计算机科学 ›› 2021, Vol. 48 ›› Issue (5): 328-333.doi: 10.11896/jsjkx.200300177
所属专题: 密码学 虚拟专题
吴少乾, 李西明
WU Shao-qian, LI Xi-ming
摘要: 生成对抗网络(Generative Adversarial Networks,GANs)自提出以来被广泛应用于各个领域。虽然在信息安全领域中对其的应用研究日益深入,但利用GANs实现公钥密码体制下的安全通信问题还未见公开报道。鉴于通信双方和敌手的对抗性质,文中利用GANs的对抗学习机制,在公钥密码体制场景下,将密钥生成器、通信双方的加解密和敌手的破译过程均作为神经网络,利用认证保密性来增强公私钥的联系,再利用对抗学习机制训练通信双方和敌手,以此实现通信双方在公开信道上的可认证加密安全通信(Authenticable Encrypted secure Communication based on Adversarial Network,AEC-AN)。实验采用了16 bit,32 bit,64 bit和128 bit长度的4种密钥进行训练,结果表明,Bob的正确率在91%~94%之间,Eve的错误率在43%~57%之间,该值接近Eve随机猜测的概率,从而证明了所提方法能够实现通信双方在敌手窃听环境下的安全通信。
中图分类号:
[1]GOODFELLOW I J,POUGET-ABADIE J,MIRA M,et al.Generative Adversarial Networks[C]//Advances in Neural Information Processing Systems 2014.MIT Press Boston,2014:2672-2680. [2]ABADI M,ANDERSEN D G.Learning to Protect Communications with Adversarial Neural Cryptography[EB/OL].(2016-10-21) [2020-03-20].https://arxiv.org/abs/1610.06918. [3]COUTINHO M,ALBUQUERQUE R D O,BORGES F,et al.Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography[J].Sensors,2018,18(5):1306. [4]GOMEZ A N,HUANG S C,ZHANG I,et al.Unsupervised Cipher Cracking Using Discrete GANs[EB/OL].(2018-1-15) [2020-03-20].https://arxiv.org/abs/1801.04883. [5]ZHU J Y,PARK T,ISOLA P,et al.Unpaired image-to-imagetranslation using cycle-consistent adversarial networks[C]//Proceedings of the 2017 IEEE International Conference on Computer Vision.IEEE New Jersey Piscataway,2017:2242-2251. [6]CIPHER A D,BRIAN J W.Cryptanalysis of Shift Stream Ge-nerated Stream Cipher Systems-Book Review[J].Cryptologia,1984,8(4):360-363. [7]SUCHITA D,FABIO D T,MARK S.Vigenère scores for malware detection[J].Computer Virology and Hacking Techniques,2018,14(2):157-165. [8]HITAJ B,GASTI P,ATENIESE G,et al.PassGAN:A DeepLearning Approach for Password Guessing[C]//Applied Cryptography and Network Security-17th International Conference.Springer Berlin Heidelberg,2019:217-237. [9]LI X M,WU J R,WU S Q,et al.Study on fuzzy key encryption based on GAN[J].Application Research of Computers,2020,37(6):1779-1781,1793. [10]LI X M,WU J R,WU S Q,et al.Study on adversarial encryption based on generative adversarial networks[J].Computer Engineering and Applications:2020,56(10):69-74. [11]ZHENG W C C,CHUAH C W,JANAKA A.Review on Lea-kage Resilient Key Exchange Security Model.[J].IJCNIS,2019,11(1):119. [12]YANG X B,BOUSSAKTA S.A New Development of Symme-tric Key Cryptosystem[C]//Proceedings of IEEE International Conference on Communications.IEEE New Jersey Piscataway,2008:1546-1550. [13]DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE,1976,22(6):644-654. [14]WANG C J,XU X L,LI Y,et al.Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks[C]//Information Security and Cryptology—10th International Conference.Springer Berlin Heidelberg,2014:424-442. [15]GULRAJANI I,AHMED F,ARJOVSKY M,et al.ImprovedTraining of Wasserstein GANs[C]//In Advances in Neural Information Processing Systems 30:Annual Conference on Neural Information Processing Systems 2017.MIT Press Boston,2017:5769-5779. [16]ZOU D M,BALAN R,SINGH M.On Lipschitz Bounds of Ge-neral Convolutional Neural Networks[J].IEEE Transactions on Information Theory,2020,66(3):1738-1759. [17]RADFORF A,METZ L,CHINTALA S.Unsupervised Repre-sentation Learning with Deep Convolutional Generative Adversarial Networks[EB/OL].