Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud ar...Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud architecture,makes it difficult to quickly respond to the demands of IoT applications and local computation.To make up for these deficiencies in the cloud,fog computing has emerged as a critical role in the IoT applications.It decentralizes the computing power to various lower nodes close to data sources,so as to achieve the goal of low latency and distributed processing.With the data being frequently exchanged and shared between multiple nodes,it becomes a challenge to authorize data securely and efficiently while protecting user privacy.To address this challenge,proxy re-encryption(PRE)schemes provide a feasible way allowing an intermediary proxy node to re-encrypt ciphertext designated for different authorized data requesters without compromising any plaintext information.Since the proxy is viewed as a semi-trusted party,it should be taken to prevent malicious behaviors and reduce the risk of data leakage when implementing PRE schemes.This paper proposes a new fog-assisted identity-based PRE scheme supporting anonymous key generation,equality test,and user revocation to fulfill various IoT application requirements.Specifically,in a traditional identity-based public key architecture,the key escrow problem and the necessity of a secure channel are major security concerns.We utilize an anonymous key generation technique to solve these problems.The equality test functionality further enables a cloud server to inspect whether two candidate trapdoors contain an identical keyword.In particular,the proposed scheme realizes fine-grained user-level authorization while maintaining strong key confidentiality.To revoke an invalid user identity,we add a revocation list to the system flows to restrict access privileges without increasing additional computation cost.To ensure security,it is shown that our system meets the security notion of IND-PrID-CCA and OW-ID-CCA under the Decisional Bilinear Diffie-Hellman(DBDH)assumption.展开更多
Coutsourides (1980) derives an ad hoc nuisance parameter removal test for testing the equality of two multiple correlation coefficients of two independent p variate normal populations, under the assumption that a samp...Coutsourides (1980) derives an ad hoc nuisance parameter removal test for testing the equality of two multiple correlation coefficients of two independent p variate normal populations, under the assumption that a sample of size n is available from each population. He also extends his ad hoc nuisance parameter removal test to the testing of the equality of two multiple correlation matrices. This paper presents likelihood ratio tests for testing the equality of k multiple correlation coefficients, and also k partial correlation coefficients.展开更多
In large sample studies where distributions may be skewed and not readily transformed to symmetry, it may be of greater interest to compare different distributions in terms of percentiles rather than means. For exampl...In large sample studies where distributions may be skewed and not readily transformed to symmetry, it may be of greater interest to compare different distributions in terms of percentiles rather than means. For example, it may be more informative to compare two or more populations with respect to their within population distributions by testing the hypothesis that their corresponding respective 10th, 50th, and 90th percentiles are equal. As a generalization of the median test, the proposed test statistic is asymptotically distributed as Chi-square with degrees of freedom dependent upon the number of percentiles tested and constraints of the null hypothesis. Results from simulation studies are used to validate the nominal 0.05 significance level under the null hypothesis, and asymptotic power properties that are suitable for testing equality of percentile profiles against selected profile discrepancies for a variety of underlying distributions. A pragmatic example is provided to illustrate the comparison of the percentile profiles for four body mass index distributions.展开更多
The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the ...The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the environmentofVSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users,so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, inthis paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTASET).The scheme combines fault-tolerant and aggregate signcryption,whichnot onlymakes up for the deficiency oflow security of aggregate signature, but alsomakes up for the deficiency that aggregate signcryption cannot tolerateinvalid signature. The scheme supports one verification pass when all signcryptions are valid, and it supportsunbounded aggregation when the total number of signcryptions grows dynamically. In addition, this schemesupports heterogeneous equality test, and realizes the access control of private data in different cryptographicenvironments, so as to achieve flexibility in the application of our scheme and realize the function of quick searchof plaintext or ciphertext. Then, the security of HFTAS-ET is demonstrated by strict theoretical analysis. Finally, weconduct strict and standardized experimental operation and performance evaluation, which shows that the schemehas better performance.展开更多
