Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Secure SSL/TLS Communication System Based on Quantum Keys
WANG Jigang, LU Yuqian, WEI Liping, JIANG Xinzao, ZHANG Han
ZTE Communications    2024, 22 (3): 106-115.   DOI: 10.12142/ZTECOM.202403013
Abstract56)   HTML7)    PDF (838KB)(100)       Save

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols facilitates a secure framework for identity authentication, data encryption, and message integrity verification. However, with the recent development in quantum computing technology, the security of conventional key-based SSL/TLS protocols faces vulnerabilities. In this paper, we propose a scheme by integrating the quantum key into the SSL/TLS framework. Furthermore, the application of post-quantum algorithms is used to enhance and complement the existing encryption suites. Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput. Moreover, the proposed system showcases good resilience against quantum attacks.

Table and Figures | Reference | Related Articles | Metrics
Interference-Cancellation Scheme for Multilayer Cellular Systems
Wei Li, Yue Zhang, Li-Ke Huang
ZTE Communications    2015, 13 (1): 43-49.   DOI: 10.3969/j.issn.1673-5188.2015.01.006
Abstract96)      PDF (594KB)(97)       Save
A 5G network must be heterogeneous and support the co-existence of multilayer cells, multiple standards, and multiple application systems. This greatly improves link performance and increases link capacity. A network with co-existing macro and pico cells can alleviate traffic congestion caused by multicast or unicast subscribers, help satisfy huge traffic demands, and further extend converge. In order to practically implement advanced 5G technology, a number of technical problems have to be solved, one of which is inter-cell interference. A method called Almost Blank Subframe (ABS) has been proposed to mitigate interference; however, the reference signal in ABS still causes interference. This paper describes how interference can be cancelled by using the information in the ABS. First, the interference-signal model, which takes into account channel effect, time and frequency error, is presented. Then, an interference-cancellation scheme based on this model is studied. The timing and carrier frequency offset of the interference signal is compensated. Afterwards, the reference signal of the interfering cell is generated locally and the channel response is estimated using channel statistics. Then, the interference signal is reconstructed according to previous estimation of channel, timing, and carrier frequency offset. The interference is mitigated by subtracting the estimated interference signal. Computer simulation shows that this interference-cancellation algorithm significantly improves performance under different channel conditions.
Related Articles | Metrics
Privacy-Preserving Protocol for Data Stored in the Cloud
Hongyi Su, Geng Yang, and Dawei Li
ZTE Communications    2011, 9 (2): 36-38.  
Abstract56)      PDF (314KB)(69)       Save
Data storage is an important application of cloud computing. With a cloud computing platform, the burden of local data storage can be reduced. However, services and applications in a cloud may come from different providers, and creating an efficient protocol to protect privacy is critical. We propose a verification protocol for cloud database entries that protects against untrusted service providers. Based on identity-based encryption (IBE) for cloud storage, this protocol guards against breaches of privacy in cloud storage. It prevents service providers from easily constructing cloud storage and forging the signature of data owners by secret sharing. Simulation results confirm the availability and efficiency of the proposed protocol.
Related Articles | Metrics
Security Framew ork of Mobile Internet
Wei Liang
ZTE Communications    2009, 7 (4): 31-34.  
Abstract113)      PDF (361KB)(164)       Save
The article describes the layered model of physical network and information security, and the establishment of the mobile Internet’s security framework based on its network architecture. The mobile Internet has three parts, i.e. terminal, network and service system, each of which can be studied in four layers of the network and information security, namely, the equipment/environment security layer, the service and application security layer, the information security layer and the information content security layer.
Related Articles | Metrics