Dual receiver encryption(DRE)is an important cryptographic primitive introduced by Diament et al.at CCS’04,which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.This primiti...Dual receiver encryption(DRE)is an important cryptographic primitive introduced by Diament et al.at CCS’04,which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.This primitive is quite useful in designing combined public key cryptosystems and denial of service attack-resilient protocols.In this paper,we obtain some results as follows.·Using weak lattice-based programmable hash functions(wLPHF)with high min-entropy(Crypto’16),we give a generic IND-CCA secure DRE construction in the standard model.Furthermore,we get a concrete DRE scheme by instantiating a concrete wLPHF with high min-entropy.·For DRE notion in the identity-based setting,identity-based DRE(IB-DRE),basing on lattice-based programmable hash functions(LPHF)with high min-entropy,we give a framework of IND-ID-CPA secure IB-DRE construction in the standard model.When instantiating with concrete LPHFs with high min-entropy,we obtain five concrete IB-DRE schemes.展开更多
Dual receiver encryption(DRE)is an important cryptographic primitive introduced by Diament et al.at CCS’04,which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.This primiti...Dual receiver encryption(DRE)is an important cryptographic primitive introduced by Diament et al.at CCS’04,which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.This primitive is quite useful in designing combined public key cryptosystems and denial of service attack-resilient protocols.In this paper,we obtain some results as follows.·Using weak lattice-based programmable hash functions(wLPHF)with high min-entropy(Crypto’16),we give a generic IND-CCA secure DRE construction in the standard model.Furthermore,we get a concrete DRE scheme by instantiating a concrete wLPHF with high min-entropy.·For DRE notion in the identity-based setting,identity-based DRE(IB-DRE),basing on lattice-based programmable hash functions(LPHF)with high min-entropy,we give a framework of IND-ID-CPA secure IB-DRE construction in the standard model.When instantiating with concrete LPHFs with high min-entropy,we obtain five concrete IB-DRE schemes.展开更多
This research paper defines the theoretical foundations and computational implementation of a non-conventional modeling and simulation methodology,inspired by the needs of problem solving for biological,agricultural,a...This research paper defines the theoretical foundations and computational implementation of a non-conventional modeling and simulation methodology,inspired by the needs of problem solving for biological,agricultural,aquacultural and environmental systems.The challenging practical problem is to develop a framework for automatic generation of causally right and balance-based,unified models that can also be applied for the effective coupling amongst the various(sophisticated field-specific,sensor data processing-based,upper level optimization-driven,etc.)models.The scientific problem addressed in this innovation is to develop Programmable Process Structures(PPS)by combining functional basis of systems theory,structural approach of net theory and computational principles of agent based modeling.PPS offers a novel framework for the automatic generation of easily extensible and connectible,unified models for the underlying complex systems.PPS models can be generated from one state and one transition meta-prototypes and from the transition oriented description of process structure.The models consist of unified state and transition elements.The local program containing prototype elements,derived also from the meta-prototypes,are responsible for the case-specific calculations.The integrity and consistency of PPS architecture are based on the meta-prototypes,prepared to distinguish between the conservation-laws-based measures and the signals.The simulation is based on data flows amongst the state and transition elements,as well as on the unification based data transfer between these elements and their calculating prototypes.This architecture and its AI language-based(Prolog)implementation support the integration of various field-and task-specific models,conveniently.The better understanding is helped by a simple example.The capabilities of the recently consolidated general methodology are discussed on the basis of some preliminary applications,focusing on the recently studied agricultural and aquacultural cases.展开更多
基金This work was supported by National Natural Science Foundation of China(Grant No.61379141 and No.61772521)Key Research Program of Frontier Sciences,CAS(Grant No.QYZDB-SSW-SYS035),and the Open Project Program of the State Key Laboratory of Cryptology.
文摘Dual receiver encryption(DRE)is an important cryptographic primitive introduced by Diament et al.at CCS’04,which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.This primitive is quite useful in designing combined public key cryptosystems and denial of service attack-resilient protocols.In this paper,we obtain some results as follows.·Using weak lattice-based programmable hash functions(wLPHF)with high min-entropy(Crypto’16),we give a generic IND-CCA secure DRE construction in the standard model.Furthermore,we get a concrete DRE scheme by instantiating a concrete wLPHF with high min-entropy.·For DRE notion in the identity-based setting,identity-based DRE(IB-DRE),basing on lattice-based programmable hash functions(LPHF)with high min-entropy,we give a framework of IND-ID-CPA secure IB-DRE construction in the standard model.When instantiating with concrete LPHFs with high min-entropy,we obtain five concrete IB-DRE schemes.
基金supported by National Natural Science Foundation of China(Grant No.61379141 and No.61772521)Key Research Program of Frontier Sciences,CAS(Grant No.QYZDB-SSW-SYS035)the Open Project Program of the State Key Laboratory of Cryptology.
文摘Dual receiver encryption(DRE)is an important cryptographic primitive introduced by Diament et al.at CCS’04,which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext.This primitive is quite useful in designing combined public key cryptosystems and denial of service attack-resilient protocols.In this paper,we obtain some results as follows.·Using weak lattice-based programmable hash functions(wLPHF)with high min-entropy(Crypto’16),we give a generic IND-CCA secure DRE construction in the standard model.Furthermore,we get a concrete DRE scheme by instantiating a concrete wLPHF with high min-entropy.·For DRE notion in the identity-based setting,identity-based DRE(IB-DRE),basing on lattice-based programmable hash functions(LPHF)with high min-entropy,we give a framework of IND-ID-CPA secure IB-DRE construction in the standard model.When instantiating with concrete LPHFs with high min-entropy,we obtain five concrete IB-DRE schemes.
文摘This research paper defines the theoretical foundations and computational implementation of a non-conventional modeling and simulation methodology,inspired by the needs of problem solving for biological,agricultural,aquacultural and environmental systems.The challenging practical problem is to develop a framework for automatic generation of causally right and balance-based,unified models that can also be applied for the effective coupling amongst the various(sophisticated field-specific,sensor data processing-based,upper level optimization-driven,etc.)models.The scientific problem addressed in this innovation is to develop Programmable Process Structures(PPS)by combining functional basis of systems theory,structural approach of net theory and computational principles of agent based modeling.PPS offers a novel framework for the automatic generation of easily extensible and connectible,unified models for the underlying complex systems.PPS models can be generated from one state and one transition meta-prototypes and from the transition oriented description of process structure.The models consist of unified state and transition elements.The local program containing prototype elements,derived also from the meta-prototypes,are responsible for the case-specific calculations.The integrity and consistency of PPS architecture are based on the meta-prototypes,prepared to distinguish between the conservation-laws-based measures and the signals.The simulation is based on data flows amongst the state and transition elements,as well as on the unification based data transfer between these elements and their calculating prototypes.This architecture and its AI language-based(Prolog)implementation support the integration of various field-and task-specific models,conveniently.The better understanding is helped by a simple example.The capabilities of the recently consolidated general methodology are discussed on the basis of some preliminary applications,focusing on the recently studied agricultural and aquacultural cases.