Rapid and timely testing is essential to minimize the COVID-19 spread. Decision makers and policy planners need to determine the equal distribution and accessibility of testing sites. This study mainly examines the sp...Rapid and timely testing is essential to minimize the COVID-19 spread. Decision makers and policy planners need to determine the equal distribution and accessibility of testing sites. This study mainly examines the spatial equality of COVID-19 testing sites that maintain a zero COVID policy in Guangzhou City. The study has identified the spatial disparities of COVID testing sites, characteristics of testing locations, and accessibility. The study has obtained information on COVID testing sites in Guangzhou City and population data. Point pattern analyses, Euclidian distance and allocation, and network analyses are the main methods used to achieve the research objectives, and 1183 total COVID testing sites can be recognized in Guangzhou City. Results revealed that spatial disparities could be noticed over the study area. Testing locations of Guangzhou City are highly clustered. The most significant testing sites are located in Haizhu District, which has the third largest population. The highest population density can be identified in Yuexiu District. However, only 94 testing sites are located there. According to all the results, higher disparities can be identified, and a lack of testing sites is located in the north part of the study area. Some people in the northern part have to travel more than 10 km to reach a testing site. Finally, this paper suggests increasing the number of testing sites in the north and south parts of the study area and keeping the same distribution, considering the area, total population, and population density. This kind of research will be helpful to decision-makers in making proper decisions to maintain a zero COVID policy.展开更多
Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment...Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment. We combined parallel key-insulated encryption (PKIE) with multiple helper keys and identity-based encryption with the equality test (IBE-ET) to obtain parallel key insulated ID-based public key encryption with outsourced equivalent test (PKI-IBPKE-ET). The scheme inherits the advantages of identity-based encryption (IBE), which simplifies certificate management for public key encryption. Furthermore, the parallel key-insulation with multiple helper mechanism was introduced in our scheme, which perfectly reduced the possibility of helper key exposure. Our scheme will enable the protection and periodic update of decryption keys in insecure environment. Our scheme achieves a weak indistinguishable identity chosen ciphertext (W-IND-ID-CCA) security in the random oracle model. Ultimately, it is observed that our scheme is feasible and practical through the experimental simulation and theoretical analysis.展开更多
The presence of heteroskedasticity in a considered regression model may bias the standard deviations of parameters obtained by the Ordinary Least Square (OLS) method. In this case, several hypothesis tests on the mode...The presence of heteroskedasticity in a considered regression model may bias the standard deviations of parameters obtained by the Ordinary Least Square (OLS) method. In this case, several hypothesis tests on the model under consideration may be biased, for example, CHOW’s coefficient stability test (or structural change test), Student’s t-test and Fisher’s F-test. Most of the heteroscedasticity tests in the literature are based on the comparison of variances. Despite the multiplication of equality tests of coefficients of variation (CVs) that have appeared in the literature, to our knowledge, the first and only use of the coefficient of variation in the detection of heteroskedasticity was offered by Li and Yao in 2017. Thus, this paper offers an approach to determine the existence of heteroskedasticity by a test of equality of coefficients of variation. We verify by a Monte Carlo robustness and performance test that our method seems even better than some tests in the literature. The results of this study contribute to the exploitation of the statistical measurement of CV dispersion. They help technicians economists to better verify their hypotheses before making a scientific decision when making a necessary forecast, in order to contribute effectively to the economic and sustainable development of a company or enterprise.展开更多
Al-11%Si(mass fraction)alloy was transformed into a ductile material by equal-channel angular pressing(ECAP)with a rotary die.Two mechanisms at impact test,slip deformation by dislocation motion and grain boundary sli...Al-11%Si(mass fraction)alloy was transformed into a ductile material by equal-channel angular pressing(ECAP)with a rotary die.Two mechanisms at impact test,slip deformation by dislocation motion and grain boundary sliding,were discussed.The ultrafine grains with modified grain boundaries and the high content of fine particles(<1μm)were necessary for attaining high absorbed energy.The results contradict the condition of slip deformation by dislocation motion and coincide with that of grain boundary sliding.Many fine zigzag lines like a mosaic were observed on the side surface of the tested specimens.These observed lines may show grain boundaries appeared by the sliding of grains.展开更多
