Resource Type

Journal Article 8

Year

2023 1

2022 2

2021 1

2019 1

2018 2

2017 1

Keywords

Provable security 2

Adaptive watermarking 1

Bilinear pairing 1

CCA2 security 1

Certificateless aggregate signcryption 1

Certificateless cryptosystem 1

Certificateless multi-signature 1

Certificateless public key encryption with keyword search 1

Certificateless public-key encryption 1

Chaotic systems 1

Cloud-fog cooperation 1

Color medical image 1

Computational Diffie-Hellman problem 1

Decisional Diffie-Hellman 1

Elliptic curve 1

Embedded systems 1

Encryption 1

Fractional transform 1

Homomorphic hash function 1

open ︾

Search scope:

排序: Display mode:

Low-computation certificateless hybrid signcryption scheme Article

Hui-fang YU, Bo YANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7,   Pages 928-940 doi: 10.1631/FITEE.1601054

Abstract: In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme.

Keywords: Hybrid signcryption     Scalar multiplication     Certificateless cryptosystem     Provable security    

Certificateless broadcast multi-signature for network coding Research Article

Huifang YU, Zhewei QI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1369-1377 doi: 10.1631/FITEE.2200271

Abstract: To solve these problems, the certificateless broadcast multi-signature for (NC-CLBMS) method is devised

Keywords: Network coding     Certificateless multi-signature     Linear combination     Homomorphic hash function    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Certificateless cryptography (CLC) is a novel cryptographic primitive that has many merits.Motivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: performance, a new construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7,   Pages 940-956 doi: 10.1631/FITEE.2000071

Abstract: Healthcare and telemedicine industries are relying on technology that is connected to the Internet. Digital health data are more prone to cyber attacks because of the treasure trove of personal data they possess. This necessitates protection of digital medical images and their secure transmission. In this paper, an encryption technique based on mutated with Lorenz and Lü is employed to generate high pseudo-random key streams. The proposed chaos- cryptic system operates on the integer wavelet transform (IWT) domain and a bio-inspired , unit for enhancing the confusion and diffusion phase in an approximation coefficient. Finally, an XOR operation is performed with a quantised chaotic set from the developed combined attractors. The algorithm attains an average entropy of 7.9973, near-zero correlation with an NPCR of 99.642%, a UACI of 33.438%, and a keyspace of 10. Further, the experimental analyses and NIST statistical test suite have been designed such that the proposed technique has the potency to withstand any statistical, differential, and brute force attacks.

Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗    

A power resource dispatching framework with a privacy protection function in the Power Internet of Things Research Article

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1354-1368 doi: 10.1631/FITEE.2100518

Abstract: Smart meters in the generate a large amount of power data. However, data privacy in the process of calculation, storage, and transmission is an urgent problem to be solved. Therefore, in this paper we propose a power resource dispatching framework (PRDF) with a privacy protection function, which uses a scheme based on . Using pseudonyms and aggregating users’ power data, PRDF not only protects users’ privacy, but also reduces the computing cost and communication overhead under traditional cloud computing. In addition, if the control center finds that a user has submitted abnormal data, it can send a request to the user management center to track the real identity of the user. Our scheme satisfies security requirements based on the , including confidentiality and unforgeability. Furthermore, we compare our scheme with other schemes by simulations. Simulation results show that compared with traditional methods, our method performs better in terms of the computation cost.

Keywords: Power Internet of Things     Cloud-fog cooperation     Elliptic curve     Random oracle model     Certificateless    

Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation None

Rodrigo MÉNDEZ-RAMÍREZ, Adrian ARELLANO-DELGADO, César CRUZ-HERNÁNDEZ, Fausto ABUNDIZ-PÉREZ, Rigoberto MARTÍNEZ-CLARK

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2,   Pages 165-179 doi: 10.1631/FITEE.1601346

Abstract: The current massive use of digital communications demands a secure link by using an embedded system (ES) with data encryption at the protocol level. The serial peripheral interface (SPI) protocol is commonly used by manufacturers of ESs and integrated circuits for applications in areas such as wired and wireless communications. We present the design and experimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocol. The design of the chaotic encryption algorithm along with its counterpart in the decryption is based on the chaotic Hénon map and two methods for blur and permute (in combination with DNA sequences). The SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric key. Results are experimentally proved using two low-cost dsPIC microcontrollers as ESs. The SPI digital-to-analog converter is used to process, acquire, and reconstruct confidential messages based on its properties for digital signal processing. Finally, security of the cryptogram is proved by a statistical test. The digital processing capacity of the algorithm is validated by dsPIC microcontrollers.

Keywords: Chaotic systems     Statistical tests     Embedded systems     dsPIC microcontroller     Serial peripheral interface (SPI) protocol    

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Research Article

Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7,   Pages 1045-1061 doi: 10.1631/FITEE.2200372

Abstract: algebra has been used to apply the fractional Fourier transform (FrFT) to color images in a comprehensive approach. However, the discrete fractional random transform (DFRNT) with adequate basic randomness remains to be examined. This paper presents a novel multistage privacy system for s based on discrete fractional Fourier transform (DQFrFT) watermarking and . First, we describe DFRNT (QDFRNT), which generalizes DFRNT to handle signals effectively, and then use QDFRNT to perform . To efficiently evaluate QDFRNT, this study derives the relationship between the QDFRNT of a signal and the four components of the DFRNT signal. Moreover, it uses the human vision system’s (HVS) masking qualities of edge, texture, and color tone immediately from the color host image to adaptively modify the watermark strength for each block in the using the QDFRNT-based and support vector machine (SVM) techniques. The limitations of watermark embedding are also explained to conserve watermarking energy. Second, 3D-CLM is employed to improve the system’s security and efficiency, allowing it to be used as a multistage privacy system. The proposed security system is effective against many types of channel noise attacks, according to simulation results.

Keywords: Color medical image     Quaternion     Adaptive watermarking     Encryption     Fractional transform     Three-dimensional chaotic logistic map (3D-CLM)    

Title Author Date Type Operation

Low-computation certificateless hybrid signcryption scheme

Hui-fang YU, Bo YANG

Journal Article

Certificateless broadcast multi-signature for network coding

Huifang YU, Zhewei QI

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Journal Article

A power resource dispatching framework with a privacy protection function in the Power Internet of Things

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Journal Article

Chaotic digital cryptosystem using serial peripheral interface protocol and its dsPIC implementation

Rodrigo MÉNDEZ-RAMÍREZ, Adrian ARELLANO-DELGADO, César CRUZ-HERNÁNDEZ, Fausto ABUNDIZ-PÉREZ, Rigoberto MARTÍNEZ-CLARK

Journal Article

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services

Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com

Journal Article