简介:EncryptedCommunicationtechniqueisanimportantmeasuretotheinformationsafety.BasedontheadvantagesoftwopublicencryptionalgorithmRSA&DES,anovelhighintensitypublicencryptionalgorithmChaosRandomHighIntensity(CHR)isproposedinthispaper.TheprincipleofCRHisdescribedandanalyzedindetail,andtheresultsofcomputersimulationhasproveditseffectivenessandcorrectness.
简介:AtypeofdigitalchaoticeneryptionsystemwasproposedinRef.[1]whichusesaclassof1-Dpiecewiselinear(PWL)maptorealizechaoticencryptionanddecryptionsystemthroughtheinversesystemapproach.Inthegeneralstructureofencryptionsystem,adynamicalsystem∑(·)isusedtoconnectthelinearcombinationofn-orderdelaywiththeinputterminal.Inthispaperweshowthatthiscryptosystemcannotfrustratechosen-ciphertextattack.Atypeofchaoticencryptionsystembasedonself-synchronizingstreamcipherisproposed.Thissystemcanavoidchosen-ciphertextattackandhashighersecurity.
简介:Thepaperproposesanovelalgorithmtogettheencryptionmatrix.Firstly,achaoticsequencegeneratedbyChebyshevchaoticneuralnetworksisconvertedintoaseriesoflow-orderintegermatricesfromwhichavailableencryptionmatricesareselected.Then,ahigherorderencryptionmatrixrelatingrealworldapplicationisconstructedbymeansoftensorproductionmethodbasedonselectedencryptionmatrices.Theresultsshowthattheproposedalgorithmcanproducea'one-timepadcipher'encryptionmatrixwithhighsecurity;andtheencryptionresultshavegoodchaosandauto-correlationwiththenaturalfrequencyoftheplaintextbeinghiddenandhomogenized.
简介:Thesecurityofthesymmetricprobabilisticencryptionschemebasedonchaoticattractorsofneuralnetworksisanalyzedanddiscussed.Firstly,thekeyuniquenessisprovedbyanalyzingtherotationtransformmatrixtoavoidtheattackoftheequivalentkey.Secondly,thedistributeduniformityofthenumbers'0'and'1'inthecorrespondingattractingdomainforeverychaoticattractorisanalyzedbythestatisticsmethod.Itistestifiedthatthedistributeduniformitycanbekeptifthesynapticmatrixoftheneuralnetworkischangedbyastandardpermutationmatrix.Twoannotationsbasedontheresultsaboveareproposedtoimprovetheapplicationsecurityoftheencryptionalgorithm.
简介:Inholographicencryption,doublerandom-phaseencodingintheFresneldomain(DRPEiFD)isaprevalentencryptionmethodbecauseitislenslessandsecure.However,noisesbringadverseeffectsduringdecryption.Inthisletter,weintroducequick-response(QR)codingduringencryptiontoresistnoises.WetransformtheoriginalinformationintoaQRcodeandthenencryptthecodeasahologramthroughDRPEiFD.Toretrievetheinput,wedecryptthehologramintheoppositemannertotheencryptionandsubsequentlyobtainaQRcodewithnoises.Byscanningthiscodewithproperapplicationsinsmartphones,wecanobtainanoise-freeretrieval.Numericalexperimentsandimagesscannedbyasmartphoneareshowntovalidateourproposedmethod.
简介:Certificatelessencryptionattractsalotofattentionsofarbyeliminatingthekeyescrowprobleminidentity-basedencryptionandpublickeycertificatesinthetraditionalpublickeycryptography.Byconsideringthethreatfromthekeyexposure,itisdesirabletoincorporatetheideaofkey-insulatedcryptosystemintothecertificatelessencryption.Inthispaper,wehavedesignedanefficientcertificatelesskeyinsulatedencryption(CL-KIE)schemetoachievethisgoal.Byourapproach,thecomputationalperformanceofourschemehasbeenimprovedsignificantlyintermsofreductiononrunningtimeandstorage.WealsogavethesecurityproofofthenewCL-KIEschemeagainstthechosenplaintextattacks(CPAs)intherandomoracle,consideringtheassumptionofthecomputationalDiffie-Hellman(CDH)problem.
简介:Anovelbroadcastencryptionschemeforgroupcommunicationscenariosindistributednetworksispresented.Inthescheme,anyoneisallowedtoencryptamessageanddistributeittoadesignatedgroup.Eachmemberinthedesignatedgrouphastheabilitytoindependentlydecryptaciphertext.Incontrasttotraditionalbroadcastencryption,allthevalidreceiversintheproposedschemecomposethedesignatedgroup.Totakeadvantageofthisproperty,atabforthegroupissetandthematchingprivatekeyforeachmemberisgenerated.Inaddition,beforedecryptingaciphertext,anyoneintheschemecanverifytheciphertext,toensurethattheciphertextiscorrect.Thispropertyisveryimportantforlarge-scalegroupcommunication,asthegatewaycanfilterincorrectciphertextandalleviatethereceiver'sworkload.Finally,aproofintherandomoraclemodelisgiven,toshowthattheproposedschemeissecureagainsttheadaptivelychosenciphertextattack.