This paper shows influence of gender equality on economy where it analyzed how gender equality in Europe has affected on the development of the frozen food industry and services related to childcare. The development o...This paper shows influence of gender equality on economy where it analyzed how gender equality in Europe has affected on the development of the frozen food industry and services related to childcare. The development of these industries has given a positive impulse to the development of the whole economy. In this analysis, it is used multiple regressions as one of the most important statistical methods. In the first part of this paper, it shows the connection among the growth of female employment, growth in frozen food expenditure and growth of GDP in United Kingdom. In the second part of paper, it shows the relationship among the growth of labor force participation of women, growth of number of kindergarten and growth of GDP in Hungary. To proof these relationships, it used a multiple regression model. This statistical model was tested by using the T schedule which showed that the model in both the analyses is correct. At the end of the paper, it presents that employment rate and GDP behaves in the same way in European Union. These analyses show that it is necessary to continue to strengthen gender equality if the policy makers want to achieve even greater economic growth. The issue of gender equality is a very important factor in creating employment policy, and statisticians should be more involved in process of employment policy and gender equality展开更多
Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without decryption.Since peopl...Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without decryption.Since people prefer to encrypt before outsourcing their data for privacy protection nowadays,the research of IBEET on cloud computing applications naturally attracts attention.However,we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption(IBE)mechanism.In traditional IBEET,the private key generator(PKG)with the master secret key generates trapdoors for all authorized cloud servers.Considering the reality in practice,the PKG is usually not fully trusted.In this case,the Private-Key Generator(PKG)may generate,share,or even sell any trapdoor without any risk of being caught,or not being held accountable,which may lead to serious consequences such as the illegal sharing of a gene bank's trapdoors.In this paper,to relieve the illegal trapdoor sharing problem in IBEET,we present a new notion,called IBEET Supporting Accountable Authorization(IBEET-AA).In IBEET-AA,if there is a disputed trapdoor,the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm.For the additional tracing function,except for the traditional indistinguishability(IND)and one-way(OW)security models in IBEET,we define three more security models to protect the tracing security against dishonest authorizers,PKG,and testers,respectively.Based on Gentry's IBE scheme,we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles.展开更多
Zero-inflated distributions are common in statistical problems where there is interest in testing homogeneity of two or more independent groups. Often, the underlying distribution that has an inflated number of zero-v...Zero-inflated distributions are common in statistical problems where there is interest in testing homogeneity of two or more independent groups. Often, the underlying distribution that has an inflated number of zero-valued observations is asymmetric, and its functional form may not be known or easily characterized. In this case, comparisons of the groups in terms of their respective percentiles may be appropriate as these estimates are nonparametric and more robust to outliers and other irregularities. The median test is often used to compare distributions with similar but asymmetric shapes but may be uninformative when there are excess zeros or dissimilar shapes. For zero-inflated distributions, it is useful to compare the distributions with respect to their proportion of zeros, coupled with the comparison of percentile profiles for the observed non-zero values. A simple chi-square test for simultaneous testing of these two components is proposed, applicable to both continuous and discrete data. Results of simulation studies are reported to summarize empirical power under several scenarios. We give recommendations for the minimum sample size which is necessary to achieve suitable test performance in specific examples.展开更多
For square contingency tables with ordered categories, the present paper gives several theorems that the symmetry model holds if and only if the generalized linear diagonals-parameter symmetry model for cell probabili...For square contingency tables with ordered categories, the present paper gives several theorems that the symmetry model holds if and only if the generalized linear diagonals-parameter symmetry model for cell probabilities and for cumulative probabilities and the mean nonequality model of row and column variables hold. It also shows the orthogonality of statistic for testing goodness-of-fit of the symmetry model. An example is given.展开更多
