity in the rapidly developing field of cryptography. The conventional method of employing random search is quite ineffective in finding these curves. …”
Get full text
Article -
257
Analysis of correspondence property for security protocols
Published 2006-01-01“…Cryptographic protocol was specified as the procedure of challenge and response using cryptography, not only to confirm the existence of other principals but also to negotiate about some data such as session keys. …”
Get full text
Article -
258
PROBABILISTIC PROPERTIES OF THE INITIAL VALUES OF WEIGHTING FACTORS IN SYNCHRONIZED ARTIFICIAL NEURAL
Published 2015-05-01“…One of the most efficient ways for identical binary se quences generation is using methods of neural cryptography. The initial weight vestors values influence on speed of synchronization is analized. …”
Get full text
Article -
259
Password authentication scheme for mobile computing environment
Published 2007-01-01“…By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.…”
Get full text
Article -
260
Algorithm of NAF scalar multiplication on ECC against SPA
Published 2012-09-01“…Against the problem that non-adjacent form(NAF)scalar multiplication on Elliptic curve cryptography(ECC) were not well resist the simple power attack(SPA),the implementation of NAF scalar multiplication and the mechanism of SPA attack were analyzed.Then a new algorithm,named equal power NAF scalar multiplication was presented.It was verified that equal power NAF scalar multiplication was efficient countermeasure against SPA attack by experimental analysis on power traces of the smartcard collected from the power analysis platform.…”
Get full text
Article