首页 > 最新文献

AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

英文 中文
Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology 基于区块链技术的边缘计算网络数据完整性保障方法研究
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701219
I. R. Fedorov, A. A. Kovalev

In light of the rapid development of edge computing and the increase in the number of connected devices, this paper addresses the pressing issue of ensuring data integrity. The main focus is on the use of blockchain technology, which offers unique opportunities to solve this problem. This paper provides a brief overview of the existing methods and a new method for ensuring integrity based on blockchain technology. It is proposed to use the Hot Stuff consensus algorithm in the case of multiple active nodes, which ensures fast operation and scalability of the system. Particular attention is paid to the use of a secondary blockchain based on Ethereum to provide additional security and create checkpoints in large blockchain networks. This makes it possible to simplify the work of edge servers and ensure data integrity verification upon the user’s request using smart contracts. The proposed new approaches to ensure data integrity and use blockchain technology can be applied not only in the field of edge computing but also in various variations of the Internet of Things.

鉴于边缘计算的快速发展和连接设备数量的增加,本文解决了确保数据完整性的紧迫问题。重点是区块链技术的使用,它为解决这个问题提供了独特的机会。本文简要介绍了现有的完整性保障方法,并提出了一种基于区块链技术的完整性保障新方法。提出了在多活动节点情况下使用Hot Stuff共识算法,保证了系统的快速运行和可扩展性。特别注意使用基于以太坊的辅助区块链来提供额外的安全性并在大型区块链网络中创建检查点。这使得简化边缘服务器的工作成为可能,并确保根据用户的请求使用智能合约进行数据完整性验证。所提出的确保数据完整性和使用区块链技术的新方法不仅可以应用于边缘计算领域,还可以应用于物联网的各种变体。
{"title":"Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology","authors":"I. R. Fedorov,&nbsp;A. A. Kovalev","doi":"10.3103/S0146411624701219","DOIUrl":"10.3103/S0146411624701219","url":null,"abstract":"<p>In light of the rapid development of edge computing and the increase in the number of connected devices, this paper addresses the pressing issue of ensuring data integrity. The main focus is on the use of blockchain technology, which offers unique opportunities to solve this problem. This paper provides a brief overview of the existing methods and a new method for ensuring integrity based on blockchain technology. It is proposed to use the Hot Stuff consensus algorithm in the case of multiple active nodes, which ensures fast operation and scalability of the system. Particular attention is paid to the use of a secondary blockchain based on Ethereum to provide additional security and create checkpoints in large blockchain networks. This makes it possible to simplify the work of edge servers and ensure data integrity verification upon the user’s request using smart contracts. The proposed new approaches to ensure data integrity and use blockchain technology can be applied not only in the field of edge computing but also in various variations of the Internet of Things.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1422 - 1428"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of Deterministic and Stochastic Mathematical Models of Information System Protection 信息系统保护的确定性和随机数学模型的构建
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700718
O. V. Rybkina

Mathematical models are proposed for protecting an information system (IS) from information security threats (ISTs) based on the classical model of the struggle between two opponents: the Lanchester model. Using the method of constructing systems of differential equations with the given set of invariants—first integrals—a deterministic model with invariant control and a stochastic model with Wiener perturbations, a model with programmed control with a probability 1, are constructed. The behavior of systems is assessed using mathematical modeling in the MathCad environment. The behavior of the constructed models depending on the initial conditions is considered. The existence of a stochastic model of protection of an IS from ISTs, protected with a probability 1, is established.

在Lanchester模型的基础上,提出了保护信息系统免受信息安全威胁的数学模型。利用构造具有给定不变量集的微分方程组的方法,构造了一个具有不变量控制的确定性模型和一个具有Wiener摄动的随机模型,以及一个概率为1的程序控制模型。使用MathCad环境中的数学建模来评估系统的行为。考虑了构造模型在初始条件下的行为。建立了一个概率为1的IS免遭ist保护的随机模型的存在性。
{"title":"Construction of Deterministic and Stochastic Mathematical Models of Information System Protection","authors":"O. V. Rybkina","doi":"10.3103/S0146411624700718","DOIUrl":"10.3103/S0146411624700718","url":null,"abstract":"<p>Mathematical models are proposed for protecting an information system (IS) from information security threats (ISTs) based on the classical model of the struggle between two opponents: the Lanchester model. Using the method of constructing systems of differential equations with the given set of invariants—first integrals—a deterministic model with invariant control and a stochastic model with Wiener perturbations, a model with programmed control with a probability 1, are constructed. The behavior of systems is assessed using mathematical modeling in the MathCad environment. The behavior of the constructed models depending on the initial conditions is considered. The existence of a stochastic model of protection of an IS from ISTs, protected with a probability 1, is established.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1100 - 1107"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probability-Theoretical Models of Physical Random Number Generators 物理随机数发生器的概率理论模型
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700962
D. S. Bogdanov, A. S. Logachev, V. O. Mironkin

