期刊文献+
共找到94篇文章
< 1 2 5 >
每页显示 20 50 100
Scalable and Privacy-Preserving Data Sharing Based on Blockchain 被引量:18
1
作者 Bao-Kun Zheng Lie-Huang Zhu +4 位作者 Meng Shen Feng Gao Chuan Zhang Yan-Dong Li Jing Yang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第3期557-567,共11页
With the development of network technology and cloud computing, data sharing is becoming increasingly popular, and many scholars have conducted in-depth research to promote its flourish. As the scale of data sharing e... With the development of network technology and cloud computing, data sharing is becoming increasingly popular, and many scholars have conducted in-depth research to promote its flourish. As the scale of data sharing expands, its privacy protection has become a hot issue in research. Moreover, in data sharing, the data is usually maintained in multiple parties, which brings new challenges to protect the privacy of these multi-party data. In this paper, we propose a trusted data sharing scheme using blockchain. We use blockchain to prevent the shared data from being tampered, and use the Paillier cryptosystem to realize the confidentiality of the shared data. In the proposed scheme, the shared data can be traded, and the transaction information is protected by using the (p, t)-threshold Paillier cryptosystem. We conduct experiments in cloud storage scenarios and the experimental results demonstrate the efficiency and effectiveness of the proposed scheme. 展开更多
关键词 data sharing PRIVACY-PRESERVING cloud computing blockchain paillier cryptosystem
原文传递
基于Paillier的同态加密域可逆信息隐藏 被引量:8
2
作者 张敏情 周能 +2 位作者 刘蒙蒙 王涵 柯彦 《山东大学学报(理学版)》 CAS CSCD 北大核心 2020年第3期1-8,18,共9页
利用Paillier密码体制的同态和概率特性,提出了一种基于Paillier的同态加密域可逆信息隐藏。首先对原始图像分块,图像所有者随机选择的像素组中有一个参考像素和8个目标像素,将参考像素的最低有效位和目标像素的所有比特通过可逆信息隐... 利用Paillier密码体制的同态和概率特性,提出了一种基于Paillier的同态加密域可逆信息隐藏。首先对原始图像分块,图像所有者随机选择的像素组中有一个参考像素和8个目标像素,将参考像素的最低有效位和目标像素的所有比特通过可逆信息隐藏的方法自嵌入到图像的其他部分中,参考像素的最低有效位在加密前置0避免嵌入数据时溢出,加密的参考像素替代像素组中围绕它的目标像素,从而构造出镜像中心密文。在一组镜像中心密文中,数据嵌入者通过同态加法在目标像素的最低有效位嵌入额外信息,而参考像素保持不变。接收者可直接在目标像素和对应的参考像素之间进行模乘法逆元提取额外信息,或者在直接解密后通过明文减法提取额外信息并能无损还原原始图像。实验结果表明:在保证直接解密图像质量的前提下算法平均嵌入率为0.18 bpp (bit per pixel)。 展开更多
关键词 可逆信息隐藏 同态加密域 paillier 镜像中心密文
原文传递
基于Paillier同态公钥加密系统的可逆信息隐藏算法 被引量:7
3
作者 张敏情 李天雪 +1 位作者 狄富强 柯彦 《郑州大学学报(理学版)》 CAS 北大核心 2018年第1期8-14,共7页
为提高密文域可逆信息隐藏的嵌入容量,提出了一种基于Paillier同态公钥加密系统的可逆信息隐藏算法.首先对原始图像进行位平面分割,而后对高位位平面进行定长游程编码压缩,利用低位位平面中元素重构高位位平面,最后利用Paillier同态公... 为提高密文域可逆信息隐藏的嵌入容量,提出了一种基于Paillier同态公钥加密系统的可逆信息隐藏算法.首先对原始图像进行位平面分割,而后对高位位平面进行定长游程编码压缩,利用低位位平面中元素重构高位位平面,最后利用Paillier同态公钥加密系统加密图像,通过同态乘法嵌入秘密数据.接收端可直接在密文域中通过模乘法逆元提取秘密数据,在直接解密的情况下可实现原始图像的无损还原.实验结果表明,算法的最大平均嵌入率为0.128 bpp,实现了解密与提取的可分离,提取正确率为100%. 展开更多
关键词 可逆信息隐藏 密文域 paillier 公钥加密
下载PDF
基于Paillier同态加密算法的数字化供应链溯源方案设计
4
作者 裘伟超 《九江职业技术学院学报》 2024年第1期23-29,共7页
为提升供应链的安全性和透明度,本文设计了一款基于Paillier同态加密算法的数字化供应链溯源方案。数据显示,文件数量为1600时,基于Paillier同态加密算法的密文检索方案的检索时间为0.6×10^(3)ms,明显低于灵活多关键字搜索方案。... 为提升供应链的安全性和透明度,本文设计了一款基于Paillier同态加密算法的数字化供应链溯源方案。数据显示,文件数量为1600时,基于Paillier同态加密算法的密文检索方案的检索时间为0.6×10^(3)ms,明显低于灵活多关键字搜索方案。在数字化供应链溯源系统测试中,当查询次数为1000时,系统每秒事物处理量为979,平均响应时间为0.62s。结果表明,系统在查询和上链测试中表现较好,吞吐量和响应时间均达到较高水平。基于Paillier同态加密算法的数字化供应链溯源方案具有良好的安全性和效率,可以有效实现对供应链的全面控制。 展开更多
