Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to...Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.展开更多
A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg e...A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO.展开更多
Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic ph...Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic phase before 1990’s, the majority of these projects planned before that period have not considered the effect of long term variation of water resources. In all of these numerous operational and under-construction projects, an intelligent selection of the best water transmission protocol, can help the governments to optimize their expenditures on these projects ,and also can help water resources managers to face climate change effects wisely. In this paper as a case study, Dez to Qomrood inter-basin water transfer project is considered to evaluate the efficiency of three different protocols in long term. The effect of climate change has been forecasted via a wide range of GCMs (Global Circulation Model) in order to calculate the change of flow in the basin's area with different climate scenarios. After these calculation, a water allocation model has been used to evaluate which of these three water transmission protocols (Proportional Allocation (PA), Fix Upstream allocation (FU), and Fix Downstream allocation (FD)) is the most efficient logic switch economically in a framework including both upstream and downstream stakeholders. As the final result, it can be inferred that Fix Downstream allocation (FD) protocol can supply more population especially with urban water for a fix expense and also is the most adapted protocol with future global change, at least in the first round of sustainability assessment.展开更多
This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtu...This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtual Filestore(VFS). Finally we introduce the implementation and the key technology of the FTS system.展开更多
基金Supported by the National Natural Science Foundation of China(No.61501064)Sichuan Technology Support Program(No.2015GZ0088)
文摘Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.
基金supported by Opening Project of State Key Laboratory of Cryptology, Scientific Research and Postgraduate Training Cooperation Project-Scientific Research Base-New Theory of Block Cipher and Obfuscation and their Application Research, and Information Management and Professional Building of Information System
文摘A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO.
文摘Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic phase before 1990’s, the majority of these projects planned before that period have not considered the effect of long term variation of water resources. In all of these numerous operational and under-construction projects, an intelligent selection of the best water transmission protocol, can help the governments to optimize their expenditures on these projects ,and also can help water resources managers to face climate change effects wisely. In this paper as a case study, Dez to Qomrood inter-basin water transfer project is considered to evaluate the efficiency of three different protocols in long term. The effect of climate change has been forecasted via a wide range of GCMs (Global Circulation Model) in order to calculate the change of flow in the basin's area with different climate scenarios. After these calculation, a water allocation model has been used to evaluate which of these three water transmission protocols (Proportional Allocation (PA), Fix Upstream allocation (FU), and Fix Downstream allocation (FD)) is the most efficient logic switch economically in a framework including both upstream and downstream stakeholders. As the final result, it can be inferred that Fix Downstream allocation (FD) protocol can supply more population especially with urban water for a fix expense and also is the most adapted protocol with future global change, at least in the first round of sustainability assessment.
文摘This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtual Filestore(VFS). Finally we introduce the implementation and the key technology of the FTS system.