The meteorological measurement automatic temperature testing system has a defective image. To solve the problem such as noise and insufficient contrast, and put forward the research program for image pretreatment, the...The meteorological measurement automatic temperature testing system has a defective image. To solve the problem such as noise and insufficient contrast, and put forward the research program for image pretreatment, the median filter, histogram equalization and image binarization, methods were used to remove noise and enhance images. Results showed that feature points were clear and accurate after the experiment. This simulation experiment prepared for the follow-up subsequent recognition process.展开更多
当今科技飞速发展,隐私保护成为一个重要议题.为了确保数据的安全性,通常选择将数据加密后存储在云服务器上,然而这样云服务器无法对加密后的数据进行计算、统计等有效处理,从而使得很多应用场景受限.为了解决这个问题,提出一种基于环...当今科技飞速发展,隐私保护成为一个重要议题.为了确保数据的安全性,通常选择将数据加密后存储在云服务器上,然而这样云服务器无法对加密后的数据进行计算、统计等有效处理,从而使得很多应用场景受限.为了解决这个问题,提出一种基于环上容错学习(ring learning with error,R-LWE)问题的PKE-MET(public-key encryption with a multiple-ciphertext equality test)方案,并给出了正确性和安全性分析.该方案允许云服务器同时对多个密文执行相等性测试,还能够抵抗量子计算攻击.基于Palisade库对方案进行了实现,从理论与实现的角度与其他方案进行了比较分析.相较于其他方案,该方案具有高效、运行时间短的优点.展开更多
基金supported in part by the National Science and Technology Council of Taiwan under the contract numbers NSTC 114-2221-E-019-055-MY2 and NSTC 114-2221-E-019-069.
文摘Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud architecture,makes it difficult to quickly respond to the demands of IoT applications and local computation.To make up for these deficiencies in the cloud,fog computing has emerged as a critical role in the IoT applications.It decentralizes the computing power to various lower nodes close to data sources,so as to achieve the goal of low latency and distributed processing.With the data being frequently exchanged and shared between multiple nodes,it becomes a challenge to authorize data securely and efficiently while protecting user privacy.To address this challenge,proxy re-encryption(PRE)schemes provide a feasible way allowing an intermediary proxy node to re-encrypt ciphertext designated for different authorized data requesters without compromising any plaintext information.Since the proxy is viewed as a semi-trusted party,it should be taken to prevent malicious behaviors and reduce the risk of data leakage when implementing PRE schemes.This paper proposes a new fog-assisted identity-based PRE scheme supporting anonymous key generation,equality test,and user revocation to fulfill various IoT application requirements.Specifically,in a traditional identity-based public key architecture,the key escrow problem and the necessity of a secure channel are major security concerns.We utilize an anonymous key generation technique to solve these problems.The equality test functionality further enables a cloud server to inspect whether two candidate trapdoors contain an identical keyword.In particular,the proposed scheme realizes fine-grained user-level authorization while maintaining strong key confidentiality.To revoke an invalid user identity,we add a revocation list to the system flows to restrict access privileges without increasing additional computation cost.To ensure security,it is shown that our system meets the security notion of IND-PrID-CCA and OW-ID-CCA under the Decisional Bilinear Diffie-Hellman(DBDH)assumption.
文摘Coutsourides (1980) derives an ad hoc nuisance parameter removal test for testing the equality of two multiple correlation coefficients of two independent p variate normal populations, under the assumption that a sample of size n is available from each population. He also extends his ad hoc nuisance parameter removal test to the testing of the equality of two multiple correlation matrices. This paper presents likelihood ratio tests for testing the equality of k multiple correlation coefficients, and also k partial correlation coefficients.
文摘In large sample studies where distributions may be skewed and not readily transformed to symmetry, it may be of greater interest to compare different distributions in terms of percentiles rather than means. For example, it may be more informative to compare two or more populations with respect to their within population distributions by testing the hypothesis that their corresponding respective 10th, 50th, and 90th percentiles are equal. As a generalization of the median test, the proposed test statistic is asymptotically distributed as Chi-square with degrees of freedom dependent upon the number of percentiles tested and constraints of the null hypothesis. Results from simulation studies are used to validate the nominal 0.05 significance level under the null hypothesis, and asymptotic power properties that are suitable for testing equality of percentile profiles against selected profile discrepancies for a variety of underlying distributions. A pragmatic example is provided to illustrate the comparison of the percentile profiles for four body mass index distributions.