关键词 供应链 paillier 加密算法 密文检索 溯源方案
下载PDF
Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange
5
作者 Pawan Kumar Vipin Saxena 《Journal of Computer and Communications》 2024年第2期201-210,共10页
Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an expone... Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an exponential manner. Hybrid cryptography provides a better solution than a single type of cryptographical technique. In this paper, nested levels of hybrid cryptographical techniques are investigated with the help of Deoxyribonucleic Acid (DNA) and Paillier cryptographical techniques. In the first level, information will be encrypted by DNA and at the second level, the ciphertext of DNA will be encrypted by Paillier cryptography. At the decryption time, firstly Paillier cryptography will be processed, and then DAN cryptography will be processed to get the original text. The proposed algorithm follows the concept of Last Encryption First Decryption (LEFD) at the time of decryption. The computed results are depicted in terms of tables and graphs. 展开更多
关键词 ENCRYPTION DECRYPTION DNA paillier Cryptography Nested Levels Hybrid Cryptography
下载PDF
一种多素数和公共模数联合的Paillier优化算法
6
作者 马莉莉 阎红灿 谷建涛 《信息安全研究》 CSCD 北大核心 2024年第10期952-957,共6页
Skyline查询旨在大量数据点中选择出一组符合要求的点集合,为面向位置对象的多目标优化问题提供了关键技术.明文的Skyline查询会引发数据泄露,采取同态加密Paillier对数据进行保护,实现密文上的Skyline查询.针对Paillier加解密效率低的... Skyline查询旨在大量数据点中选择出一组符合要求的点集合,为面向位置对象的多目标优化问题提供了关键技术.明文的Skyline查询会引发数据泄露,采取同态加密Paillier对数据进行保护,实现密文上的Skyline查询.针对Paillier加解密效率低的问题,提出了多素数和公共模数联合的MPGPaillier(multiple primegenerator Paillier)算法,对算法的正确性和安全性进行证明.实验对比分析表明,在加解密效率方面,MPGPaillier比Paillier和MPPaillier(multiple primePaillier)算法有显著提升. 展开更多
关键词 SKYLINE查询 同态加密 paillier 多素数 公共模数
下载PDF
基于区块链的轻量级群智感知方案
7
作者 张虹 李笑 《太原师范学院学报(自然科学版)》 2024年第1期32-38,共7页
群智感知作为一种可持续且成本低廉的数据收集方式,被广泛应用于大规模数据收集和分析的场景.将区块链技术和群智感知系统结合可以实现群智感知系统的去中心化,有效保障感知数据的安全性.然而,区块链特有的验签和存储机制往往会造成网... 群智感知作为一种可持续且成本低廉的数据收集方式,被广泛应用于大规模数据收集和分析的场景.将区块链技术和群智感知系统结合可以实现群智感知系统的去中心化,有效保障感知数据的安全性.然而,区块链特有的验签和存储机制往往会造成网络堵塞和存储压力过大,导致群智感知系统处理效率低下.为解决这些问题,本文提出了一种基于区块链的轻量级群智感知方案.本方案使用Paillier同态加密算法对感知数据进行加密,然后使用BLS算法对其进行签名和聚合,验签成功后的加密交易被保存在IPFS上并自动生成上链存储的索引值.通过实验证明,本方案在保证用户身份和数据隐私的基础上,提高了感知用户的身份验证效率并降低了区块链系统的存储压力. 展开更多
关键词 群智感知 区块链 paillier BLS签名 IPFS
下载PDF
Paillier陷门函数的两个变体的比特安全性分析 被引量:5
8
作者 苏东 王克 吕克伟 《计算机学报》 EI CSCD 北大核心 2010年第6期1050-1059,共10页
文中对Paillier陷门函数两个变体——Rabin-Paillier和RSA-Paillier进行了比特安全分析.对于Rabin-Paillier陷门函数,文中证明了从密文计算其明文的3 2n/2+log2n个最高有效位与对这个函数求逆一样困难,其中n为RSA模数N的二进制长度.该... 文中对Paillier陷门函数两个变体——Rabin-Paillier和RSA-Paillier进行了比特安全分析.对于Rabin-Paillier陷门函数,文中证明了从密文计算其明文的3 2n/2+log2n个最高有效位与对这个函数求逆一样困难,其中n为RSA模数N的二进制长度.该结论的证明基于Boneh等人提出的素数域上的隐藏数问题的一个变体.文中使用Malykhin在2007年得到的指数和的界把该变体扩展到了Paillier模数N2的情况.对于RSA-Paillier陷门函数,该文完善了Morillo等人对于该函数明文最低有效位的困难性证明.通过设计一个随机化的算法使得Morillo等人提出的明文恢复算法在使用不完美的LSB预言机的时候也能工作. 展开更多
关键词 比特安全 paillier Rabin-paillier RSA-paillier 指数和的界 隐藏数问题
下载PDF
图像类型的保密计算
9
作者 成雯 《信息技术与信息化》 2024年第3期180-183,共4页
