Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a pu...Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.展开更多
Quantum key distribution is a technique to securely distribute a bit string between two parties by using the laws of quantum mechanics. The security of this technique depends on the basis of quantum mechanics rather t...Quantum key distribution is a technique to securely distribute a bit string between two parties by using the laws of quantum mechanics. The security of this technique depends on the basis of quantum mechanics rather than the difficulty of the mathematical calculation as in the classical encoding. Researches in this field have shown that the quantum key distribution will be fully functioning outside the laboratory in a few years. Due to the complexity and the high efficiency of the device, the verification is needed. In this article, we use PRISM to verify the security of the quantum key distribution protocol, which uses the entangled photon based on BB84 protocol.展开更多
成本变化是影响SEC储量变化的重要因素,降低成本最大程度增加SEC储量意义重大。以非经济可采储量为研究对象,定义了油价桶油操作成本比参数,推导建立了以油价桶油操作成本比表征的非经济可采储量表达式,明确了非经济可采储量在不同油价...成本变化是影响SEC储量变化的重要因素,降低成本最大程度增加SEC储量意义重大。以非经济可采储量为研究对象,定义了油价桶油操作成本比参数,推导建立了以油价桶油操作成本比表征的非经济可采储量表达式,明确了非经济可采储量在不同油价桶油操作成本比区间敏感性,确定了影响SEC储量变化速率的主要因素是技术可采储量规模和油价桶油操作成本的比值。油价桶油成本比越低、技术可采储量规模越大,控本增储效果越明显。实例表明通过技术可采储量规模和油价桶油成本比的范围区间优化筛选具体油田,可以指导成本优化的方向,最大限度增加SEC储量。Cost change is an important factor affecting the change of SEC reserves. It is of great significance to reduce costs and maximize SEC reserves. Taking the non economic recoverable reserves as the research object, this paper defines the ratio of oil price and single barrel operating cost, establishes the expression of non economic recoverable reserves represented by ratio of oil price and single barrel operating cost, defines the sensitivity of non economic recoverable reserves in different ratio range of oil price and single barrel operating cost, and determines that the main factor affecting the change rate of SEC reserves is technical recoverable reserves and ratio of oil price and single barrel operating cost. The lower the oil price to barrel cost ratio and the larger the scale of technically recoverable reserves, the more obvious the effect of cost control and storage increase. The example shows that selecting specific oil fields by optimizing the range of technical recoverable reserves and the cost ratio of oil price to barrel oil can guide the direction of cost optimization and maximize SEC reserves.展开更多
基金Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin(15JCYBJC15900)the National Natural Science Foundation of China(51378350)
文摘Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.
文摘Quantum key distribution is a technique to securely distribute a bit string between two parties by using the laws of quantum mechanics. The security of this technique depends on the basis of quantum mechanics rather than the difficulty of the mathematical calculation as in the classical encoding. Researches in this field have shown that the quantum key distribution will be fully functioning outside the laboratory in a few years. Due to the complexity and the high efficiency of the device, the verification is needed. In this article, we use PRISM to verify the security of the quantum key distribution protocol, which uses the entangled photon based on BB84 protocol.
文摘成本变化是影响SEC储量变化的重要因素,降低成本最大程度增加SEC储量意义重大。以非经济可采储量为研究对象,定义了油价桶油操作成本比参数,推导建立了以油价桶油操作成本比表征的非经济可采储量表达式,明确了非经济可采储量在不同油价桶油操作成本比区间敏感性,确定了影响SEC储量变化速率的主要因素是技术可采储量规模和油价桶油操作成本的比值。油价桶油成本比越低、技术可采储量规模越大,控本增储效果越明显。实例表明通过技术可采储量规模和油价桶油成本比的范围区间优化筛选具体油田,可以指导成本优化的方向,最大限度增加SEC储量。Cost change is an important factor affecting the change of SEC reserves. It is of great significance to reduce costs and maximize SEC reserves. Taking the non economic recoverable reserves as the research object, this paper defines the ratio of oil price and single barrel operating cost, establishes the expression of non economic recoverable reserves represented by ratio of oil price and single barrel operating cost, defines the sensitivity of non economic recoverable reserves in different ratio range of oil price and single barrel operating cost, and determines that the main factor affecting the change rate of SEC reserves is technical recoverable reserves and ratio of oil price and single barrel operating cost. The lower the oil price to barrel cost ratio and the larger the scale of technically recoverable reserves, the more obvious the effect of cost control and storage increase. The example shows that selecting specific oil fields by optimizing the range of technical recoverable reserves and the cost ratio of oil price to barrel oil can guide the direction of cost optimization and maximize SEC reserves.