基金supported in part by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province under Grant SKLACSS-202102in part by the Intelligent Terminal Key Laboratory of Sichuan Province under Grant SCITLAB-1019.
文摘The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the environmentofVSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users,so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, inthis paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTASET).The scheme combines fault-tolerant and aggregate signcryption,whichnot onlymakes up for the deficiency oflow security of aggregate signature, but alsomakes up for the deficiency that aggregate signcryption cannot tolerateinvalid signature. The scheme supports one verification pass when all signcryptions are valid, and it supportsunbounded aggregation when the total number of signcryptions grows dynamically. In addition, this schemesupports heterogeneous equality test, and realizes the access control of private data in different cryptographicenvironments, so as to achieve flexibility in the application of our scheme and realize the function of quick searchof plaintext or ciphertext. Then, the security of HFTAS-ET is demonstrated by strict theoretical analysis. Finally, weconduct strict and standardized experimental operation and performance evaluation, which shows that the schemehas better performance.
文摘Rapid and timely testing is essential to minimize the COVID-19 spread. Decision makers and policy planners need to determine the equal distribution and accessibility of testing sites. This study mainly examines the spatial equality of COVID-19 testing sites that maintain a zero COVID policy in Guangzhou City. The study has identified the spatial disparities of COVID testing sites, characteristics of testing locations, and accessibility. The study has obtained information on COVID testing sites in Guangzhou City and population data. Point pattern analyses, Euclidian distance and allocation, and network analyses are the main methods used to achieve the research objectives, and 1183 total COVID testing sites can be recognized in Guangzhou City. Results revealed that spatial disparities could be noticed over the study area. Testing locations of Guangzhou City are highly clustered. The most significant testing sites are located in Haizhu District, which has the third largest population. The highest population density can be identified in Yuexiu District. However, only 94 testing sites are located there. According to all the results, higher disparities can be identified, and a lack of testing sites is located in the north part of the study area. Some people in the northern part have to travel more than 10 km to reach a testing site. Finally, this paper suggests increasing the number of testing sites in the north and south parts of the study area and keeping the same distribution, considering the area, total population, and population density. This kind of research will be helpful to decision-makers in making proper decisions to maintain a zero COVID policy.
文摘Parallel key-insulation allows the use of multiple helper keys to protect private decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment. We combined parallel key-insulated encryption (PKIE) with multiple helper keys and identity-based encryption with the equality test (IBE-ET) to obtain parallel key insulated ID-based public key encryption with outsourced equivalent test (PKI-IBPKE-ET). The scheme inherits the advantages of identity-based encryption (IBE), which simplifies certificate management for public key encryption. Furthermore, the parallel key-insulation with multiple helper mechanism was introduced in our scheme, which perfectly reduced the possibility of helper key exposure. Our scheme will enable the protection and periodic update of decryption keys in insecure environment. Our scheme achieves a weak indistinguishable identity chosen ciphertext (W-IND-ID-CCA) security in the random oracle model. Ultimately, it is observed that our scheme is feasible and practical through the experimental simulation and theoretical analysis.
文摘The presence of heteroskedasticity in a considered regression model may bias the standard deviations of parameters obtained by the Ordinary Least Square (OLS) method. In this case, several hypothesis tests on the model under consideration may be biased, for example, CHOW’s coefficient stability test (or structural change test), Student’s t-test and Fisher’s F-test. Most of the heteroscedasticity tests in the literature are based on the comparison of variances. Despite the multiplication of equality tests of coefficients of variation (CVs) that have appeared in the literature, to our knowledge, the first and only use of the coefficient of variation in the detection of heteroskedasticity was offered by Li and Yao in 2017. Thus, this paper offers an approach to determine the existence of heteroskedasticity by a test of equality of coefficients of variation. We verify by a Monte Carlo robustness and performance test that our method seems even better than some tests in the literature. The results of this study contribute to the exploitation of the statistical measurement of CV dispersion. They help technicians economists to better verify their hypotheses before making a scientific decision when making a necessary forecast, in order to contribute effectively to the economic and sustainable development of a company or enterprise.