This article presents the main probability-theoretic models that describe a wide class of physical random number generators and allow us to propose general approaches to their synthesis and analysis.

本文介绍了描述一类广泛的物理随机数生成器的主要概率论模型,并允许我们提出综合和分析它们的一般方法。
{"title":"Probability-Theoretical Models of Physical Random Number Generators","authors":"D. S. Bogdanov,&nbsp;A. S. Logachev,&nbsp;V. O. Mironkin","doi":"10.3103/S0146411624700962","DOIUrl":"10.3103/S0146411624700962","url":null,"abstract":"<p>This article presents the main probability-theoretic models that describe a wide class of physical random number generators and allow us to propose general approaches to their synthesis and analysis.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1303 - 1310"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Searching for Clones of the Program Code in Binary Executive Files 在二进制执行文件中搜索程序代码克隆的方法
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700913
E. V. Zavadskii, A. V. Bulat, N. A. Gribkov

The modern trend of increasing labor productivity and business process efficiency entails the optimization of software development processes through the use of generative artificial intelligence models trained on various code bases and manual copying of code fragments. Given the growing number of registered vulnerabilities, methods for detecting clones of the software code are needed. A method for assessing the similarity of fragments of the program code of binary executable files, which is based on the representation of the code in the form of an FA-AAST tree and the apparatus of graph neural networks, is proposed. The results obtained during testing on open and closed source software demonstrate the correctness of the proposed method and higher accuracy compared to the solutions considered.

提高劳动生产率和业务流程效率的现代趋势需要通过使用在各种代码库上训练的生成人工智能模型和手动复制代码片段来优化软件开发过程。鉴于已登记的漏洞数量不断增加,需要检测软件代码克隆的方法。提出了一种基于FA-AAST树表示和图神经网络装置的二进制可执行文件程序代码片段相似性评价方法。在开源和闭源软件上的测试结果表明,所提出的方法是正确的,并且与所考虑的解决方案相比具有更高的精度。
{"title":"Method of Searching for Clones of the Program Code in Binary Executive Files","authors":"E. V. Zavadskii,&nbsp;A. V. Bulat,&nbsp;N. A. Gribkov","doi":"10.3103/S0146411624700913","DOIUrl":"10.3103/S0146411624700913","url":null,"abstract":"<p>The modern trend of increasing labor productivity and business process efficiency entails the optimization of software development processes through the use of generative artificial intelligence models trained on various code bases and manual copying of code fragments. Given the growing number of registered vulnerabilities, methods for detecting clones of the software code are needed. A method for assessing the similarity of fragments of the program code of binary executable files, which is based on the representation of the code in the form of an FA-AAST tree and the apparatus of graph neural networks, is proposed. The results obtained during testing on open and closed source software demonstrate the correctness of the proposed method and higher accuracy compared to the solutions considered.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1263 - 1270"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept 使用BYOD概念时防止移动设备的未经授权访问
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700998
A. A. Kornienko, S. V. Kornienko, N. S. Razzhivin

The problems of using mobile devices in the work process of an organization when applying the BYOD concept are analyzed. An adapted methodology for assessing security threats is proposed for BYOD concepts. As a supplement to the traditional approach to building a system for ensuring information security in a corporate information system based on BYOD, a software tool for controlling unauthorized access to mobile devices is developed and tested.

