共查询到19条相似文献,搜索用时 93 毫秒
1.
廖卫民 《信息技术与标准化》2005,(Z1)
RSA公钥密码体制是当今最流行的公钥密码体制,它具有很多优点,但是在实际应用中由于它的代数性质会让攻击者积累有效信息,而且在加密大量消息的情况下,加解密速度非常慢。针对这两个缺陷,提出了一种加载随机预言模型的RSA公钥密码体制,这种体制不但保留了原来体制的保密性,而且还大大降低了攻击者对信息的积累,提高了加解密的效率。最后还将改进的方案推广到私钥密码体制和公钥密码体制的结合的方案。 相似文献
2.
廖卫民 《信息技术与标准化》2005,(2)
RSA公钥密码体制是当今最流行的公钥密码体制,它具有很多优点,但是在实际应用中由于它的代数性质会让攻击者积累有效信息,而且在加密大量消息的情况下,加解密速度非常慢.针对这两个缺陷,提出了一种加载随机预言模型的RSA公钥密码体制,这种体制不但保留了原来体制的保密性,而且还大大降低了攻击者对信息的积累,提高了加解密的效率.最后还将改进的方案推广到私钥密码体制和公钥密码体制的结合的方案. 相似文献
3.
廖卫民 《信息技术与标准化》2005,(1):20-23
RSA公钥密码体制是当今最流行的公钥密码体制,它具有很多优点,但是在实际应用中由于它的代数性质会让攻击者积累有效信息,而且在加密大量消息的情况下,加解密速度非常慢。针对这两个缺陷,提出了一种加载随机预言模型的RSA公钥密码体制,这种体制不但保留了原来体制的保密性,而且还大大降低了攻击者对信息的积累,提高了加解密的效率。最后还将改进的方案推广到私钥密码体制和公钥密码体制的结合的方案。 相似文献
4.
本文从公钥密码和私钥密码两方面分析了现有的数据加密体制,并提出一种将AES(高级数据加密标准)与ECC(椭圆曲线密码体制)相结合的数据加密方案。这一方案有效解决了私钥密码体制中密钥的分配和管理的问题,从而为在网络中高速、安全地传输数据提供了保障。 相似文献
5.
基于ECC的密码系统研究与设计 总被引:7,自引:1,他引:6
朱艳琴 《微电子学与计算机》2003,20(12):51-53
文章设计了一个基于ECC的密码系统方案,给出了该方案所涉及主要操作的算法描述。该方案综合了对称密码体制和公钥密码体制的优点,采用基于ECC的密钥交换以及基于CBC的三重加密算法.具有安全可靠、加解密效率高、易于实现等特点,可应用于数据通信、电子商务等多个领域,以提供所需的安全服务。 相似文献
6.
在对公钥密码体制分析的基础上,研究了RSA密码体制的实现算法,设计了系统程序模块。开发了端对端的网络传输信息加密解密系统。测试表明采用RSA密码体制可以研制出安全性更高的网络传输信息加密解密系统。 相似文献
7.
在传统的经典密码学当中我们可以从一个密钥得到一个加密规则和一个解密规则.在这些密码体制中加密规则和解密规则相同,或者可以很容易从加密规则导出解密规则,任何加密解密规则的泄露都会导致密码体制不安全,这是传统的对称密码加密.而公钥密码学就提出了一种想法,从加密规则推出解密规则在计算上不可行来解决这一问题.这就是本文所介绍的RSA加密体制就是其中的典型代表. 相似文献
8.
9.
10.
基于辫子群的密码体制研究及进展 总被引:1,自引:0,他引:1
综述了基于辫子群的密码体制的研究成果和发展状况:介绍了现有的基于辫子群的一些密码体制,包括密钥交换协议,加密-解密方案和身分认证方案,同时也概述了相关的密码分析方法,如解共轭问题、基于长度和线性表示的攻击等.指出了目前基于辫子群的密码体制所存在的问题,并对其研究前景进行了展望. 相似文献
11.
12.
13.
14.
We present a new cryptosystem based on ideal arithmetic in quadratic orders. The method of our trapdoor is different from
the Diffie—Hellman key distribution scheme or the RSA cryptosystem. The plaintext m is encrypted by mp
r
, where p is a fixed element and r is a random integer, so our proposed cryptosystem is a probabilistic encryption scheme and has the homomorphy property.
The most prominent property of our cryptosystem is the cost of the decryption, which is of quadratic bit complexity in the
length of the public key. Our implementation shows that it is comparably as fast as the encryption time of the RSA cryptosystem
with e=2
16
+1 . The security of our cryptosystem is closely related to factoring the discriminant of a quadratic order. When we choose
appropriate sizes of the parameters, the currently known fast algorithms, for example, the elliptic curve method, the number
field sieve, the Hafner—McCurley algorithm, are not applicable. We also discuss that the chosen ciphertext attack is not applicable
to our cryptosystem.
