-
161
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Published 2020-02-01“…Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in certificate management.In the multi-serve environment,a bilinear mapping was used to construct an identity-based encryption scheme that supports conjunctive keyword search.In this scheme,the storage and query of the encrypted data were allocated to different servers,and the retrieval efficiency of the user storage and keyword was improved by cooperation.Re-use the encryption and search ability of the connection keywords by using the identity of multi-server and user.At the same time,combine with the searchable encryption method of conjunctive keyword,a new security model was constructed based on bilinear pairing.And under the bilinear Diffie-Hellman problem,the scheme satisfies the ciphertext indistinguishability under selected message attack.…”
Get full text
Article -
162
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01“…Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete satisfiability don't care signals was demonstrated.These don't care could not be satisfied under normal operation and thus the circuit design with Trojan is functionally equivalent to the Trojan-free baseline.The attacker could activate the Trojan through simple yet effective fault injection.Experimental results on a 1024-bit RSA cryptographic core show that the proposed hardware Trojan can escape from logic synthesis optimization, and that the RSA private key can be retrieved by simply over-clocking the design.A defense technique that can effectively detect such stealthy Trojan design was provided.…”
Get full text
Article -
163
Scheduling algorithm for stochastic job stream cipher service based on load balancing
Published 2018-06-01“…Business stream parallel processing system face the situation of the diversity of cipher service requests,the cross of serial mode and parallel mode,the intercross of different business data flow,and the demand of high speed and high reliability in security field.In order to improve the parallel processing efficiency of multi-cryptographic algorithm,load balancing was used as scheduling objective.Based on hierarchical hardware scheduling method (HHS-ACDID),considering the processing node’s storage capacity and processing speed,a load balancing scheduling algorithm was approved to support non related tasks and related tasks at the same time,which achieves the high speed cipher processing throughput.Simulation results show that the algorithm can complete dynamic scheduling of data stream system and get better load balancing effect.Compared with HHS-ACDID,the efficiency of the algorithm is improved by about 12%.…”
Get full text
Article -
164
A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers
Published 2024-12-01“…This review paper assesses the implementation of lightweight cryptographic algorithms for power-constrained microcontrollers in IoT systems using symmetric cryptography. …”
Get full text
Article -
165
EXPLORING THE EXPEDIENCY OF BLOCKCHAIN-BASED SOLUTIONS: REVIEW AND CHALLENGES
Published 2024-12-01“…Each block consists of several transactions, authenticated using cryptographic keys, and approved by a group of validators. …”
Get full text
Article -
166
On the emergence of the Quanta Prime sequence
Published 2025-12-01“…This research positions the Quanta Prime sequence as a pivotal tool in cryptographic applications, offering novel representations of critical mathematical structures. …”
Get full text
Article -
167
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Published 2014-01-01“…Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. …”
Get full text
Article -
168
Image encryption algorithms based on chaos through dual scrambling of pixel position and bit
Published 2014-03-01“…As the current popular chaos-based image encryption algorithms with the permutation–diffusion structure have security flaws of no immunity to attack.A new image encryption algorithm was proposed based on the analysis of current algorithms,which can well resist the chosen-plaintext and the chosen-ciphertext attacks.The algorithm uses Kent chaotic map to generate key streams,and produces the parameters of the chaotic system and the iteration times according to the characteristics of plaintext pixels and input key.Firstly,the positions of pixels were shuffled totally with the chaotic sequence.Secondly,the 0 and 1 bit positions of image pixels were scrambled by using another chaotic sequence generated by the input key.The experimental results show that the algorithm cannot only resist the chosen plaintext attack and chosen ciphertext attack but also achieve better cryptographic properties,such as key space,statistical analysis.…”
Get full text
Article -
169
Correlation-immunity study of balanced H-Boolean functions
