实验室图片
CryptoSeekerLab

实验室图片

CryptoSeekerLab

密码学创新研究实验室

实验室简介

CryptoSeekerLab(密码学创新研究实验室)是来自浙江理工大学信息科学与工程学院(网络空间安全学院)的一支聚焦密码学前沿领域、致力于解决网络空间安全核心问题的优秀科研团队。实验室秉承"探索密码技术,守护数字未来"的使命,围绕应用密码学、后量子密码学、侧信道攻击三大研究方向开展创新性研究,致力于推动密码学理论突破与工程实践的结合。CryptoSeekerLab以服务国家网络安全战略需求为导向,持续探索密码学领域的基础理论与关键技术,培养兼具国际视野与工程能力的复合型人才。未来,团队将继续深耕密码学创新生态,为应对数字化时代的隐私保护、数据安全与量子威胁挑战提供中国方案。

学术快讯

欢迎来到CryptoSeekerLab的学术快讯板块!这里是实验室科研成果的前沿阵地,汇聚了我们团队近期在学术领域的最新探索与突破。每一项发表的论文都凝聚着团队成员的智慧与心血,都已被接收于通信和网络安全等领域的国内外著名期刊。从基础理论的深入剖析到前沿技术的实践应用,这些成果不仅推动了学科发展,也为相关领域的研究者提供了宝贵的参考与借鉴。我们将持续更新,第一时间与您分享实验室的学术动态,期待与您一同见证科研的点滴进步,探索未知的广阔天地!

实验室论文"'A New Asymmetric Three-Party Key Agreement Protocol Based on Secure Multiparty Computation"

被接收于:The 15th International Symposium on Cyberspace Safety and Security

摘要:As demand for data privacy and secure communication grows in areas like the Internet of Things, healthcare, and smart city infras tructure. A reliable way to achieve these requirements is key agreement. Current key agreement protocols often struggle to handle the wide gap in computing power between terminal devices and servers. To tackle this issue, this paper proposes a novel Asymmetric Three-Party Key Agree ment Protocol Based on Secure Multiparty Computation. By merging the Diffie-Hellman key exchange mechanism with the complexity of Sub set Product Problem (NP-complete), the scheme strategically offloads heavy computation to high-performance nodes, while terminals with lim ited resources only carry out necessary lightweight operations. This ap proach significantly reduces the overall computational and communica tion load without compromising security in the key negotiation process. Meanwhile, the design incorporates a trusted third party (TTP) solely for assisting in key generation and final result computation, enhancing anonymity and privacy protection without revealing any party’s data sources.

作者:Shanchuan Pang, Quanrun Li, Jiaming Wen and Hu Ma

关键词:Trusted Third Party,Asymmetric Computing Resources,Key Exchange Protocol,Subset Product Problem

实验室论文"Provably Secure and Efficient One-to-Many Authentication and Key Agreement Protocol for Resource-Asymmetric Smart Environments"

被接收于:IEEE Internet of Things Journal

摘要:The smart environment is a crucial application of the Internet of Things(IoT). Due to its growing security and efficiency needs, recent years have seen the proposal of numerous authentication and key agreement (AKA) protocols. Unfortunately, most of existing AKA protocols only support one-to-one AKA and rely on the elliptic curve cryptosystem, resulting in huge overhead. In addition, these protocols fail to consider the resource-asymmetric characteristics of this scenario. That is, the resources on the gateway side are abundant, while the resources on user sides and device sides are limited. In order to achieve efficient and secure one-to-many AKA establishment in this scenario, where one-to-many means that users can realize key agreements with multiple smart devices at the same time. For the first time, this paper uses the one-to-many computing structure of the Chinese Remainder Theorem (CRT) to design an efficient one-to-many AKA establishment, which is perfectly adapted to resource-asymmetric allocation in smart environments. Compared with existing solutions, this solution has the following advantages. Firstly, our protocol is suitable for resource-asymmetric environments, where the gateway acts as an intermediate node and uses rich resources to integrate multiple AKA requests. Secondly, the solution supports users to negotiate session keys with multiple smart devices at the same time. Thirdly, we prove the protocol’s security under the Real-or-Random (ROR) model. In addition, we perform formal security verification of the protocol using the Automated Validation of Internet Security Protocols and Applications(AVISPA) tool. Finally, the security and efficiency of this solution are superior to similar solutions. Specifically, our solution can meet 18 security and functionality requirements. Compared with the latest similar scheme, assuming that the number of smart devices is 10, our scheme reduces the computational cost by 75.75%. At the same time, in terms of communication cost, our protocol reduces it by 37.78%.

作者:Long Li, Chingfang Hsu, Jianqun Cui, Man Ho Au, Lein Harn, Quanrun Li

关键词:Authentication and key agreement,Chebyshev chaotic map, Chinese remainder theorem,Resource-asymmetric smart environments,Multi-IoT-device Multi-IoT-device

实验室论文"Two-round Identity-based Proxy Blind Signature Scheme on Lattices"

被接收于:IEEE Internet of Things Journal

摘要:As Internet technology develops swiftly, the significance of privacy protection is escalating in the realms of e-commerce, e-government and software security. Due to the combination of the benefits of proxy signatures and blind signatures, the proxy blind signature scheme not only distributes the workload across application networks but also effectively safeguards the confidentiality of sensitive information. Additionally, the identity-based proxy blind signature protocol can avoid the problem of heavy certificate management and is widely used in electronic commerce and other scenarios. However, some identity-based proxy blind signature protocols that rely on the large integer factorization problem and the discrete logarithm problem are unable to withstand from attacks from quantum computers. Furthermore, current lattice-based proxy blind signature protocols offer only heuristic security and require three rounds of information exchange during the signing phase. In this paper, we introduce a new two-round identity-based proxy blind signature scheme based on lattices. This scheme utilizes a zero-knowledge proof protocol on lattices as its core component to develop an interactive two-round signature scheme that is free from security proof vulnerabilities. Additionally, we validate the security of the proposed protocol within the random oracle model and conduct a performance analysis.

作者:Quanrun Li, Jian Shen, Chao Lin, Zhichao Wang, Debiao He

关键词:Proxy signature, Blind sighanture, Lattices, Two Round, Interactive signature protocol, Security proof

论文标题 4

被接收于:IEEE Internet of Things Journal

摘要:这里是论文 4 的摘要内容。

作者:吴九, 郑十

关键词:智能合约, 区块链安全

论文标题 5

被接收于:IEEE Internet of Things Journal

摘要:这里是论文 5 的摘要内容。

作者:孙十一, 李十二

关键词:联邦学习, 差分隐私

加入我们

探索密码学的未来,成为创新研究的一员。

欢迎对科研有兴趣的本科生、研究生加入我们,如果你对我们的研究方向感兴趣,请将自己的简历发送立即发送简历至:616560359@qq.com