针对量子计算机特点的公钥密码理论与关键技术研究

项目来源

国家自然科学基金(NSFC)

项目主持人

张焕国

项目受资助机构

武汉大学

立项年度

2013

立项时间

未公开

项目编号

61332019

项目级别

国家级

研究期限

未知 / 未知

受资助金额

300.00万元

学科

信息科学-计算机科学-信息安全

学科代码

F-F02-F0206

基金类别

重点项目

关键词

信息安全 ; 公钥密码 ; 量子密码 ; 量子计算 ; 密码学 ; Information Security ; Cryptography ; Public Key Cryptosystem ; Quantum Computing ; Quantum Cryptography

参与者

曾贵华;王潮;徐旭;雷咏梅;孟庆树;王张宜;王后珍;汪超;黄鹏

参与机构

上海交通大学;上海大学

项目标书摘要:量子计算技术已经取得重要进展,对我们现用的公钥密码构成严重威胁。本项目以构建量子计算环境下的公钥密码为目标,采用数学和物理两种技术手段,坚持理论与实践相结合。通过研究将提出基于数据复杂性的密码设计新思想,初步建立量子计算环境下公钥密码的一些基本理论,设计出一种基于数据复杂性的公钥密码安全增强框架和密码算法及一种安全高效的量子公钥密码算法和量子签名算法。利用这一框架可以将现有公钥密码(RSA,ECC,EIGamal)增强为可抵抗量子计算机攻击的公钥密码。并建立模拟验证系统,优化密码框架和算法,模拟量子计算机对ECC密码的攻击,为评估我国二代居民身份证密码安全提供数据依据。.本项目基于数据复杂性设计密码和通过安全增强框架将现有公钥密码增强为可抵抗量子计算机攻击的密码的思想与方法,及研究成果都具有明显的创新性。本申请团队对此已经具有较好的研究基础,可以圆满完成项目。

Application Abstract: Now the technology of quantum computer has been developed rapidly and has threatened the security of public-key cryptosystems used widely in the world.This project targets on designing public-key cryptosystems in quantum computing environment,uses two key techniques of mathematics and physics and combines theory with practice.After researching,the new idea of design public-key cryptosystems besed on data complexity thoery will be proposed,some base theory of designing public-key cryptosystems in quantum computing environment will be established,a type of architecture to strengthen security of public-key cryptosysytem and an algorithm will be proposed,also a type of secre and effective quantu public-key cryptosystem and quantu signature algorithm will be given.Using the architecture to strengthen security of public-key cryptosysytem can convert RSA and ECC and EIGamal into secre public-key cryptosystem in quantum computing environment.Furthermore,this project will build the system of monitor experiment to optimize designed architecture and algorithm of cipher and monitor quantum computer attack to ECC so as to give experiment data for evaluating the security of identification card of China.Not only the new idea of design public-key cryptosystems besed on data complexity thoery and the architecture to strengthen security of public-key cryptosysytem,but also other achievements of this project are innovative.Our team have well base of research and can establish successfully this project.

项目受资助省

湖北省

项目结题报告(全文)

本项目研究量子计算环境下安全密码的理论与关键技术,全面完成了项目任务书预定的研究工作,并有较多扩展,取得了许多原创性成果,超过了项目任务书的预期成果目标。具体成果如下:武汉大学项目组研究了量子计算复杂性等理论,得到了一些新的结论。提出了基于数据复杂性设计抗量子计算密码的思想和技术路线,并实际设计出一种基于数据复杂性的公钥密码安全增强框架和一种公钥密码算法。分析破译了多个传统密码和密码协议或发现了其安全弱点。攻击RSA密码的成功率高于Short算法。对 MD 类哈希函数的安全量子计算分析,提高了人们对量子计算环境下对称密码安全性的认识。提出了计算资源非对称环境下的密码新概念,并实际设计出两种适应计算资源非对称环境下的密码协议。上海交通大学项目组主要在混合量子密码体制框架下的协议设计与技术实现以及相关的安全性方面开展了深入系统研究。包括基于连续变量的安全量子密码体制中的量子密钥分发方案设计与优化、方案实验技术实现和方案实际安全性分析等,在核心理论和实验实现方面取得了重要突破,并开展了应用研究。在国际上首次完成了安全传输距离达到150km及安全密钥率达到1Mbps@25km的连续变量量子密钥分发实验,分别创造了最长安全传输距离和最高安全密钥率的连续变量量子密码通信世界纪录;国际上首次实验实现了本地本振量子密钥分发,开启了连续变量量子密码通信的技术实现新模式。上海大学项目组的研究工作取得原创性理论结果:在国际上首次提出量子计算密码设计,取得原创性理论成果,并采用加拿D-wave 2000Q完成全球首次量子计算机密码设计实验。采用D-wave量子计算机原理量子退火进行RSA公钥密码攻击实验,获得了国际上公开文献量子计算攻击RSA最好实验指标,超过一些大公司量子计算平台Shor算法的实际攻击能力。建立模拟验证系统,模拟量子计算机对公钥密码的攻击,论证了二代身份证密码安全。

