-
101
Method of designing security protocol for remote attestation
Published 2008-01-01“…By the introduction of the natural law of survival of the fittest,an improved method of automatically designing cryptographic protocols was proposed.This method regards BAN-like logic as a basic tool to describe them,construct a fitness function to assess the performance of individuals systematically in order to reach the best solutions.The result shows the method can assure correctness and security of the designed protocol.Furthermore,it has a strong feasibility and applicability.…”
Get full text
Article -
102
Analysis of correspondence property for security protocols
Published 2006-01-01“…Cryptographic protocol was specified as the procedure of challenge and response using cryptography, not only to confirm the existence of other principals but also to negotiate about some data such as session keys. …”
Get full text
Article -
103
Factorization of big integer and the security of RSA
Published 2017-05-01“…Three kinds of methods for integer factorization were proposed and the security of RSA was demarcated.RSA is a well-known cryptographic algorithm,using the analysis result of those methods.Through the work,readers could easily realize that if merely enlarged two prime numbers but lost attention of the relevance of them,the security of this algorithm might been missed.In the end,two recommended tactics to choose prime numbers as key of this algorithm were given.…”
Get full text
Article -
104
Private-preserving scientific computation of the rational numbers
Published 2022-06-01“…As a fundamental part of cryptography, secure multiparty computation (SMC) is a building block of various cryptographic protocols, and it is also a hot topic in the international cryptographic community.In recent years, many SMC problems, such as secret information comparison, secret set problems and secure multiparty computational geometry, have been widely studied.As many practical problems need to be described by rational numbers, it is both theoretically and practically important to study the SMC problems in the rational number field.However, most of the existing researches focus on integers and the studied data are mainly one-dimensional data.There are few researches on secure multiparty computation of multi-dimensional data in the rational number field, but they can’t be generalized.Based on the fractional representation of rational numbers, the new encoding schemes about rational numbers and rational number vectors were proposed, which could encode multi-dimensional data in the rational number field and provided new solutions for other SMC problems in the rational number field.Based on the encoding scheme and one-way hash function, some protocols were designed for equality problems and set problems in the rational number field.These protocols used basic arithmetic operation and hash operation to guarantee efficiency than existing related protocols.And these protocols didn’t limit the range of research data and they were more widely applicable.It proves that these protocols are secure in the semi-honest model using simulation paradigm, and demonstrates the efficiency and the applicability of these protocols by theoretical analysis and experiment.A practical example was also given to illustrate that approaches are more versatile, and they could also be directly used to solve some secure multiparty computational geometry problems in the rational number field.…”
Get full text
Article -
105
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01“…Adaptor signature (AS) is a novel cryptographic primitive that has gained prominence in recent years for its ability to link the signature process with the revelation of a secret value. …”
Get full text
Article -
106
NONLINEAR PROOF-OF-WORK: IMPROVING THE ENERGY EFFICIENCY OF BITCOIN MINING
Published 2020-09-01“…PoW requires miners to compete in solving a cryptographic puzzle before being allowed to add a block of transactions to the blockchain. …”
Get full text
Article -
107
IBEXSec:a universal security framework for industrial internet terminal access
Published 2020-03-01“…s:With the development and application of the industrial internet platform,the security risks of massive heterogeneous terminals need to be solved urgently.Aiming at the current industrial internet terminal access and data transmission security problems,a universal terminal security service framework called IBEXSec based on the identity public key cryptographic service (IBE-XKMS) was proposed to support security functions such as secure access,authentication agents,cross-domain communications and privacy protection of heterogeneous terminal devices on the industrial internet.…”
Get full text
Article -
108
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article -
109
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01“…However, with the increasing number of sophisticated attacks as well as the increasing computational power, the security of the “classical” cryptographic algorithms is threatened. Quantum information science offers solutions to this problem, specifically quantum key distribution (QKD), which provides a means for the generation and secure distribution of symmetric cryptographic keys. …”
Get full text
Article -
110
SYNTHESIS METHODS OF ALGEBRAIC NORMAL FORM OF MANY-VALUED LOGIC FUNCTIONS
