Digital Speech Encryption Using Symmetrical Homomorphic Encryption

来源 :中国密码学会2016年密码算法会议 | 被引量 : 0次 | 上传用户:haiyutong
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  This paper presents a digital speech encryption scheme based on symmetrical homomorphic encryption technique (MORE-method), in which a symmetrical key cryptosystems with probabilistic statistics and fully homomorphic properties are used to encrypt speech signals.In the proposed scheme, each sample of a speech signal is firstly multiplied one weight, and then encrypted, the normalization is exploited to make the data expend lossy compression.Finally, a recombination method of the cipher-text is proposed to obtain the corresponding speech cipher-text with good performances.Experimental results show the proposed scheme is correct and satisfy homomorphism, which has strong diffusibility and a large key-space, is robustness to entropy attacks and statistical analysis attacks, and decreased the residual intelligibility as small as possible.Moreover, the encrypted speech can be decrypted completely and the original speech signal can be recovered accurately.Compared with two dimensinal chaotic maps cryptosystem and Paillier cryptosystem, the MORE-method is more security than two dimensinal chaotic maps cryptosystem, and has lower complexity for speech encryption than Paillier cryptosystem, so the proposed scheme especially meets the sensitive speech security in the cloud.
其他文献
文章阐述了真金板保温系统、EPS板外墙保温系统、XPS板保温系统、无机发泡水泥板外墙保温系统等的优缺点,无机防火轻集料膨胀珍珠岩保温板外墙外保温系统安全性可靠,B1, B2级有
文章就内外墙腻子粉裂缝产生的原因与防治做一个全面的论述,阐述了通常所见的墙面裂缝,谈腻子层龟裂的几个问题。
中国是世界上经济发展最快的国家,也是能源需求与消费量最大的国家,资源能源和环境保护问题较突出,根据中国国情,开展节能降耗工作,十分重要.
保留格式加密(FPE)是分组密码算法的一种工作模式,利用此方式加密得到的密文与原始明文具有相同的格式和长度.比如,身份证号采用保留格式加密后得到的密文依然是由18位数字组
  To tackle with physical attacks to real world cryptosystems,leakage resilient cryptography was developed.In this setting, the adversary is allowed to have a
会议
  In the information era, more and more data are produced, which imposes a heavy burden on local storage.Fortunately, the cloud computing paradigm provides us
  Key schedules in block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks.At ASIACRYPT 2011, Dunkelman et al.p
  Feistel-2 is a Feistel scheme proposed by Isobe and Shibutani in Asiacrypt 2013, in which the round functions are composed of an XOR of a subkey followed by
会议
  Boolean functions possessing multiple cryptographic criteria play an important role in the design of symmetric cryptosystems.The following criteria for cryp
  The paper proposes a cubic chaotic mapping.Its bifurcation graph and Lyapunov exponent show that the mapping owns excellent chaotic properties.A chaos-based