Received 29 June 1998 and revised 15 November 1998 相似文献
15.
一种基于Z/nZ上椭圆曲线的公钥密码算法 总被引:1,自引:0,他引:1
本文在 K M O V 算法[1]的基础上作了改动,提出了一种 Z/n Z 上椭圆曲线公钥密码算法,n是两个大安全素数之积,算法安全性基于整数因子分解难题,与 R S A 体制相似,能抵卸一些对 R S A 算法的攻击,不足之处在于不能证明其安全性是否等价于因子分解问题。算法加解密过程都很简洁,且在加密过程中引入随机数,实现概率加密。同时给出了数字签名和身份认证方案。 相似文献
16.
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images 总被引:3,自引:0,他引:3
Li Li 《Signal processing》2012,92(4):1069-1078
This paper proposes an encryption scheme with a new additive homomorphism based on Elliptic Curve ElGamal (EC-ElGamal) for sharing secret images over unsecured channel. The proposed scheme enables shorter key and better performance than schemes based on RSA or ElGamal. It has a lower computation overhead in image decryption comparing with the method that uses other additively homomorphic property in EC-ElGamal. Elliptic curve parameters are selected to resist the Pohlig-Hellman, Pollard's-rho, and Isomorphism attacks. Experimental results and analysis show that the proposed method has superior performance to RSA and ElGamal. 相似文献
17.
Key management is more difficult in space networks than in ground wireless networks as long time delay, large scale and difficult maintain. The main challenge is how to handle 1-affects- $n$ problem,which becomes more serious as space entities spread over a wide geographic area. To solve the question, this paper proposes a one-to-many mapping shared key agreement, which is based on one-to-many encryption mechanism model. In the proposed key agreement, each entity has different decryption key and shares an encryption key. When an entity joins or leaves network, updated keys only are a public encryption key and its decryption key. However, the other entities’ secret key remains unchanged, so as to each member has the ability to update key autonomously and securely, legitimate member has capability of revoke it’s secret decryption key independency without other member’s agreement. Consequently the performance of the proposed key management scheme is unrelated to the network scale, node mobility and topology structure. It is shown that our proposed key management scheme not only improves the efficiency and flexibility for space networks, but also achieves good security properties, including forward security and backward security and many more by theoretical analyses. 相似文献
18.
Wenjun Song Mengqi Liu Thar Baker Qikun Zhang Yu-an Tan 《International Journal of Network Management》2023,33(5):e2225
Federated learning (FL) is widely used in internet of things (IoT) scenarios such as health research, automotive autopilot, and smart home systems. In the process of model training of FL, each round of model training requires rigorous decryption training and encryption uploading steps. The efficiency of FL is seriously affected by frequent encryption and decryption operations. A scheme of key computation and key management with high efficiency is urgently needed. Therefore, we propose a group key agreement technique to keep private information and confidential data from being leaked, which is used to encrypt and decrypt the transmitted data among IoT terminals. The key agreement scheme includes hidden attribute authentication, multipolicy access, and ciphertext storage. Key agreement is designed with edge-cloud collaborative network architecture. Firstly, the terminal generates its own public and private keys through the key algorithm then confirms the authenticity and mapping relationship of its private and public keys to the cloud server. Secondly, IoT terminals can confirm their cryptographic attributes to the cloud and obtain the permissions corresponding to each attribute by encrypting the attributes. The terminal uses these permissions to encrypt the FL model parameters and uploads the secret parameters to the edge server. Through the storage of the edge server, these ciphertext decryption parameters are shared with the other terminal models of FL. Finally, other terminal models are trained by downloading and decrypting the shared model parameters for the purpose of FL. The performance analysis shows that this model has a better performance in computational complexity and computational time compared with the cited literature. 相似文献
19.
AES与ECC混合加密算法的无线数据通信系统设计 总被引:2,自引:0,他引:2
提出了一种新的无线数据通信数据加密算法。该算法利用高级加密标准AES加密数据,以ECC加密AES算法的密钥,并用ECC实现数字签名,无线数据系统的接收端对接收的信息进行相应的数据解密,得到原始数据。这样既能快速地进行数据加解密,又能很好地解决密钥分配问题,同时也能完成数字签名与验证功能,具有需求存储空间小、运算速度快、带宽需求低、密钥管理方便等优点,非常适合于无线通信网络环境下的数据加解密通信。 相似文献