期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things 被引量:4
1
作者 Chaoyang Li Gang Xu +2 位作者 Yuling Chen haseeb ahmad Jian Li 《Computers, Materials & Continua》 SCIE EI 2019年第8期711-726,共16页
Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public,distributed and decentration.And blockchain-enabled internet of things(BIoT)has a tendency to make a rev... Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public,distributed and decentration.And blockchain-enabled internet of things(BIoT)has a tendency to make a revolutionary change for the internet of things(IoT)which requires distributed trustless consensus.However,the scalability and security issues become particularly important with the dramatically increasing number of IoT devices.Especially,with the development of quantum computing,many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks.In this paper,an anti-quantum proxy blind signature scheme based on the lattice cryptography has been proposed,which can provide user anonymity and untraceability in the distributed applications of BIoT.Then,the security proof of the proposed scheme can derive that it is secure in random oracle model,and the efficiency analysis can indicate it is efficient than other similar literatures. 展开更多
关键词 Blockchain blockchain-enabled internet of things quantum computers proxy blind signature
在线阅读 下载PDF
Towards Privacy-Preserving Cloud Storage:A Blockchain Approach 被引量:3
2
作者 Jia-Shun Zhang Gang Xu +3 位作者 Xiu-Bo Chen haseeb ahmad Xin Liu Wen Liu 《Computers, Materials & Continua》 SCIE EI 2021年第12期2903-2916,共14页
With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice m... With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice manner through the network,realizing business expansion and rapid innovation.However,due to the insufficient protection of data privacy,the problem of data privacy leakage in cloud storage is threatening cloud computing.To address the problem,we propose BC-PECK,a data protection scheme based on blockchain and public key searchable encryption.Firstly,all the data is protected by the encryption algorithm.The privacy data is encrypted and stored in a cloud server,while the ciphertext index is established by a public key searchable encryption scheme and stored on the blockchain.Secondly,based on the characteristics of trusted execution of smart contract technology,a control mechanism for data accessing and sharing is given.Data transaction is automatically recorded on the blockchain,which is fairer under the premise of ensuring the privacy and security of the data sharing process.Finally,we analyzed the security and fairness of the current scheme.Through the comparison with similar schemes,we have shown the advantages of the proposed scheme. 展开更多
关键词 Blockchain privacy protection smart contract public encryption keyword search
在线阅读 下载PDF
An Asymmetric Controlled Bidirectional Quantum State Transmission Protocol 被引量:1
3
作者 Yiru Sun Yuling Chen +1 位作者 haseeb ahmad Zhanhong Wei 《Computers, Materials & Continua》 SCIE EI 2019年第4期215-227,共13页
In this paper,we propose an asymmetric controlled bidirectional transmission protocol.In the protocol,by using the thirteen-qubit entangled state as the quantum channel,Alice can realize the transmission of a two-qubi... In this paper,we propose an asymmetric controlled bidirectional transmission protocol.In the protocol,by using the thirteen-qubit entangled state as the quantum channel,Alice can realize the transmission of a two-qubit equatorial state for Bob and Bob can transmit a four-qubit equatorial state for Alice under the control of Charlie.Firstly,we give the construction of the quantum channel,which can be done by performing several H and CNOT operations.Secondly,through implementing the appropriate measurements and the corresponding recovery operations,the desired states can be transmitted simultaneously,securely and deterministically.Finally,we analyze the performance of the protocol,including the efficiency,the necessary operations and the classical communication costs.And then,we describe some comparisons with other protocols.Since our protocol does not require auxiliary particles and additional operations,the classic communication costs less while achieving the multi-particle bidirectional transmission,so the overall performance of the protocol is better. 展开更多
关键词 CONTROLLED ASYMMETRIC bidirectional quantum state transmission remote state preparation
在线阅读 下载PDF
Controlled Quantum Network Coding Without Loss of Information 被引量:1
4
作者 Xiu-Bo Pan Xiu-Bo Chen +4 位作者 Gang Xu haseeb ahmad Tao Shang Zong-Peng Li Yi-Xian Yang 《Computers, Materials & Continua》 SCIE EI 2021年第12期3967-3979,共13页
Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a no... Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a novel controlled quantum network coding without information loss.The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie.Firstly,two pairs of threeparticle non-maximum entangled states are pre-shared between senders and controller.By adding auxiliary particles and local operations,the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the Z-{10>,|1>}basis.Secondly,when trans-mission fails upon prediction,the quantum state will not be lost,and it will sill be held by the sender.Subsequently,the controller Charlie re-prepares another three-particle non-maximum entangled state to start a new round.When the predicted transmission is successful,the quantum state can be transmitted successfully within the butterfly network.If the receiver wants to receive the effective quantum state,the quantum measurements from Charlie are needed.Thirdly,when the transmission fails,Charlie does not need to integrate the X-{1+>,1->}basis to measure its own particles,by which quantum resources are saved.Charlie not only controls the effective transmission of quantum states,but also the usage of classical and quantum channels.Finally,the implementation of the quantum circuits,as well as a flow chart and safety analysis of our scheme,is proposed. 展开更多
关键词 Controlled quantum network coding without information loss quantum teleportation perfect transmission
在线阅读 下载PDF
ComRank: Joint Weight Technique for the Identification of Influential Communities 被引量:1
5
作者 Muhammad Azam Zia Zhongbao Zhang +2 位作者 Ximing Li haseeb ahmad Sen Su 《China Communications》 SCIE CSCD 2017年第4期101-110,共10页
Recently, the community analysis has seen enormous research advancements in the field of social networks. A large amount of the current studies put forward different models and algorithms about most influential people... Recently, the community analysis has seen enormous research advancements in the field of social networks. A large amount of the current studies put forward different models and algorithms about most influential people. However, there is little work to shed light on how to rank communities while considering their levels that are determined by the quality of their published contents. In this paper, we propose solution for measuring the influence of communities and ranking them by considering joint weight composed of internal and external influence of communities. To address this issue, we design a novel algorithm called Com Rank: a modification of Page Rank, which considers the joint weight in order to identify impact of each community and ranking them. We use real-world data trace in citation network and perform extensive experiments to evaluate our proposed algorithm. The comparative results depict significant improvements by our algorithm in community ranking due to the inclusion of proposed weighting feature. 展开更多
关键词 online social networks community rank citation network Page Rank influence
在线阅读 下载PDF
Cost Effective Scheme for OLT in Next Generation Passive Optical Access Network Based on Noise Free Optical Multi Carrier
6
作者 Rahat Ullah Bo Liu +8 位作者 Qi Zhang Qinghua Tian Amjad Ali Yousaf Khan Feng Tian M.Azam Zia haseeb ahmad Lijia Zhang Xiangjun Xin 《China Communications》 SCIE CSCD 2016年第6期76-87,共12页
We propos e a cos t-effective multi-carrier generation technique which minimizes the passive optical access network(PON) costs. In this study replacement of laser array with multi-carrier source at optical line termin... We propos e a cos t-effective multi-carrier generation technique which minimizes the passive optical access network(PON) costs. In this study replacement of laser array with multi-carrier source at optical line terminal(OLT) side in PON is addressed. With 25-GHz frequency spacing, the generated optical multi-carriers exhibit good tone to noise ratio(TNR) i. e. above 20 d B, and least amplitude difference i. e. 1.5d B. At the OLT, multi-carriers signal based multiplexed differential phase shift keying(DPSK) data from all the channels each having 10 Gbps for downlink is transmitted through 25 km single mode fiber. While the transmitted information is retrieved at optical network unit(ONU), part of the downlink signal is re-modulated using intensity modulated(IM) on-off keying(OOK) for upstream transmission at 10-Gbps. Simulation results are in good agreement with the theoretical analysis, showing error free transmission in downlink and uplink with 10 Gbps symmetric data rate at each channel. The receivedpower, both for uplink and downlink transmission, is adequate for all channels at BER of 10-9 with minimum power penalties. Power budget is calculated for different splitting ratios showing excellent system margins for any unseen losses. The proposed setup provides a cost-effective way minimizing transmission losses, and providing greater system's margin in PON architecture. 展开更多
关键词 differential phase shift keying intensity modulated on-off-keying optical frequency comb generation optical access network
在线阅读 下载PDF
Evolution-Based Performance Prediction of Star Cricketers
7
作者 haseeb ahmad Shahbaz ahmad +3 位作者 Muhammad Asif Mobashar Rehman Abdullah Alharbi Zahid Ullah 《Computers, Materials & Continua》 SCIE EI 2021年第10期1215-1232,共18页