分析了企业在运用BYOD理念时,在工作过程中使用移动设备的问题。针对BYOD概念提出了一种评估安全威胁的适应性方法。在传统的基于BYOD的企业信息系统信息安全体系构建方法的基础上,开发并测试了一种控制移动设备非法访问的软件工具。
{"title":"Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept","authors":"A. A. Kornienko,&nbsp;S. V. Kornienko,&nbsp;N. S. Razzhivin","doi":"10.3103/S0146411624700998","DOIUrl":"10.3103/S0146411624700998","url":null,"abstract":"<p>The problems of using mobile devices in the work process of an organization when applying the BYOD concept are analyzed. An adapted methodology for assessing security threats is proposed for BYOD concepts. As a supplement to the traditional approach to building a system for ensuring information security in a corporate information system based on BYOD, a software tool for controlling unauthorized access to mobile devices is developed and tested.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1326 - 1335"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verification of Access Control in Big Data Systems Using Temporal Logics 基于时间逻辑的大数据系统访问控制验证
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700974
M. A. Poltavtseva, A. A. Podorov, E. B. Aleksandrova

Ensuring consistent access control is one of the key security challenges in heterogeneous big data systems. The problem is the large number of data processing tools, as well as sources and users of information; heterogeneity of security models; and complexity of granular access rules. Analysis of the time factor in this case will improve the consistency and reliability of access control. The aim of this study is to select a methodology and tools for implementing temporal logic in the processes of access control verification of big data systems. The types of temporal logic and verification methods based on the temporal logic of actions (TLAs) are analyzed. The use of TLA+ is proposed to solve the given problem and an example of the corresponding specification is given.

保证访问控制的一致性是异构大数据系统的关键安全挑战之一。问题是大量的数据处理工具,以及信息的来源和用户;安全模型的异构性;以及粒度访问规则的复杂性。对这种情况下的时间因素进行分析,可以提高访问控制的一致性和可靠性。本研究的目的是选择一种方法和工具来实现大数据系统访问控制验证过程中的时间逻辑。分析了时间逻辑的类型和基于时间动作逻辑的验证方法。提出了利用TLA+解决上述问题的方法,并给出了相应规范的实例。
{"title":"Verification of Access Control in Big Data Systems Using Temporal Logics","authors":"M. A. Poltavtseva,&nbsp;A. A. Podorov,&nbsp;E. B. Aleksandrova","doi":"10.3103/S0146411624700974","DOIUrl":"10.3103/S0146411624700974","url":null,"abstract":"<p>Ensuring consistent access control is one of the key security challenges in heterogeneous big data systems. The problem is the large number of data processing tools, as well as sources and users of information; heterogeneity of security models; and complexity of granular access rules. Analysis of the time factor in this case will improve the consistency and reliability of access control. The aim of this study is to select a methodology and tools for implementing temporal logic in the processes of access control verification of big data systems. The types of temporal logic and verification methods based on the temporal logic of actions (TLAs) are analyzed. The use of TLA+ is proposed to solve the given problem and an example of the corresponding specification is given.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1311 - 1317"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Recommendation System for Countering Network Attacks 对抗网络攻击的智能推荐系统
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701050
I. A. Goretskii, D. S. Lavrova

This paper studies an approach to counteract network attacks based on network reconfiguration to eliminate the possibility of the successful completion of an attack by an intruder. To implement this approach, it is proposed to use a recommender system mechanism that provides both the generation of possible network topologies and their ranking. The proposed intelligent recommendation system is based on a reinforcement learning algorithm based on the actor-critic model. The conducted experimental studies confirm the effectiveness of the developed system.

本文研究了一种基于网络重新配置的反网络攻击方法,以消除入侵者成功完成攻击的可能性。为了实现这种方法,本文建议使用一种推荐系统机制,该机制既能生成可能的网络拓扑结构,又能对其进行排序。所提议的智能推荐系统是基于行为批判模型的强化学习算法。实验研究证实了所开发系统的有效性。
{"title":"Intelligent Recommendation System for Countering Network Attacks","authors":"I. A. Goretskii,&nbsp;D. S. Lavrova","doi":"10.3103/S0146411624701050","DOIUrl":"10.3103/S0146411624701050","url":null,"abstract":"<p>This paper studies an approach to counteract network attacks based on network reconfiguration to eliminate the possibility of the successful completion of an attack by an intruder. To implement this approach, it is proposed to use a recommender system mechanism that provides both the generation of possible network topologies and their ranking. The proposed intelligent recommendation system is based on a reinforcement learning algorithm based on the actor-critic model. The conducted experimental studies confirm the effectiveness of the developed system.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1386 - 1391"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems 自动化安全分析系统中基于攻击图的数据表示
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701232
E. M. Orel, D. A. Moskvin, A. A. Lyashenko

A mathematical model for data representation is developed for use in automated security analysis systems. The model allows linking information about the system obtained by a specialist during the security analysis process with the set of attack scenarios in which they may be involved. Each time a scenario is applied, new information emerges, which helps expand the attack graph.

