FBMC/OQAM Security Strategy Based on Diversity DNA Encryption
نویسندگان
چکیده
In this paper, a diversity deoxyribonucleic acid (DNA) chaotic encryption strategy is proposed to enhance the physical layer security of filter bank multi-carrier/offset quadrature amplitude (FBMC/OQAM) system. After input original binary bit stream encrypted, it subjected FBMC/OQAM modulation. The process data dynamically controlled by sequences generated hybrid system composed improved-Logistic and delayed tent sine system, which enhances robustness against malicious attacks illegal attackers. DNA expands key space 10 180 , can ensure based on transmitted 25 km standard single mode fiber. Experimental results show that effectively data.
منابع مشابه
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven based on clearly understood and accepted primitives. Here we show directly that the decision Diffie-Hellman assumption implies the security of the original ElGamal encryption scheme (with messages from a subgroup) withou...
متن کاملDNA Based Encryption Methods
In this paper, we shall point out that the DNA sequences possess some interesting properties which we can utilize to encrypt data. We presented three methods, the insertion method, the complementary pair method and the substitution method. For each method, we secretly select a reference DNA sequence S and incorporate the secret message M into it such that we obtain S’. We send this S’, together...
متن کاملDFA-Based Functional Encryption: Adaptive Security from Dual System Encryption
We present an adaptively secure functional encryption (FE) scheme based on deterministic finite automata (DFA). The construction uses composite-order bilinear pairings and is built upon the selectively secure DFA-based FE scheme of Waters (Crypto 2012). The scheme is proven secure using the dual system methodology under static subgroup decision assumptions. A dual system proof requires generati...
متن کاملOn the Security of An Identity Based Broadcast Encryption Scheme
Recently, Ren and Gu proposed a new identity-based broadcast encryption scheme, and claimed that their scheme is secure against chosen-ciphertext attack in the standard model. However, by giving a concrete attack, we indicate that Ren and Gu’s scheme is even not secure against chosen-plaintext attack. Keywordsidentity based broadcast encryption, chosen-ciphertext attack, chosen-plaintext attack...
متن کاملHomomorphic Encryption Based Data Security on Federated Cloud Computing
Cloud computing usage has increased rapidly in both industries and in research. In recent days as the data grows rapidly, in order to meet the business needs federated cloud is adopted. In federated cloud, as the data is stored and processed away from the user and the cloud service provider, privacy and integrity of the data plays a crucial role. This paper proposes a practical and efficient me...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Photonics Journal
سال: 2021
ISSN: ['1943-0655', '1943-0647']
DOI: https://doi.org/10.1109/jphot.2021.3054529