Published 2013-08-01“…As a novel definition,E-derivative was introduced to study problems that are extremely difficult to handle in the cryptographic system.By using the way of combining derivative with E-derivative and correlation-immunity of H-Boolean functions,the distribution structure of balanced H-Boolean functions were deeply analyzed,and some important results on how to determine whether or not a H-Boolean function has correlation-immunity with the relatively simplified method of distinguishing different structure were also obtained,which are going to play important roles in the field of cryptology and future worldwide applications.Beyond that,the problem of the most higher-order correlation-immunity of H-Boolean function which is also one of the most difficult unsolved problems in cryptology was solved successfully to improve the anti-attack ability of cryptosystem and ensured the secure transmission of secret information on the network effectively .…”
Get full text
Article -
170
Access and Handover Authentication in Intermittent Connection Scenario of Satellite Network
Published 2021-09-01“…This article disclosed an authentication method for access and handover in a low-orbit satellite network intermittent connection scenario.The scheme was based on a symmetrical cryptographic system.Based on hash function, XOR operation and timestamp, the safe access of the terminal to the satellite network was ensured.It reduced signaling overhead, bandwidth overhead, and computing overhead as well.In view of the link interruption, the solution was based on the current session key between the user and satellites to quickly and safely resume communication to ensured the quality of service.Through the orbit prediction technology, according to the current session key between the user and satellites and random number, the safe switching between satellites was realized, and the communication cost during the satellite switching process was reduced.The scheme realized the anonymity of user identity, and refreshed the temporary identity for the next authentication after successful authentication.…”
Get full text
Article -
171
SAT-based differential automatic search algorithm using divide-and-conquer strategy and its applications
Published 2023-04-01“…To improve the efficiency of automatic search, an algorithm for searching the optimal differential characteristics based on SAT model was proposed by combining the divide-and-conquer strategy.The search space was divided into disjoint subsets by using the information from Matsui boundary conditions of arbitrary continuous rounds.By analyzing the relationships between satisfiability of differential models based on SAT, a descending branch search chain model was proposed.Furthermore, at the model optimization level, the number of subsets that need to be searched and partitioned was decreased.At the level of algorithm implementation, the search space was reduced by utilizing the parallel technology.Finally, the accelerated algorithm was applied to SPECK family of ARX cryptographic algorithms.The 20, 14, 11-round optimal differential characteristics of SPECK-48, SPECK-96, SPECK-128 are obtained, which increase the previous best results by 1, 4, 2 rounds respectively.…”
Get full text
Article -
172
Cryptanalysis of Novel Image Encryption Scheme Based on Multiple Chaotic Substitution Boxes
Published 2021-01-01“…This article presents a detailed structure of two types of cryptographic attacks on the diffusion-based encryption scheme. …”
Get full text
Article -
173
L’alternative monétaire Bitcoin : une perspective institutionnaliste
Published 2015-12-01“…Over the past few years, we have witnessed the rise of a new kind of currencies, based on cryptographic processes and managed by peer-to-peer networks. …”
Get full text
Article -
174
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01Get full text
Article -
175
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization
Published 2024-01-01“…This paper introduces a pioneering blockchain architecture designed to transcend this trilemma, uniting advanced cryptographic methods, inventive security protocols, and dynamic decentralization mechanisms. …”
Get full text
Article -
176
Unique Information Through the Lens of Channel Ordering: An Introduction and Review
Published 2025-01-01“…Beyond providing an accessible introduction to the topic from a channel ordering perspective, we present a novel resource-theoretic characterization of unique information in a cryptographic task related to secret key agreement. Our operational view of unique information entails rich physical intuition that leads to new insights into secret key agreement in the context of non-negative decompositions of the mutual information into redundant and synergistic contributions. …”
Get full text
Article -
177
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
Published 2022-04-01“…With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. …”
Get full text
Article -
178
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01“…An attacker measures SCs using probes as well as antennas and correlates them with secret information, such as secret key bytes, used in a cryptographic processor or analog quantities at the frontend of Internet of Things (IoT) gadgets. …”
Get full text
Article -
179
On Key Evolution over Wireless Channels
Published 2015-07-01“…Noise is a powerful resource for the implementation of cryptographic primitives, especially in wireless networks. …”
Get full text
Article -
180
Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks
Published 2017-03-01“…However, the bilinear pairing operation is one of the most complex cryptographic operations and the assumption of tamper-proof device is very strong. …”
Get full text
Article