Cricket databases contain rich and useful information to examine and forecasting patterns and trends.This paper predicts Star Cricketers(SCs)from batting and bowling domains by employing supervised machine learning mo... Cricket databases contain rich and useful information to examine and forecasting patterns and trends.This paper predicts Star Cricketers(SCs)from batting and bowling domains by employing supervised machine learning models.With this aim,each player’s performance evolution is retrieved by using effective features that incorporate the standard performance measures of each player and their peers.Prediction is performed by applying Bayesianrule,function and decision-tree-based models.Experimental evaluations are performed to validate the applicability of the proposed approach.In particular,the impact of the individual features on the prediction of SCs are analyzed.Moreover,the category and model-wise feature evaluations are also conducted.A cross-validation mechanism is applied to validate the performance of our proposed approach which further confirms that the incorporated features are statistically significant.Finally,leading SCs are extracted based on their performance evolution scores and their standings are cross-checked with those provided by the International Cricket Council. 展开更多
关键词 Online social databases CRICKET star cricketers prediction machine learning
在线阅读 下载PDF
Message Authentication with a New Quantum Hash Function
8
作者 Yalan Wang Yuling Chen +1 位作者 haseeb ahmad Zhanhong Wei 《Computers, Materials & Continua》 SCIE EI 2019年第5期635-648,共14页
To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication sch... To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication schemes are being faced with big challenges.We take the message authentication as an example into a careful consideration.Then,we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function.Firstly,the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the corresponding Hash values,which ensures that the initial message can resist eavesdropping attack.Secondly,utilizing the new quantum Hash function with quantum walks can be much more secure than traditional classical Hash functions with keeping the common properties,such as one-wayness,resisting different collisions and easy implementation.Based on these two points,the message authentication scheme can be much more secure than previous ones.Finally,it is a new way to design the message authentication scheme,which provides a new thought for other researchers in the future.Our works will contribute to the study on the new encryption and authentication functions and the combination of quantum computing with traditional cryptology in the future. 展开更多
关键词 Message authentication symmetric encryption quantum Hash function quantum walk
在线阅读 下载PDF
Quantum Remote State Preparation Based on Quantum Network Coding
9
作者 Zhen-Zhen Li Zi-Chen Li +3 位作者 Yi-Ru Sun haseeb ahmad Gang Xu Xiu-Bo Chen 《Computers, Materials & Continua》 SCIE EI 2022年第10期119-132,共14页
As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network communications.In this paper,a quantum remote state preparation scheme based on quantum network coding i... As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network communications.In this paper,a quantum remote state preparation scheme based on quantum network coding is proposed.Comparing with the general quantum remote state preparation schemes,our proposed scheme brings an arbitrary unknown quantum state finally prepared remotely through the quantum network,by designing the appropriate encoding and decoding steps for quantum network coding.What is worth mentioning,from the network model,this scheme is built on the quantum k-pair network which is the expansion of the typical bottleneck network—butterfly network.Accordingly,it can be treated as an efficient quantum network preparation scheme due to the characteristics of network coding,and it also makes the proposed scheme more applicable to the large-scale quantum networks.In addition,the fact of an arbitrary unknown quantum state remotely prepared means that the senders do not need to know the desired quantum state.Thus,the security of the proposed scheme is higher.Moreover,this scheme can always achieve the success probability of 1 and 1-max flow of value k.Thus,the communication efficiency of the proposed scheme is higher.Therefore,the proposed scheme turns out to be practicable,secure and efficient,which helps to effectively enrich the theory of quantum remote state preparation. 展开更多
关键词 Quantum remote state preparation quantum network coding quantum k-pair network
在线阅读 下载PDF
Advancement in Wide Area Monitoring Protection and Control Using PMU’s Model in MATLAB/SIMULINK
10
作者 Waheed Ur Rahman Muhammad Ali +7 位作者 Amjad Ullah Hafeez Ur Rahman Majid Iqbal haseeb ahmad Adnan Zeb Zeeshan Ali M. Ahsan Shahzad Beenish Taj 《Smart Grid and Renewable Energy》 2012年第4期294-307,共14页
