您的位置: 专家智库 > >

国家自然科学基金(60970006)

作品数:4 被引量:4H指数:1
相关作者:王潮张焕国江钟贾徽徽汪敏更多>>
相关机构:上海大学武汉大学教育部更多>>
发文基金:国家自然科学基金上海市教育委员会重点学科基金教育部重点实验室开放基金更多>>
相关领域:电子电信自动化与计算机技术更多>>

文献类型

  • 4篇期刊文章
  • 1篇会议论文

领域

  • 5篇电子电信
  • 3篇自动化与计算...

主题

  • 1篇多输出
  • 1篇多输入多输出
  • 1篇多输入多输出...
  • 1篇信号
  • 1篇信号检测
  • 1篇蚁群
  • 1篇蚁群算法
  • 1篇身份认证
  • 1篇似然
  • 1篇轻量
  • 1篇轻量级
  • 1篇群算法
  • 1篇最大似然
  • 1篇最大似然检测
  • 1篇网络
  • 1篇无线传感
  • 1篇无线传感器
  • 1篇无线传感器网
  • 1篇无线传感器网...
  • 1篇量子

机构

  • 3篇上海大学
  • 2篇武汉大学
  • 1篇教育部

作者

  • 3篇王潮
  • 2篇张焕国
  • 1篇汪敏
  • 1篇贾徽徽
  • 1篇江钟

传媒

  • 2篇Tsingh...
  • 2篇中国科学:信...

年份

  • 1篇2017
  • 1篇2015
  • 2篇2013
  • 1篇2010
4 条 记 录,以下是 1-5
排序方式:
一种基于演化密码和HMM改进的Koblitz安全曲线产生新方法被引量:1
2013年
考虑未来云计算攻击和量子计算机攻击,需要储备安全强度更高的ECC安全曲线.利用隐Markov模型(HMM)预测迹向量解决基点计算难题,完善基于演化密码思想提出的Koblitz安全曲线产生新算法,完成了F(2 2000)以内Koblitz安全曲线的搜索实验,产生的安全曲线基域的覆盖范围、曲线的规模和产生效率均超过美国NIST的公开报道参数.可提供的安全曲线的基域和基点最高超过1900bit,远超过美国NIST公布的571bit.在NIST公布的F(2163)-F(2571)范围之间还有新的安全曲线发现.对产生的安全曲线进行了详细的安全分析,表明与NIST推荐的安全曲线具有相同的安全准则.
王潮张焕国刘礼黎
关键词:蚁群算法
Evolutionary Cryptography Theory-Based Generating Method for Secure ECs被引量:3
2017年
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm. It seems that there is no relationship between cryptography and ACO. Actually, some problems in cryptography are due to optimization grouping problems that could be improved using an evolutionary algorithm. Therefore, this paper presents a new method of solving secure curve selection problems using ACO. We improved Complex Multiplication (CM) by combining Evolutionary Cryptography Theory with Weber polynomial solutions. We found that ACO makes full use of valid information generated from factorization and allocates computing resource reasonably. It greatly increases the performance of Weber polynomial solutions. Compared with traditional CM, which can only search one root once time, our new method searches all roots of the polynomial once, and the average time needed to search for one root reduces rapidly. The more roots are searched, the more ECs are obtained.
Chao WangFeng HuHuanguo ZhangJie Wu
关键词:ECS
Byzantine Fault-Tolerant Routing for Large-Scale Wireless Sensor Networks Based on Fast ECDSA被引量:1
2015年
Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. The Byzantine Generals Problem is one of the classical problems in the area of fault tolerance, and has wide application, especially in distributed databases and systems. There is a lot of research in agreement and replication techniques that tolerate Byzantine faults. However, most of this work is not suited to large-scale wireless sensor networks, due to its high computational complexity. By introducing Fast ECDSA(Elliptic Curve Digital Signature Algorithm), which can resist timing and energy attacks, and reduce the proportion of verifying signature algorithm to generating signature algorithm to 1.2 times, we propose a new Byzantine fault-tolerant routing algorithm for large-scale wireless sensor networks with double-level hierarchical architecture. In different levels, the algorithm runs different BFT protocols.Theory and simulation results have proved that this algorithm has high security and the number of communication rounds between clusters is reduced by 1/3, which balances the network load. At the same time, the application of Fast ECDSA improves the security level of the network without burdening it.
Jiawei XuKeda WangChao WangFeng HuZhenhua ZhangShiyi XuJie Wu
WSN中基于身份的分散密钥管理研究
针对无线传感器网络,采用基于身份的理念,提出一种新的分布式基于身份的密钥管理方案:不需要在线认证中心,通过网络中的节点自发共举产生通信组密钥,引入ZSS签名方案,实现通信各个节点间的双向认证,结合门限密码机制提高系统的健...
王潮张振华应仲平徐拾义牛志华
关键词:无线传感器网络密钥管理轻量级身份认证
文献传递
基于量子Grover算法的VBLAST系统信号检测
2013年
VBLAST系统中最大似然检测具有最优的检测性能,但是计算复杂度是一个NP难题.将量子Grover算法及Grover-Long算法用于VBLAST系统最大似然检测中,对算法的复杂度和性能进行了仿真分析,仿真结果表明Grover检测算法不仅能够对计算复杂度起到平方加速的效果,而且算法的检测性能逼近最大似然检测性能.
汪敏贾徽徽江钟张焕国王潮
关键词:多输入多输出技术
共1页<1>
聚类工具0