共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
整数上全同态加密方案的重加密技术 总被引:1,自引:0,他引:1
在Gentry的第一个全同态框架中,通过重加密技术来更新密文,是非常关键的一步,重加密技术能控制噪声不超过门限值,以免发生解密错误。文中将根据一个较快速的整数上的全同态加密方案,去除其“可忽略解密错误”技术,然后给出了基于进位加法的重加密算法来进行同态解密,并详细描述其具体步骤。 相似文献
3.
Fully homomorphic encryption is faced with two problems now. One is candidate fully homomorphic encryption schemes are few. Another is that the efficiency of fully homomorphic encryption is a big question. In this paper, we propose a fully homomorphic encryption scheme based on LWE, which has better key size. Our main contributions are: (1) According to the binary-LWE recently, we choose secret key from binary set and modify the basic encryption scheme proposed in Linder and Peikert in 2010. We propose a fully homomorphic encryption scheme based on the new basic encryption scheme. We analyze the correctness and give the proof of the security of our scheme. The public key, evaluation keys and tensored ciphertext have better size in our scheme. (2) Estimating parameters for fully homomorphic encryption scheme is an important work. We estimate the concert parameters for our scheme. We compare these parameters between our scheme and Bral2 scheme. Our scheme have public key and private key that smaller by a factor of about logq than in Bral2 scheme. Tensored ciphertext in our scheme is smaller by a factor of about log2q than in Bral2 scheme. Key switching matrix in our scheme is smaller by a factor of about log3q than in Bra12 scheme. 相似文献
4.
Using low microwave frequencies (up to 2 GHz) through a monostatic analysis, the signature of a metallic target behind a thick brick wall is detected and resolved. An alternative approach using cepstral analysis is introduced for resolving the target's signature from that of the wall, which is particularly beneficial at close proximity when both signatures merge in the time domain. The use of lower frequencies combined with the monostatic analysis provides for greater flexibility in operational requirements, frequency spectrum constraints, and cost of transceivers, as well as a better wall penetration of the electromagnetic waves. Additionally, the introduction of the cepstrum-domain analysis opens a new window for detection and identification research in the field of through-wall remote sensing. 相似文献
5.
Data Masking: A New Approach for Steganography? 总被引:2,自引:0,他引:2
Regunathan Radhakrishnan Mehdi Kharrazi Nasir Memon 《The Journal of VLSI Signal Processing》2005,41(3):293-303
It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on
these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis.
Hence, the communicating entities can use steganography to achieve covertness. In this paper we propose a new form of multimedia
steganography called data masking. Instead of embedding a secret message into a multimedia object, as in traditional multimedia steganography, we process the
entire secret message to make it appear statistically similar to a multimedia object itself. Thereby we foil an eavesdropper
who is primarily applying statistical tests to detect encrypted communication channels. We show that our approach can potentially
give a covert channel capacity which is an order of magnitude higher than traditional steganography. Our experiments also
show that steganalyzers trained with stego objects of known steganographic have a low detection accuracy for datamasked multimedia
objects. 相似文献
6.
Kulalvaimozhi V. P. Alex M. Germanus Peter S. John 《Multidimensional Systems and Signal Processing》2020,31(2):367-383
Multidimensional Systems and Signal Processing - In the field of agriculture, image processing plays a significant role in which Image compression and Encryption is the most important tool. Image... 相似文献
7.
Wireless Personal Communications - In the process of crowdsensing, tasks allocation is an important part of the precise as well as the quality of feedback results. However, during this process, the... 相似文献
8.
9.
Chung-Ming Wang Yu-Ming Cheng 《Multimedia, IEEE》2009,16(3):70-80
A steganographic method for hiding messages uses high-dynamic-range images. The technique provides for authentication, a large embedding capacity, and limited distortion. 相似文献
10.
With increasing demand for data circulation, ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility. Blockchain, while decentralized and transparent,faces challenges in privacy protection and data verification, especially for sensitive data. Existing schemes often suffer from inefficiency and high overhead. We propose a privacy protection scheme using BGV homomorphic encryption and Pedersen Secret Sharing.This scheme enables secure computation on encrypted data, with Pedersen sharding and verifying the private key, ensuring data consistency and immutability.The blockchain framework manages key shards, verifies secrets, and aids security auditing. This approach allows for trusted computation without revealing the underlying data. Preliminary results demonstrate the scheme's feasibility in ensuring data privacy and security, making data available but not visible. This study provides an effective solution for data sharing and privacy protection in blockchain applications. 相似文献
11.
Wireless Personal Communications - A super-connected society is emerging in which things and things or people and things communicate with each other through the Internet of Things. Since devices in... 相似文献
12.
提出了一种利用时空混沌同步的随机密钥的数字保密通信方案,时空混沌输出作为加密和解密的钥匙序列,混沌驱动信号与密文序列混合传输,在接收端解密前首先恢复混沌驱动信号,然后恢复时空混沌加密序列。最后的仿真实验结果证明了该方案的合理性。 相似文献
13.
Wireless Personal Communications - This paper introduces a planar circular split ring resonator (CSRR) coupled to microstrip transmission line (TL) for rotation angle sensing applications.... 相似文献
14.
In general, a small proportion of components will be substandard because of some imperfection in the control of the production process. Because no advance knowledge exists as to which are the substandard components, their presence affects the reliability. A great part of the substandard components can be eliminated by means of debugging procedures, but due to a nonzero proportion of defectives of the component population, it is impossible to eliminate all of the substandard components through conventional debugging processes. To remedy this drawback, this paper presents a new debugging process that is capable of eliminating almost all of the substandard components. From an analysis and comparison of the new debugging process with the conventional method, it has become evident that we can reduce the fraction defective of the lot after debugging by several orders of magnitude when compared with the conventional method. 相似文献
15.
Mittal Varsha Gangodkar Duraprasad Pant Bhaskar 《Wireless Personal Communications》2021,119(3):2287-2301
Wireless Personal Communications - Multi-label text classification is a challenging task in many real applications. Mostly, in all the traditional techniques, word2vec is used to show the... 相似文献
16.
钟卓新 《信息安全与通信保密》2001,(5):63-65
9 谜语类 谜语全是密码。各国的谜语都分为谜面和谜底,从谜面(密文)求出答案(谜底,即明文)来。中国猜谜从清朝中期起逐渐形成按“谜格”(也叫谜律,约数百个)来作游戏。谜格可比喻为密码的编码规则。常用的谜格有: 系铃格 来自“解铃还须系铃人”成语。古人在谜语中凡是应读他音或变声调的字的右上方圈上红圈(“铃铛”),叫系铃格(虽打了红圈但仍读本音的称解铃格——取消圈读),如:劳动竞赛(打一古人 相似文献
17.
Wireless Personal Communications - This paper presents a new hybrid encryption algorithm with 16-bit block size and a 128-bit initialization vector, referred to as SEPAR, and it is suitable for IoT... 相似文献
18.
钟卓新 《信息安全与通信保密》2001,(3):69-71
中国是历史悠久的文明古国,不仅中华文化博大精深,而且科技先驱们也创造发明了许多具有世界先进水平的科技成果。本文从文化特征的角度,对汉文化中寓含的密码“因素”加以综合阐述,立意新颖,具有较强的知识性与可读性,它不仅对密码学研究提供了新的途径,而且使读者从中感受到中华文化的无穷魅力。本刊分两期发表钟卓新先生的这篇文章,以飨读者。 相似文献
19.