Published 2016-03-01“…In particular the algebraic normal form of Boolean functions, also known as Zhegalkin polynomial, that well describe many of the cryptographic properties of Boolean functions is widely used. …”
Get full text
Article -
111
Boardroom electronic voting scheme based on DC-net
Published 2012-09-01“…A novel electronic voting scheme was proposed which was quite suitable for small scale election setting.An outstanding characteristic of the design was its guarantee of unconditionally perfect ballot secrecy.It satisfied self-tallying,fairness and verifiability.Disruption of the result of an election equals to breaking the discrete logarithm problem.The scheme is built on top of the DC-net (dining cryptographers network) anonymous broadcast protocol.It needs no trusted authority to guarantee its security,but assumes a complete network of private channels between voters.…”
Get full text
Article -
112
A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes
Published 2025-01-01“…The present paper explains the development of an innovative cryptographic system designed to encrypt color images at the pixel level. …”
Get full text
Article -
113
Efficient and secure message authentication scheme for VANET
Published 2016-11-01“…The proposed scheme decreased the complexity of cryptographic operations on signature by using elliptic curve cryptosystem (ECC) to construct authentication protocol without bilinear pairing and provided the function of conditional privacy-preserving. …”
Get full text
Article -
114
Invertible secret image sharing scheme based on improved FEMD
Published 2019-07-01“…Based on the improved FEMD algorithm an invertible secret image sharing scheme was proposed.Firstly,the embedding process of secret data was improved to make the original pixel pair and the stego pixel-pair to become a one-to-one mapping.Then a unique status flag was set to be calculated to record and process the original status of the over flow pixel-pair.Experimental data and analysis show that the proposed algorithm can guarantee the generation of high quality cryptographic images and solve the problem that the original carrier image can not be restored.…”
Get full text
Article -
115
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
Published 2020-04-01“…Anonymous heterogeneous signcryption scheme can not only transfer data confidentially for users in heterogeneous cryptographic environment,but also provide privacy protection for users of both sending and receiving sides.The security of an anonymous heterogeneous signcryption scheme was analyzed and that it did not satisfy confidentiality and anonymity was pointed out.A new MAHSC (mutual and anonymous heterogeneous signcryption) scheme was proposed.It was analyzed that its security satisfied the confidentiality of messages,the unforgeability of signatures and the anonymity of sender’s identity.The results of efficiency and security analysis show that the proposed scheme is feasible.…”
Get full text
Article -
116
Design keyed Hash function based on couple chaotic system
Published 2006-01-01“…Analyzed the chaotic and cryptographic properties of a piecewise nonlinear map, a couple chaotic digital sys-tem was proposed based on perturbing which used the piecewise nonlinear, then a new approach to construct keyed Hash function was presented. …”
Get full text
Article -
117
Chosen message attacks method against ECC implementations
Published 2014-05-01“…The method applies to the prime filed ECC cryptographic algorithms.…”
Get full text
Article -
118
New pseudorandom functions based on SIS
Published 2014-10-01“…Pseudorandom functions are vital tools in the construction of cryptographic primitives.Under the hard assumption of SIS (short integer solution),two lattice-based pseudorandom functions are proposed.The first one has parallel structure by the ideal of tree-like pseudorandom synthesizer,and the second one is serial structure whose public key size is reduced.Both constructions have small modulus and provable security.Compared with A Banerjer,C Peikert and A Rosen’s construction (EUROCRYPT 2012),their key sizes are asymptotically smaller,and efficiency are improved by avoiding the “rounding” technology.…”
Get full text
Article -
119
Provable security EPC information service communication scheme for EPC network
Published 2013-08-01“…To resolve the security drawbacks of EPC information services, a provable security EPC information service communication scheme—ESCM was designed. By using some cryptographic mechanisms such as the digital signature and the message authentication code, the ESCM could implement mutual authentication and session key agreement be-tween the EPC Information service servers and querying application belonging to a different trust domain. …”
Get full text
Article -
120
Study of relationships between correlation-immunity and balanceness based on Boolean functions
Published 2010-01-01“…E-derivative and derivative were introduced to deeply study internal structure of Boolean function,and analyzed the cryptographic properties of Boolean function,which was a new subject in cryptology.The relationships between correlation-immunity and balanceness was analyzed,and obtain some important results which could not be obtained by analyzing the exterior structure of Boolean function at all.Beyond that,for researching on the correlation immunity of balanced H-Boolean function which play a important role in cryptology,here also give a new research methods to improve the anti-attack ability of cryptosystem.…”
Get full text
Article