图像检索在涉及图像的各种应用领域具有越来越重要的地位。当进行图像检索时,在完全不同类型的图像里去检索会增加很多不必要的开销。同时很多图像中包含大量的隐私信息,如果不进行适当的保护,检索过程极易泄露隐私信息。为避免泄露隐... 图像检索在涉及图像的各种应用领域具有越来越重要的地位。当进行图像检索时,在完全不同类型的图像里去检索会增加很多不必要的开销。同时很多图像中包含大量的隐私信息,如果不进行适当的保护,检索过程极易泄露隐私信息。为避免泄露隐私信息,针对图像类型是否相同进行保密判定,基于Paillier加密算法和0-r编码方法设计了一个高效、安全的协议,该协议结合图像检索方案可以减少因不同类型的图像检索的不必要性。协议不仅简单快速,并且用模拟范例证明了其安全性。 展开更多
关键词 图像检索 安全多方计算 图像类型 paillier 0-r编码
下载PDF
基于Paillier同态加密算法的去标识化技术研究
10
作者 易涛 《中国新通信》 2024年第13期50-52,共3页
本文对Paillier同态加密算法原理进行深入研究,此外,本文还探索了在安全应用中使用同态加密算法进行数据去标识化的技术,并进行了实践验证。实验结果表明,Paillier同态加密算法能够有效地保护个人信息免受泄露和不当挖掘,将在未来的大... 本文对Paillier同态加密算法原理进行深入研究,此外,本文还探索了在安全应用中使用同态加密算法进行数据去标识化的技术,并进行了实践验证。实验结果表明,Paillier同态加密算法能够有效地保护个人信息免受泄露和不当挖掘,将在未来的大数据时代中发挥关键作用。 展开更多
关键词 paillier 同态加密 去标识化技术
下载PDF
基于同态加密的密文数据库统计模型的设计与实现 被引量:3
11
作者 陈志伟 白健 +1 位作者 杨亚涛 李子臣 《信息网络安全》 2013年第3期12-15,共4页
文章针对基于同态技术密文数据库统计的设计与实现进行了详细的阐述。文章利用同态加密技术,设计了两种对密文数据库进行精确统计和范围统计的模型,解决了服务器端密文数据检索和统计的问题,并对模型的正确性进行了证明,实验仿真证明了... 文章针对基于同态技术密文数据库统计的设计与实现进行了详细的阐述。文章利用同态加密技术,设计了两种对密文数据库进行精确统计和范围统计的模型,解决了服务器端密文数据检索和统计的问题,并对模型的正确性进行了证明,实验仿真证明了模型的可行性。 展开更多
关键词 同态加密 密文统计 RSA paillier 密文检索
下载PDF
A Privacy-preserving Algorithm for AC Microgrid Cyber-physical System Against False Data Injection Attacks 被引量:1
12
作者 Jun Yang Yu Zhang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第5期1646-1658,共13页
A new privacy-preserving algorithm based on the Paillier cryptosystem including a new cooperative control strategy is proposed in this paper, which can resist the false data injection(FDI) attack based on the finite-t... A new privacy-preserving algorithm based on the Paillier cryptosystem including a new cooperative control strategy is proposed in this paper, which can resist the false data injection(FDI) attack based on the finite-time control theory and the data encryption strategy. Compared with the existing algorithms, the proposed privacy-preserving algorithm avoids the direct transmission of the ciphertext of frequency data in communication links while avoiding complex iterations and communications. It builds a secure data transmission environment that can ensure data security in the AC microgrid cyber-physical system(CPS). This algorithm provides effective protection for AC microgrid CPS in different cases of FDI attacks. At the same time, it can completely eliminate the adverse effects caused by the FDI attack. Finally, the effectiveness, security, and advantages of this algorithm are verified in the improved IEEE 34-node test microgrid system with six distributed generators(DGs) in different cases of FDI attacks. 展开更多
关键词 AC microgrid cyber-physical system(CPS) distributed cooperative control false data injection(FDI)attack paillier cryptosystem
原文传递
基于Paillier同态的无线自组网组密钥管理方案 被引量:2
13
作者 何文才 杜敏 +2 位作者 刘培鹤 陈志伟 郑钊 《计算机科学》 CSCD 北大核心 2013年第10期114-118,共5页
基于Paillier密码体制,提出了一种安全有效的同态组密钥管理方案。该方案适用于面向群组和拓扑结构易变的无线自组网,具有抗合谋攻击性、前向保密性与后向保密性。针对无线自组网节点频繁加入和退出的特点,密文上的同态操作提高了组密... 基于Paillier密码体制,提出了一种安全有效的同态组密钥管理方案。该方案适用于面向群组和拓扑结构易变的无线自组网,具有抗合谋攻击性、前向保密性与后向保密性。针对无线自组网节点频繁加入和退出的特点,密文上的同态操作提高了组密钥更新的效率和实时性。对其正确性和安全性进行了证明。与其他组密钥管理方案相比,该方案具有交互轮数较少、通信和存储开销小、安全性高等特点。 展开更多
关键词 无线自组网 paillier 同态加密 组密钥管理
下载PDF
Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption
14