  • 排序方式:
  • 29
  • /
  • 1.基于CSAtt-GraphSAGE双通道特征加权融合的企业内部网络威胁检测方法

    • 关键词:
    • 企业内部网络威胁检测;自注意力机制;GraphSAGE;卷积神经网络;特征融合
    • 罗燕燕;刘子傲;谢媛媛;纪祥敏
    • 2025年
    • 期刊

    针对许多研究注重于用户个体行为分析,忽略了用户之间潜在关联关系的问题,提出一种基于双通道特征加权融合的企业内部网络威胁检测方法。首先,在Intra通道采用CSAtt分析用户个体行为特征的内在联系和增强关键特征的表达能力;其次,在Inter通道将用户行为特征与用户关联关系抽象成异构图,并借助GraphSAGE捕捉图中关联用户节点间的群体行为模式;然后,引入可学习因子将不同通道获取的特征信息进行加权融合,使后续分类任务不仅能关注到与恶意操作相关的关键特征,还补充了对群体行为模式的分析,以提高整体模型检测性能。在CMU-CERTr4.2数据集上的实验表明,提出的双通道特征加权融合方法在解决企业内部网络威胁检测问题上具备有效性和普遍适用性,最终检测效果在准确率、精确率和F1值分别达到95.67%、96.32% 和95.37%。

    ...
  • 2.TransECA-Net: A Transformer-Based Model for Encrypted Traffic Classification

    • 关键词:
    • convolutional neural network; deep learning; encrypted traffic; trafficclassification; transformer;NEURAL-NETWORKS
    • Liu, Ziao;Xie, Yuanyuan;Luo, Yanyan;Wang, Yuxin;Ji, Xiangmin
    • 《APPLIED SCIENCES-BASEL》
    • 2025年
    • 15卷
    • 6期
    • 期刊

    Featured Application Classification of encrypted traffic. Abstract Encrypted network traffic classification remains a critical component in network security monitoring. However, existing approaches face two fundamental limitations: (1) conventional methods rely on manual feature engineering and are inadequate in handling high-dimensional features; and (2) they lack the capability to capture dynamic temporal patterns. This paper introduces TransECA-Net, a novel hybrid deep learning architecture that addresses these limitations through two key innovations. First, we integrate ECA-Net modules with CNN architecture to enable automated feature extraction and efficient dimension reduction via channel selection. Second, we incorporate a Transformer encoder to model global temporal dependencies through multi-head self-attention, supplemented by residual connections for optimal gradient flow. Extensive experiments on the ISCX VPN-nonVPN dataset demonstrate the superiority of our approach. TransECA-Net achieved an average accuracy of 98.25% in classifying 12 types of encrypted traffic, outperforming classical baseline models such as 1D-CNN, CNN + LSTM, and TFE-GNN by 6.2-14.8%. Additionally, it demonstrated a 37.44-48.84% improvement in convergence speed during the training process. Our proposed framework presents a new paradigm for encrypted traffic feature disentanglement and representation learning. This paradigm enables cybersecurity systems to achieve fine-grained service identification of encrypted traffic (e.g., 98.9% accuracy in VPN traffic detection) and real-time responsiveness (48.8% faster than conventional methods), providing technical support for combating emerging cybercrimes such as monitoring illegal transactions on darknet networks and contributing significantly to adaptive network security monitoring systems.

    ...
  • 3.Quantum Polynomial-Time Fixed-Point Attack for RSA

    • 关键词:
    • information security; cryptography; RSA fixed-point; quantum computing
    • Wang, Yahui;Zhang, Huanguo;Wang, Houzhen
    • 《CHINA COMMUNICATIONS》
    • 2018年
    • 15卷
    • 2期
    • 期刊

    Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a well-known factoring algorithm by finding the prime factors of a number n = pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd (a(r/2) +/- 1,n) = p or q. For odd values of r it is assumed that the factors of n cannot be found (since a(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4 phi(r) / pi(2)r, exceeding that of the existing quantum algorithm for attacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed.