简介:Anopticalimageencryptionsystemwithadaptivesteganographyusingred,green,andblue(RGB)channelintegrationisproposed.Theopticalimageencryptionsystememploysadoublerandomphaseencodingalgorithmtoencryptanddecryptcolorimages.TheRGBchannelinacolorimageisfirstintegratedintoalargegrayscaleimage.Thentheintegratedimageisencryptedbytworandomphasemasks.Thesecretdataisthenembeddedintotheencryptedimagewithaspecifichidingsequencegeneratedbythezero-LSB(leastsignificantbits)sortingtechniquewhichisacontent-dependentandlowdistortiondataembeddingmethod.Experimentalresultsshowthattheproposedmethodhasagoodperformanceinbothhidingcapacityanddecryptedimagequality.
简介:密文政策基于属性的可查找的加密(CP-ABSE)能为数据分享和检索完成有细密纹理的存取控制,并且安全deduplication能由消除副本拷贝节省存储空间。然而,有很少策划支持可查找的加密和安全deduplication。在这份报纸,支持安全块级的deduplication的一个大宇宙CP-ABSE计划在混合的云机制下面被建议。在建议计划,在密文被插入到花蕾过滤器树(BFT)以后,私人云能由匹配标签高效地执行有细密纹理的deduplication,并且公共的云能用同构的可查找的方法并且关键词匹配高效地寻找。最后,建议计划能在选择分发攻击下面完成隐私块级(PRV-CDA-B)固定deduplication并且隐藏火柴(MC)可查找的安全。与存在计划相比,建议计划在同时支持有细密纹理的存取控制,块级的deduplication和有效搜索有优点。
简介:当前基于身份(标志)cryptosystem缺乏两大政党的认证和用户的私人钥匙的机制分发。一些基于标志的signcryption计划和基于标志的证实的关键协议协议被介绍了,但是他们不能完全解决这个问题。一个新奇基于标志的认证计划基于基于标志的加密(IBE)和指纹哈希方法被建议在IBE计划解决困难,它包括证实发送者的消息接收装置,证实用户并且把私人钥匙传给他们的信任权威(TA)。而且,计划从终端扩大指纹认证的应用程序到网络并且免于指纹数据制造。指纹认证方法由二个因素组成。这个方法联合一个标志例如,给USB钥匙调音,与用户由混合有指纹特征的一个假散乱数字的指纹回锅肉丁。安全和试验性的效率满足实际应用的要求。
简介:Randomphasemasksplayakeyroleinopticalimageencryptionschemesbasedondoublerandomphasetechnique.Inthispaper,amixedchaoticmethodisproposed,whichcanefficientlysolvesomeweaknessesthatone-dimensional(1-D)singlechaoticmapsencountertogeneraterandomphasemasks.Basedonthechaoticrandomphasemasks,opticalimageencryptionanddecryptionarerealizedwithasingle-shotdigitalholographictechnique.Intheproposedencryptionscheme,theinitialvalueandparametersofmixedchaoticmapsserveassecretkeys,whichisconvenientforthekeymanagementandtransmission.Moreover,italsopossesseshighresistanceagainststatisticalattack,brute-forceattack,noiseattackandshearattack.Simulationresultsandsecurityanalysisverifythevalidityandsecurityoftheproposedencryptionscheme.
简介:ResearchdemonstratesthataFresnelhologramcanbegeneratedandsimultaneouslyencryptednumericallybasedonasecretsymmetrickeyformedbythemaximallengthsequence(M-sequence).Themethodcanbedirectlyextendedtoencryptavideoholographicclipinaframe-by-framemanner.However,giventhelimitedcombinationofsignalsinthefamilyofM-sequence,hackingthesecretkeythroughtrialanderrorcanbetimeconsumingbutnotdifficult.Inthisletter,weproposeamethodthatisdifficulttocrackwithbruteforceforencryptingaholographicvideosequence.AnM-sequenceisfirstrandomlyassignedtoencrypteachframeoftheholographicvideosignal.Subsequently,theindexoftheselectedM-sequence,whichisnecessarytodecryptthehologram,isencryptedwiththeRSAalgorithmbeforetransmittingtothereceivingend.Atthereceivingend,thedecoderisprovidedwithaprivatekeytorecovertheindexforeachframe,andthecorrespondingM-sequenceisusedtodecrypttheencodedhologram.
简介:Identity-basedhashproofsystemisabasicandimportantprimitive.Ittographicschemesandprotocolsthataresecureagainstkey-leakageattacks.Inthisupdatableidentity-basedhashproofsystem,inwhichtherelatedmastersecretkeyiswidelyutilizedtoconstructcryp-paper,weintroducetheconceptofandtheidentitysecretkeycanbeupdatedsecurely.Then,weinstantiatethisprimitivebasedonlatticesinthestandardmodel.Moreover,weintroduceanapplicationofthisnewprimitivebygivingagenericconstructionofleakage-resilientpublic-keyencryptionschemeswithanonymity.Thisconstructioncanbeconsideredastheintegrationofthebounded-retrievalmodelandthecontinualleakagemodel.Comparedwiththeexistingleakage-resilientschemes,ourconstructionnotonlyismoreefficientbutalsocanresistmuchmorekeyleakage.