For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig...For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible.展开更多
Random access is the necessary process to establish the wireless link between the user equipment (UE) and network. The performance of the random access directly affects the performance of the network. In this work, ...Random access is the necessary process to establish the wireless link between the user equipment (UE) and network. The performance of the random access directly affects the performance of the network. In this work, we propose a method on the basis of the existing alternatives. In this method, we estimate the system load in advance to adjust the number of terminals. An access threshold is set to control the number of terminals which want to access the base station at an acceptable level. At the same time, we havean improvement on the existing power climbing strategy. We suppose that the power ramping is not always necessary for the re-access. And the selection ofpower ramping steps is studied in this paper. Simulations based on MATLAB are employed to evaluate the effectiveness of the proposed solution and to make comparisons with existing alternatives.展开更多
With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To addres...With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved.展开更多
为了解决物联网信道资源有限的问题以及提高物联网系统的信息时效性,考虑了包括一个主用户(primary user,PU)和两个次用户(secondary user,SU)节点的多接入认知无线电(CR)物联网系统模型。在PU工作状态和SU数据队列稳定的约束下,分别分...为了解决物联网信道资源有限的问题以及提高物联网系统的信息时效性,考虑了包括一个主用户(primary user,PU)和两个次用户(secondary user,SU)节点的多接入认知无线电(CR)物联网系统模型。在PU工作状态和SU数据队列稳定的约束下,分别分析了第一个SU节点在先来先服务(first come first served,FCFS)、后来先服务(last come last served,LCLS)以及包丢弃队列下的平均信息年龄(age of information,AoI),推导了在阈值策略下第二个SU节点的平均AoI。然后,提出了使第一个SU平均AoI最小化,并且第二个SU的平均AoI低于给定阈值的优化问题。优化问题的约束条件是凸的,但所得到的目标函数是非凸的,故引入了一种次优技术,利用双层凸优化算法得到最优解。仿真结果给出了所考虑优化算法在不同系统参数下的性能,该算法在不同系统参数和多天线影响下的性能表现良好。后续工作可以考虑扩展到两个以上次用户的CR物联网系统。展开更多
基金the National Natural Science Foundation of China(No.60374066)
文摘For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible.
基金partly supported by the Research of LTE Layer 2 and Smallcell Technology Tracking under Grant No.2013GFW-0005
文摘Random access is the necessary process to establish the wireless link between the user equipment (UE) and network. The performance of the random access directly affects the performance of the network. In this work, we propose a method on the basis of the existing alternatives. In this method, we estimate the system load in advance to adjust the number of terminals. An access threshold is set to control the number of terminals which want to access the base station at an acceptable level. At the same time, we havean improvement on the existing power climbing strategy. We suppose that the power ramping is not always necessary for the re-access. And the selection ofpower ramping steps is studied in this paper. Simulations based on MATLAB are employed to evaluate the effectiveness of the proposed solution and to make comparisons with existing alternatives.
基金The National Natural Science Foundation of China(No.61272413,No.61472165)
文摘With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved.
文摘为了解决物联网信道资源有限的问题以及提高物联网系统的信息时效性,考虑了包括一个主用户(primary user,PU)和两个次用户(secondary user,SU)节点的多接入认知无线电(CR)物联网系统模型。在PU工作状态和SU数据队列稳定的约束下,分别分析了第一个SU节点在先来先服务(first come first served,FCFS)、后来先服务(last come last served,LCLS)以及包丢弃队列下的平均信息年龄(age of information,AoI),推导了在阈值策略下第二个SU节点的平均AoI。然后,提出了使第一个SU平均AoI最小化,并且第二个SU的平均AoI低于给定阈值的优化问题。优化问题的约束条件是凸的,但所得到的目标函数是非凸的,故引入了一种次优技术,利用双层凸优化算法得到最优解。仿真结果给出了所考虑优化算法在不同系统参数下的性能,该算法在不同系统参数和多天线影响下的性能表现良好。后续工作可以考虑扩展到两个以上次用户的CR物联网系统。