    ...
  • 5.Research on the Method of Using Wireless Sensing to Detect Indoor People during Fire Based on Unmanned Aerial Vehicle

    • 关键词:
    • Concretes;Fire extinguishers;Information management;Risk management;Tall buildings;Unmanned aerial vehicles (UAV);Walls (structural partitions);Aerial vehicle;Channel state;Channel-state information;High-rise building fire;Search and rescue;State sensing;Through walls;Through-wall detection;Wireless channel;Wireless signals
    • Tang, Lin;Wang, Chao;Ding, Yinfan;Zhou, Meng
    • 《Tehnicki Vjesnik》
    • 2024年
    • 31卷
    • 6期
    • 期刊

    Though improving the efficiency of urban land use, high-rise buildings greatly increase the difficulty in search and rescue during fires. Therefore, effective search and rescue in high-rise building fires has always been a hot and difficult issue in emergency management. Starting from the characteristics of high-rise building fires and the difficulties in addressing them, this paper introduced unmanned aerial vehicle (UAV) technology into search and rescue operations in fires. Based on the influences of dynamic factors on wireless signal (WS) states in a static environment, it investigated the techniques for extracting and sensing wireless channel state features when indoor personnel waves for help and proposed a method for indoor personnel detection based on channel state information (CSI) sensing. In the article, a single source wireless device (common Wi-Fi router) is used as the detection terminal to collect the wireless channel state, and the signal sampling, support vector machine (SVM), and other technologies are combined to realize the wireless channel state sensing and classification. The outcomes of the experiment revealed that the suggested approach can effectively succeed in through-wall detection and sensing for indoor personnel calling for help in the event of a fire, with an accuracy of 94.6%. Incorporating the non-invasive, robust, universal, and low-cost characteristics, the method promises broad application values in improving the search and rescue efficiency of firefighters. © 2024, Strojarski Facultet. All rights reserved.

    ...
  • 6.基于SM2和SM4的TEE下任务数据迁移方案

    • 关键词:
    • TEE 云计算 任务数据迁移 SM2 SM4 基金资助:国家自然科学基金[61332019]; 国家重点研发计划[2018YFC1604000]; “十三五”国家密码发展基金[MMJJ201701304]; 专辑:信息科技 专题:计算机软件及计算机应用 分类号:TP309 手机阅读
    • 刘芹;郭凯圆;涂航
    • 期刊

    可信执行环境(Trusted Execution Environment,TEE)技术常用于保证云服务器上用户关键任务数据的机密性和完整性,考虑云服务器的负载均衡以及服务响应延迟,往往需要对TEE下的用户关键任务数据进行迁移。为了解决TEE下任务数据迁移中如何确认迁移双方身份可信性、保证迁移数据传输安全性和提高迁移速度等问题,文章提出一种高效的TEE下任务数据安全迁移方案。该方案使用软件防护扩展(Software Guard Extension,SGX)远程认证功能对迁移双方进行身份可信性验证,并基于SM2密钥协商算法和SM4分组密码算法保证迁移数据安全传输。安全性分析表明,该方案可以确保迁移双方身份可信性和迁移数据传输安全性;仿真实验结果表明,该迁移方案能够提高TEE下任务数据迁移速度。

    ...
  • 7.嵌入式系统安全综述

    • 关键词:
    • 可信计算 嵌入式系统 脆弱性 安全 对策 综述 基金资助:国家高技术研究发展计划(863)(2015AA016002); 国家自然科学基金(61332019); 国家重点基础研究发展计划(973)(2014CB340600,2014CB340601)资助项目; DOI:10.14188/j.1671-8836.2018.02.001 专辑:基础科学 信息科技 专题:计算机硬件技术 计算机软件及计算机应用 分类号:TP309TP368.1 手机阅读
    • 赵波;倪明涛;石源;樊佩茹
    • 期刊

    针对嵌入式系统面临的安全威胁日益严重的问题,分析了嵌入式系统的特性与脆弱性.从基于硬件的侧信道、硬件木马、错误注入、微探针、硬件逆向工程等攻击和以破坏、篡改、窃取为目的的软件攻击两大层面,对嵌入式系统面临的安全威胁作了细致的阐述.分析了国内外现有的安全对策,并指出了其中的不足之处.基于可信计算思想,从理论研究模型、可信度量、可信报告、资源的可信共享与可信隔离等方面,给出了未来研究的建议.最后,提出了理想的全域联合安全增强方案,并讨论了未来的研究方向.

