• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

神经密码学的设计方法:一种通用架构和启发式规则。

Approach to design neural cryptography: a generalized architecture and a heuristic rule.

作者信息

Mu Nankun, Liao Xiaofeng, Huang Tingwen

机构信息

College of Computer Science, Chongqing University, Chongqing, 400044, China.

出版信息

Phys Rev E Stat Nonlin Soft Matter Phys. 2013 Jun;87(6):062804. doi: 10.1103/PhysRevE.87.062804. Epub 2013 Jun 12.

DOI:10.1103/PhysRevE.87.062804
PMID:23848726
Abstract

Neural cryptography, a type of public key exchange protocol, is widely considered as an effective method for sharing a common secret key between two neural networks on public channels. How to design neural cryptography remains a great challenge. In this paper, in order to provide an approach to solve this challenge, a generalized network architecture and a significant heuristic rule are designed. The proposed generic framework is named as tree state classification machine (TSCM), which extends and unifies the existing structures, i.e., tree parity machine (TPM) and tree committee machine (TCM). Furthermore, we carefully study and find that the heuristic rule can improve the security of TSCM-based neural cryptography. Therefore, TSCM and the heuristic rule can guide us to designing a great deal of effective neural cryptography candidates, in which it is possible to achieve the more secure instances. Significantly, in the light of TSCM and the heuristic rule, we further expound that our designed neural cryptography outperforms TPM (the most secure model at present) on security. Finally, a series of numerical simulation experiments are provided to verify validity and applicability of our results.

摘要

神经密码学是一种公钥交换协议,被广泛认为是在公共信道上两个神经网络之间共享通用密钥的有效方法。如何设计神经密码学仍然是一个巨大的挑战。在本文中,为了提供一种解决这一挑战的方法,设计了一种广义网络架构和一条重要的启发式规则。所提出的通用框架被命名为树状状态分类机(TSCM),它扩展并统一了现有结构,即树奇偶机(TPM)和树委员会机(TCM)。此外,我们仔细研究并发现,该启发式规则可以提高基于TSCM的神经密码学的安全性。因此,TSCM和启发式规则可以指导我们设计大量有效的神经密码学候选方案,其中有可能实现更安全的实例。值得注意的是,根据TSCM和启发式规则,我们进一步阐述了我们设计的神经密码学在安全性方面优于TPM(目前最安全的模型)。最后,提供了一系列数值模拟实验来验证我们结果的有效性和适用性。

相似文献

1
Approach to design neural cryptography: a generalized architecture and a heuristic rule.神经密码学的设计方法:一种通用架构和启发式规则。
Phys Rev E Stat Nonlin Soft Matter Phys. 2013 Jun;87(6):062804. doi: 10.1103/PhysRevE.87.062804. Epub 2013 Jun 12.
2
Bayesian neural networks for internet traffic classification.用于互联网流量分类的贝叶斯神经网络。
IEEE Trans Neural Netw. 2007 Jan;18(1):223-39. doi: 10.1109/TNN.2006.883010.
3
Halftone visual cryptography.半色调视觉密码术。
IEEE Trans Image Process. 2006 Aug;15(8):2441-53. doi: 10.1109/tip.2006.875249.
4
Global synchronization in an array of delayed neural networks with hybrid coupling.具有混合耦合的延迟神经网络阵列中的全局同步
IEEE Trans Syst Man Cybern B Cybern. 2008 Apr;38(2):488-98. doi: 10.1109/TSMCB.2007.914705.
5
One-class-at-a-time removal sequence planning method for multiclass classification problems.针对多类分类问题的一次一类去除序列规划方法
IEEE Trans Neural Netw. 2006 Nov;17(6):1544-9. doi: 10.1109/TNN.2006.879768.
6
A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.一种基于 Shamir 三通道加密协议和多参数分数阶傅里叶变换的无密钥交换安全图像共享方案。
Opt Express. 2012 Jan 30;20(3):2386-98. doi: 10.1364/OE.20.002386.
7
Neural Cryptography Based on Complex-Valued Neural Network.基于复值神经网络的神经密码学。
IEEE Trans Neural Netw Learn Syst. 2020 Nov;31(11):4999-5004. doi: 10.1109/TNNLS.2019.2955165. Epub 2020 Oct 29.
8
Improvement of Laih and Yen's multisignature scheme.赖和严多重签名方案的改进。
J Zhejiang Univ Sci. 2004 Sep;5(9):1155-9. doi: 10.1631/jzus.2004.1155.
9
An optimization methodology for neural network weights and architectures.一种针对神经网络权重和架构的优化方法。
IEEE Trans Neural Netw. 2006 Nov;17(6):1452-9. doi: 10.1109/TNN.2006.881047.
10
Application of generalized dynamic neural networks to biomedical data.广义动态神经网络在生物医学数据中的应用。
IEEE Trans Biomed Eng. 2006 Nov;53(11):2289-99. doi: 10.1109/TBME.2006.881766.

引用本文的文献

1
An Approach to Cryptography Based on Continuous-Variable Quantum Neural Network.一种基于连续变量量子神经网络的密码学方法。
Sci Rep. 2020 Feb 7;10(1):2107. doi: 10.1038/s41598-020-58928-1.