作者 Zhen Wang Qiu-yu Zhang +1 位作者 Ling-tao Meng Yi-lin Liu 《Computers, Materials & Continua》 SCIE EI 2023年第6期6161-6184,共24页
To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval accuracy.This research suggests a searchable encryption and deep ha... To solve the problem that the existing ciphertext domain image retrieval system is challenging to balance security,retrieval efficiency,and retrieval accuracy.This research suggests a searchable encryption and deep hashing-based secure image retrieval technique that extracts more expressive image features and constructs a secure,searchable encryption scheme.First,a deep learning framework based on residual network and transfer learn-ing model is designed to extract more representative image deep features.Secondly,the central similarity is used to quantify and construct the deep hash sequence of features.The Paillier homomorphic encryption encrypts the deep hash sequence to build a high-security and low-complexity searchable index.Finally,according to the additive homomorphic property of Paillier homomorphic encryption,a similarity measurement method suitable for com-puting in the retrieval system’s security is ensured by the encrypted domain.The experimental results,which were obtained on Web Image Database from the National University of Singapore(NUS-WIDE),Microsoft Common Objects in Context(MS COCO),and ImageNet data sets,demonstrate the system’s robust security and precise retrieval,the proposed scheme can achieve efficient image retrieval without revealing user privacy.The retrieval accuracy is improved by at least 37%compared to traditional hashing schemes.At the same time,the retrieval time is saved by at least 9.7%compared to the latest deep hashing schemes. 展开更多
关键词 Content-based image retrieval deep supervised hashing central similarity quantification searchable encryption paillier homomorphic encryption
下载PDF
Blockchain data secure sharing protocol based on threshold Paillier algorithm
15
作者 Likai Jia Xiubo Chen +3 位作者 Luxi Liu Xiaoge Wang Ke Xiao Gang Xu 《High-Confidence Computing》 EI 2023年第4期7-12,共6页
With the development of Internet technology,secure storage and secure sharing of data have become increasingly important.Traditional data sharing schemes exist a series of problems including lack of security and low e... With the development of Internet technology,secure storage and secure sharing of data have become increasingly important.Traditional data sharing schemes exist a series of problems including lack of security and low efficiency.In this paper,we construct a secure and efficient data sharing scheme based on threshold Paillier algorithm and blockchain technology,which achieves secure data storage and sharing without a third-party institution.Firstly,we propose a(t,l)threshold Paillier blockchain data sharing scheme,which effectively prevents decryption failures caused by the loss of a single node’s private key.Secondly,we propose a combined on-chain and off-chain data storage scheme,we store the ciphertext on the cloud server and the ciphertext hash value on the blockchain,which not only ensures the integrity of the data but also solves the storage limitation problem on the blockchain.Finally,we use the simulation paradigm to prove the security of the scheme in the semi-honest model.The discussion results of the comparison and the analysis of performance show that the blockchain data security sharing scheme proposed in this paper has lower computational overhead and higher security than other similar schemes. 展开更多
