Font Size: a A A

Research On Key Security Based On Compressed Sensing

Posted on:2020-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:P ZhangFull Text:PDF
GTID:2428330602950340Subject:Cryptography
Abstract/Summary:PDF Full Text Request
In recent years,the theory of compressed sensing has been widely studied and developed in cryptography.Its inherent high-speed sampling and compression structure can not only ensure the security of transmitted information,but also solve the communication bandwidth and storage pressure faced by massive data communication.Therefore,there are new development opportunities in the direction of Internet of Things and cloud encryption.However,the application of compressed sensing is very promising,there are still some security issues that need to be solved.Although the existing compressed sensing encryption scheme can provide certain encryption and compression functions,the security transmission problem of the key cannot be solved in specific practical applications.Therefore,how to design an efficient and secure encryption scheme to ensure the security of user privacy data while realizing the secure transmission of keys is the main challenge faced by compressed sensing encryption systems in practical applications.Therefore,for the two aspects,the main contributions of the paper are as follows:Firstly,aiming at the problem of key security distribution in compressed sensing encryption system,an anonymous traitor tracking scheme based on compressed sensing is proposed under the cloud encryption model.The combination of compressed sensing and traitor tracking technology solves the problem of secure distribution of encryption and decryption keys and anonymous authentication of users in the system,and realizes the function of tracking traitors of leaked keys in a group.At the same time,according to the characteristics of compressed sensing approximate accuracy recovery,ciphertext-based authentication and energy encryption structure are designed to ensure the security of ciphertext transmission.In addition,the user's efficient revocation,recovery and addition algorithms are designed in the scheme.Once the users need to be revoked,restored and added,the algorithm can be effectively executed to achieve efficient supervision.Finally,the safety performance of the design scheme is fully verified by system simulation.Secondly,in order to solve the problem of key security sharing in the compressed sensing encryption system,a compressed sensing encryption scheme is proposed to realize key sharing and error control under the Internet of things model.The designed security key sharing method between users solves the problem that the encryption and decryption key can only be secretly shared among users in the existing compressed sensing encryption scheme.At the same time,two fault-tolerant probability models are designed,and an appropriate fault-tolerant probability scheme can be designed according to the probability of cloud server failure.Aiming at the security threats faced by the three levels of the Internet of Things system,an anonymous identity authentication and information authentication method is designed to ensure the security of the scheme in the application of the Internet of Things system,and the detailed security proof of the scheme is given.In addition,the method of replacing the random matrix with the replacement vector in the compressed sensing encryption process not only improves the recovery performance of the scheme,but also greatly reduces the loss of the storage space.Finally,the safety and feasibility of the design scheme are verified by simulation experiments.
Keywords/Search Tags:Compressed Sensing, Internet of Things, Cloud Encryption, Authentication and Key Exchange, Traitor Tracing
PDF Full Text Request
Related items