(2016-01-07) [2020-03-20].https://arxiv.org/abs/1511.06434 . [18]YASUTAKA F,KAZUSHI I.ResNet and Batch-normalization Improve Data Separability.[C]//Proceedings of the 11th Asian Conference on Machine Learning.JMLR,2019:94-108. [19]HENK C A V T,SUSHIL J.Encyclopedia of Cryptography and Security(2nd Edition)[M].Berlin:Springer,2011:675. [20]GAO J Q,LI B Y,LIAO H K,et al.Research and performance analysis of advanced encryption AES algorithm[J].Network Security Technology & Application,2019(10):28-30. |
[1] | 张佳, 董守斌. 基于评论方面级用户偏好迁移的跨领域推荐算法 Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer 计算机科学, 2022, 49(9): 41-47. https://doi.org/10.11896/jsjkx.220200131 |
[2] | 孙奇, 吉根林, 张杰. 基于非局部注意力生成对抗网络的视频异常事件检测方法 Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection 计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061 |
[3] | 戴朝霞, 李锦欣, 张向东, 徐旭, 梅林, 张亮. 基于DNGAN的磁共振图像超分辨率重建算法 Super-resolution Reconstruction of MRI Based on DNGAN 计算机科学, 2022, 49(7): 113-119. https://doi.org/10.11896/jsjkx.210600105 |
[4] | 徐国宁, 陈奕芃, 陈一鸣, 陈晋音, 温浩. 基于约束优化生成式对抗网络的数据去偏方法 Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks 计算机科学, 2022, 49(6A): 184-190. https://doi.org/10.11896/jsjkx.210400234 |
[5] | 尹文兵, 高戈, 曾邦, 王霄, 陈怡. 基于时频域生成对抗网络的语音增强算法 Speech Enhancement Based on Time-Frequency Domain GAN 计算机科学, 2022, 49(6): 187-192. https://doi.org/10.11896/jsjkx.210500114 |
[6] | 徐辉, 康金梦, 张加万. 基于特征感知的数字壁画复原方法 Digital Mural Inpainting Method Based on Feature Perception 计算机科学, 2022, 49(6): 217-223. https://doi.org/10.11896/jsjkx.210500105 |
[7] | 高志宇, 王天荆, 汪悦, 沈航, 白光伟. 基于生成对抗网络的5G网络流量预测方法 Traffic Prediction Method for 5G Network Based on Generative Adversarial Network 计算机科学, 2022, 49(4): 321-328. https://doi.org/10.11896/jsjkx.210300240 |
[8] | 黎思泉, 万永菁, 蒋翠玲. 基于生成对抗网络去影像的多基频估计算法 Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal 计算机科学, 2022, 49(3): 179-184. https://doi.org/10.11896/jsjkx.201200081 |
[9] | 石达, 芦天亮, 杜彦辉, 张建岭, 暴雨轩. 基于改进CycleGAN的人脸性别伪造图像生成模型 Generation Model of Gender-forged Face Image Based on Improved CycleGAN 计算机科学, 2022, 49(2): 31-39. https://doi.org/10.11896/jsjkx.210600012 |
[10] | 唐雨潇, 王斌君. 基于深度生成模型的人脸编辑研究进展 Research Progress of Face Editing Based on Deep Generative Model 计算机科学, 2022, 49(2): 51-61. https://doi.org/10.11896/jsjkx.210400108 |
[11] | 李建, 郭延明, 于天元, 武与伦, 王翔汉, 老松杨. 基于生成对抗网络的多目标类别对抗样本生成算法 Multi-target Category Adversarial Example Generating Algorithm Based on GAN 计算机科学, 2022, 49(2): 83-91. https://doi.org/10.11896/jsjkx.210800130 |
[12] | 谈馨悦, 何小海, 王正勇, 罗晓东, 卿粼波. 基于Transformer交叉注意力的文本生成图像技术 Text-to-Image Generation Technology Based on Transformer Cross Attention 计算机科学, 2022, 49(2): 107-115. https://doi.org/10.11896/jsjkx.210600085 |
[13] | 陈贵强, 何军. 自然场景下遥感图像超分辨率重建算法研究 Study on Super-resolution Reconstruction Algorithm of Remote Sensing Images in Natural Scene 计算机科学, 2022, 49(2): 116-122. https://doi.org/10.11896/jsjkx.210700095 |
[14] | 蒋宗礼, 樊珂, 张津丽. 基于生成对抗网络和元路径的异质网络表示学习 Generative Adversarial Network and Meta-path Based Heterogeneous Network Representation Learning 计算机科学, 2022, 49(1): 133-139. https://doi.org/10.11896/jsjkx.201000179 |
[15] | 张玮琪, 汤轶丰, 李林燕, 胡伏原. 基于场景图的段落生成序列图像方法 Image Stream From Paragraph Method Based on Scene Graph 计算机科学, 2022, 49(1): 233-240. https://doi.org/10.11896/jsjkx.201100207 |
|