    ...
  • 8.基于WiFi定位的区域人群轨迹模型

    • 关键词:
    • WiFi定位 人群轨迹 三边测量定位 信号强度 位置指纹 基金资助:国家自然科学基金重点项目[61332019]; 中央引导地方科技发展专项资金项目[黔科中引地20184008]; 贵州省科技合作计划重点项目[黔科合LH字20157763]; 住房和城乡建设部科学技术计划项目[2016-K3-009]; 全国统计科学研究项目[2016LY81]; 专辑:基础科学 信息科技 专题:电信技术 分类号:TN92 手机阅读
    • 徐洋;孙建忠;黄磊;谢晓尧
    • 期刊

    针对传统的室内WiFi定位方法难以解决大型活动及区域间流动人群轨迹分析需要这一问题,提出了基于三边测量定位和信号强度(RSSI)的应用于大型场馆、复杂环境下的人群定位新方法,实现区域内人员定位、区域内外人群划分、区域内人群流量分析。使用基于一种概率统计预测算法进行人群轨迹预测,建立了WiFi区域内人群轨迹模型,通过进一步建立的跨区域人群移动轨迹模型,实现大跨度区域间人群流动分析。通过搭建WiFi区域人群轨迹模型验证系统,使用2016年贵阳数博会数据,进行了数据可视化分析,证明了模型的有效性。

    ...
  • 9.网络空间安全学科简论

    • 关键词:
    • 网络空间 网络空间安全 网络空间安全学科 学科建设 人才培养 基金资助:国家重点基础研究发展计划(973计划)基金资助项目(No.2014CB340601); 国家自然科学基金重点资助项目(No.61332019)~~; 专辑:信息科技 社会科学Ⅱ辑 专题:高等教育 互联网技术 分类号:TP393.08-4G642 手机阅读
    • 张焕国;杜瑞颖
    • 期刊

    随着信息技术与产业的高速发展和广泛应用,人类社会进入信息化时代。在信息化时代,人类生活工作在网络空间中,因此确保网络空间安全成为信息时代的基本需求。我国已经发展形成了完整的网络空间安全学科体系,因此,全面论述网络空间安全学科的体系结构与理论基础成为网络空间安全学科建设和人才培养的当务之急,内容包括:网络空间与网络空间安全的概念,网络空间安全学科的内涵,网络空间安全学科的主要研究方向及研究内容,网络空间安全学科的理论基础和方法论基础。因此,正确理解和掌握网络空间安全学科理论与体系结构,不仅对我国网络空间安全学科建设和人才培养具有十分重要的指导意义,而且对我国网络空间安全领域的科学研究和产业发展也具有十分重要的指导意义。

    ...
  • 10.Indoor Human Fall Detection Algorithm Based on Wireless Sensing

    • 关键词:
    • Wireless communication; Wireless sensor networks; Privacy; Machinelearning algorithms; Signal processing algorithms; Sensor systems;Sensors; wireless signal; channel status information; fall detection;wireless sensing
    • Wang, Chao;Tang, Lin;Zhou, Meng;Ding, Yinfan;Zhuang, Xueyong;Wu, Jie
    • 《TSINGHUA SCIENCE AND TECHNOLOGY》
    • 2022年
    • 27卷
    • 6期
    • 期刊

    As the main health threat to the elderly living alone and performing indoor activities, falls have attracted great attention from institutions and society. Currently, fall detection systems are mainly based on wear sensors, environmental sensors, and computer vision, which need to be worn or require complex equipment construction. However, they have limitations and will interfere with the daily life of the elderly. On the basis of the indoor propagation theory of wireless signals, this paper proposes a conceptual verification module using Wi-Fi signals to identify human fall behavior. The module can detect falls without invading privacy and affecting human comfort and has the advantages of noninvasive, robustness, universality, and low price. The module combines digital signal processing technology and machine learning technology. This paper analyzes and processes the channel state information (CSI) data of wireless signals, and the local outlier factor algorithm is used to find the abnormal CSI sequence. The support vector machine and extreme gradient boosting algorithms are used for classification, recognition, and comparative research. Experimental results show that the average accuracy of fall detection based on wireless sensing is more than 90%. This work has important social significance in ensuring the safety of the elderly.

    ...
  • 排序方式:
  • 29
  • /