关键词 Blockchain Secure sharing data Privacy protection Threshold paillier cryptosystem
原文传递
A Homomorphic Crypto System for Electronic Election Schemes 被引量:1
16
作者 Kannan Balasubramanian M. Jayanthi 《Circuits and Systems》 2016年第10期3193-3203,共11页
This research investigates the applications of homomorphic encryption systems in electronic voting schemes. We make use of Paillier cryptosystem which exhibits additive homomorphic properties. The other homomorphic cr... This research investigates the applications of homomorphic encryption systems in electronic voting schemes. We make use of Paillier cryptosystem which exhibits additive homomorphic properties. The other homomorphic cryptosystems RSA and Elgamal are not considered, since they exhibit only multiplicative homomorphic property. Our proposed method increases the level of security when compared to Elgamal method. It is more flexible when compared to previous schemes. We also propose data packing for efficient storage of election data. Finally, we demonstrate the advantages of the homomorphic encryption in voting schemes by comparing with other electronic voting scheme. 展开更多
关键词 Electronic Voting Public Key Homomorphic paillier Data Packing
下载PDF
基于n次复合剩余的群签名方案
17
作者 李子臣 张玉龙 杨亚涛 《北京电子科技学院学报》 2014年第4期1-6,共6页
paillier密码体制是建立在n次复合剩余问题上的公钥密码体制,paillier在提出该公钥密码体制的同时也给出了基于paillier的数字签名方案。本文基于paillier的数字签名方案,提出了一种新的数字签名方案。与原有基于paillier的数字签名方... paillier密码体制是建立在n次复合剩余问题上的公钥密码体制,paillier在提出该公钥密码体制的同时也给出了基于paillier的数字签名方案。本文基于paillier的数字签名方案,提出了一种新的数字签名方案。与原有基于paillier的数字签名方案相比,新的签名方案的签名效率和安全性有了很大提高。基于该数字签名方案,本文设计了一种有效的群签名方案,并给出了安全性的证明。 展开更多
关键词 复合剩余类问题 paillier 密码体制 数字签名 群签名
下载PDF
Security of account and privacy of transaction for bitcoin
18
作者 Liu Zhenhua Yuan Dong +1 位作者 Liu Yaohui Li Yuanyuan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第5期20-30,48,共12页
As a kind of cryptocurrency, bitcoin has attracted much attention with its decentralization. However, there is two problems in the bitcoin transactions : the account security and transaction privacy. In view of the a... As a kind of cryptocurrency, bitcoin has attracted much attention with its decentralization. However, there is two problems in the bitcoin transactions : the account security and transaction privacy. In view of the above problems, a new partially blind threshold signature scheme is proposed, which can both enhance the security of bitcoin account and preserve the privacy of transaction. Firstly, transaction amounts are encrypted by employing the homomorphic Paillier cryptosystem, and output address is disturbed by using one-time public key. Then the encrypted or disrupted transaction information is signed by multiple participants who are authorized by using threshold secret sharing. Compared with partially blind fuzzy signature scheme, the proposed scheme can fully preserve the transaction privacy. Furthermore, performance analysis shows that the proposed scheme is secure and effective in practical applications. 展开更多