建立了用于自动安全分析系统的数据表示数学模型。该模型允许将专家在安全分析过程中获得的有关系统的信息与他们可能涉及的攻击场景集联系起来。每次应用一个场景时,都会出现新的信息,这有助于扩展攻击图。
{"title":"Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems","authors":"E. M. Orel,&nbsp;D. A. Moskvin,&nbsp;A. A. Lyashenko","doi":"10.3103/S0146411624701232","DOIUrl":"10.3103/S0146411624701232","url":null,"abstract":"<p>A mathematical model for data representation is developed for use in automated security analysis systems. The model allows linking information about the system obtained by a specialist during the security analysis process with the set of attack scenarios in which they may be involved. Each time a scenario is applied, new information emerges, which helps expand the attack graph.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1436 - 1441"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Use of Generative-Adversarial Networks to Counter Steganalysis 使用生成对抗网络来对抗隐写分析
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700937
E. B. Aleksandrova, A. I. Bezborodko, D. S. Lavrova

An approach using a generative adversarial network (GAN) is proposed to increase the robustness of the steganographic method against modern steganalyzers. This approach is based on the combined operation of a GAN, a pixel importance map, and the least significant bit (LSB) substitution method. The results of the experimental studies confirmed the effectiveness of the proposed approach.

提出了一种使用生成对抗网络(GAN)的方法来提高隐写方法对现代隐写分析器的鲁棒性。该方法是基于GAN、像素重要性图和最低有效位(LSB)替换法的组合操作。实验研究结果证实了该方法的有效性。
{"title":"The Use of Generative-Adversarial Networks to Counter Steganalysis","authors":"E. B. Aleksandrova,&nbsp;A. I. Bezborodko,&nbsp;D. S. Lavrova","doi":"10.3103/S0146411624700937","DOIUrl":"10.3103/S0146411624700937","url":null,"abstract":"<p>An approach using a generative adversarial network (GAN) is proposed to increase the robustness of the steganographic method against modern steganalyzers. This approach is based on the combined operation of a GAN, a pixel importance map, and the least significant bit (LSB) substitution method. The results of the experimental studies confirmed the effectiveness of the proposed approach.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1283 - 1288"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves 基于椭圆曲线等同源的多重签名协议的掩蔽方法
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700950
E. B. Aleksandrova, S. O. Kostin

Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is the mechanism of algebraic lattices, while the apparatus of hash functions is an alternative. Unlike isogenies of elliptic curves, these mechanisms use larger sizes of both public keys and signatures. Using the example of a multiple signature protocol based on isogenies of elliptic curves, we will show how, using the masking method, we can protect against the main attack on the given device, while obtaining a smaller signature size.

在美国国家标准与技术研究院(NIST)选择用于标准化的后量子算法中,主要的数学装置是代数格机制,而哈希函数装置是另一种选择。与椭圆曲线的同生曲线不同,这些机制使用更大的公钥和签名。通过一个基于椭圆曲线等基因的多重签名协议的例子,我们将展示如何使用掩蔽方法来防止对给定设备的主攻击,同时获得较小的签名大小。
{"title":"On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves","authors":"E. B. Aleksandrova,&nbsp;S. O. Kostin","doi":"10.3103/S0146411624700950","DOIUrl":"10.3103/S0146411624700950","url":null,"abstract":"<p>Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is the mechanism of algebraic lattices, while the apparatus of hash functions is an alternative. Unlike isogenies of elliptic curves, these mechanisms use larger sizes of both public keys and signatures. Using the example of a multiple signature protocol based on isogenies of elliptic curves, we will show how, using the masking method, we can protect against the main attack on the given device, while obtaining a smaller signature size.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1297 - 1302"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1