A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power system... A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power systems worldwide and has led to operation of power systems closer to their stability limits and to power exchange in new patterns. These issues, as well as the on-going worldwide trend towards deregulation of the entire industry on the one hand and the increased need for accurate and better network monitoring on the other hand, force power utilities exposed to this pressure to demand new solutions for wide area monitoring, protection and control. Wide-area monitoring, protection, and control require communicating the specific-node information to a remote station but all information should be time synchronized so that to neutralize the time difference between information. It gives a complete simultaneous snap shot of the power system. The conventional system is not able to satisfy the time-synchronized requirement of power system. Phasor Measurement Unit (PMU) is enabler of time-synchronized measurement, it communicate the synchronized local information to remote station. 展开更多
关键词 WIDE Area MONITORING Protection and CONTROL (WAMPAC) Phasor Measurement uNit (PMU) WIDE Area MONITORING (WAM) Global Positioning System (GPS) WIDE Area CONTROLLER (WAC) Local Area CONTROLLER (LAC) Phase Angle MONITORING (PAM) Automatic Generation CONTROL (AGC) Circuit Breaker (CB) Current TRANSFORMERS (CTs) Potential TRANSFORMERS (PTs)
暂未订购
A Certificateless Homomorphic Encryption Scheme for Protecting Transaction Data Privacy of Post-Quantum Blockchain
11
作者 Meng-Wei Zhang Xiu-Bo Chen +2 位作者 haseeb ahmad Gang Xu Yi-Xian Yang 《Journal of Cyber Security》 2022年第1期29-39,共11页
Blockchain has a profound impact on all areas of society by virtue of its immutability,decentralization and other characteristics.However,blockchain faces the problem of data privacy leakage during the application pro... Blockchain has a profound impact on all areas of society by virtue of its immutability,decentralization and other characteristics.However,blockchain faces the problem of data privacy leakage during the application process,and the rapid development of quantum computing also brings the threat of quantum attack to blockchain.In this paper,we propose a lattice-based certificateless fully homomorphic encryption(LCFHE)algorithm based on approximate eigenvector firstly.And we use the lattice-based delegate algorithm and preimage sampling algorithm to extract part of the private key based on certificateless scheme,which is composed of the private key together with the secret value selected by the user,thus effectively avoiding the problems of certificate management and key escrow.Secondly,we propose a post-quantum blockchain transaction privacy protection scheme based on LCFHE algorithm,which uses the ciphertext calculation characteristic of homomorphic encryption to encrypt the account balance and transaction amount,effectively protecting the transaction privacy of users and having the ability to resist quantum attacks.Finally,we analyze the correctness and security of LCFHE algorithm,and the security of the algorithm reduces to the hardness of learning with errors(LWE)hypothesis. 展开更多
关键词 Blockchain homomorphic encryption LATTICE privacy protection
在线阅读 下载PDF
Primitives towards verifiable computation: a survey
12
作者 haseeb ahmad Licheng WANG +4 位作者 Haibo HONG Jing LI Hassan DAWOOD Manzoor AHMED Yixian YANG 《Frontiers of Computer Science》 SCIE EI CSCD 2018年第3期451-478,共28页
Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations ... Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations to securely outsource expensive computations to untrusted service providers, while acquiring the publicly or privately verifiable results. Many mainstream solutions have been proposed to address the diverse problems within the VC domain. Some of them imposed assumptions over performed computations, while the others took advantage of interactivity /non-interactivity, zero knowledge proofs, and arguments. Further proposals utilized the powers of probabilistic checkable or computationally sound proofs. In this survey, we present a chronological study and classify the VC proposals based on their adopted domains. First, we provide a broader overview of the theoretical advancements while critically analyzing them. Subsequently, we present a comprehensive view of their utilization in the state of the art VC approaches. Moreover, a brief overview of recent proof based VC systems is also presented that lifted up the VC domain to the verge of practicality. We use the presented study and reviewed resuits to identify the similarities and alterations, modifications, and hybridization of different approaches, while comparing their advantages and reporting their overheads. Finally, we discuss implementation of such VC based systems, their applications, and the likely future directions. 展开更多
关键词 verifiable computation cloud computation INTERACTIVE NON-INTERACTIVE zero knowledge probabilisticcheckable proofs computationally sound proofs
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部