关键词 bitcoin account security threshold secret sharing transaction privacy one-time public key paillier cryptosystem
原文传递
A secure threshold Paillier proxy signature scheme 被引量:2
19
作者 Pei-yih TING Chia-huei HSEU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第3期206-213,共8页
As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a... As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledgedsecure digital world,secure implementations of more commercial activity primitives are required. In this paper,we present asecure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem,which can be used inmany e-commerce applications such as e-voting,e-bidding/auction,and privacy-preserving data mining. These two schemes areexistentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it isbased on factoring,the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus,these twoschemes are practical for integration in modularized secure multi-party protocols. 展开更多
关键词 paillier proxy signature Threshold scheme Secure multi-party protocols Cryptographic primitives
原文传递
EPMDA:an efficient privacy-preserving multi-dimensional data aggregation scheme for edge computing-based IoT system 被引量:1
20
作者 Tao Yunting Kong Fanyu Yu Jia 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第6期26-35,共10页
In order to perform multi-dimensional data aggregation operations efficiently in edge computing-based Internet of things(IoT) systems, a new efficient privacy-preserving multi-dimensional data aggregation(EPMDA) schem... In order to perform multi-dimensional data aggregation operations efficiently in edge computing-based Internet of things(IoT) systems, a new efficient privacy-preserving multi-dimensional data aggregation(EPMDA) scheme is proposed in this paper. EPMDA scheme is characterized by employing the homomorphic Paillier encryption and SM9 signature algorithm. To improve the computation efficiency of the Paillier encryption operation, EPMDA scheme generates a pre-computed modular exponentiation table of each dimensional data, and the Paillier encryption operation can be implemented by using only several modular multiplications. For the multi-dimensional data, the scheme concatenates zeros between two adjacent dimensional data to avoid data overflow in the sum operation of ciphertexts. To enhance security, EPMDA scheme sets random number at the high address of the exponent. Moreover, the scheme utilizes SM9 signature scheme to guarantee device authentication and data integrity. The performance evaluation and comparison show that EPMDA scheme is more efficient than the existing multi-dimensional data aggregation schemes. 展开更多
关键词 multi-dimensional data aggregation paillier cryptosystem Internet of things(IoT) edge computing-based
原文传递
上一页 1 2 5 下一页 到第
使用帮助 返回顶部