文摘Al-11%Si(mass fraction)alloy was transformed into a ductile material by equal-channel angular pressing(ECAP)with a rotary die.Two mechanisms at impact test,slip deformation by dislocation motion and grain boundary sliding,were discussed.The ultrafine grains with modified grain boundaries and the high content of fine particles(<1μm)were necessary for attaining high absorbed energy.The results contradict the condition of slip deformation by dislocation motion and coincide with that of grain boundary sliding.Many fine zigzag lines like a mosaic were observed on the side surface of the tested specimens.These observed lines may show grain boundaries appeared by the sliding of grains.
文摘This paper shows influence of gender equality on economy where it analyzed how gender equality in Europe has affected on the development of the frozen food industry and services related to childcare. The development of these industries has given a positive impulse to the development of the whole economy. In this analysis, it is used multiple regressions as one of the most important statistical methods. In the first part of this paper, it shows the connection among the growth of female employment, growth in frozen food expenditure and growth of GDP in United Kingdom. In the second part of paper, it shows the relationship among the growth of labor force participation of women, growth of number of kindergarten and growth of GDP in Hungary. To proof these relationships, it used a multiple regression model. This statistical model was tested by using the T schedule which showed that the model in both the analyses is correct. At the end of the paper, it presents that employment rate and GDP behaves in the same way in European Union. These analyses show that it is necessary to continue to strengthen gender equality if the policy makers want to achieve even greater economic growth. The issue of gender equality is a very important factor in creating employment policy, and statisticians should be more involved in process of employment policy and gender equality
基金supported by the National Natural Science Foundation of China under Grant Nos.62102299,62272362,62002288the Henan Key Laboratory of Network Cryptography Technology under Grant No.LNCT2022-A05,and the Youth Innovation Team of Shaanxi Universities.
文摘Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without decryption.Since people prefer to encrypt before outsourcing their data for privacy protection nowadays,the research of IBEET on cloud computing applications naturally attracts attention.However,we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption(IBE)mechanism.In traditional IBEET,the private key generator(PKG)with the master secret key generates trapdoors for all authorized cloud servers.Considering the reality in practice,the PKG is usually not fully trusted.In this case,the Private-Key Generator(PKG)may generate,share,or even sell any trapdoor without any risk of being caught,or not being held accountable,which may lead to serious consequences such as the illegal sharing of a gene bank's trapdoors.In this paper,to relieve the illegal trapdoor sharing problem in IBEET,we present a new notion,called IBEET Supporting Accountable Authorization(IBEET-AA).In IBEET-AA,if there is a disputed trapdoor,the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm.For the additional tracing function,except for the traditional indistinguishability(IND)and one-way(OW)security models in IBEET,we define three more security models to protect the tracing security against dishonest authorizers,PKG,and testers,respectively.Based on Gentry's IBE scheme,we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles.
文摘Zero-inflated distributions are common in statistical problems where there is interest in testing homogeneity of two or more independent groups. Often, the underlying distribution that has an inflated number of zero-valued observations is asymmetric, and its functional form may not be known or easily characterized. In this case, comparisons of the groups in terms of their respective percentiles may be appropriate as these estimates are nonparametric and more robust to outliers and other irregularities. The median test is often used to compare distributions with similar but asymmetric shapes but may be uninformative when there are excess zeros or dissimilar shapes. For zero-inflated distributions, it is useful to compare the distributions with respect to their proportion of zeros, coupled with the comparison of percentile profiles for the observed non-zero values. A simple chi-square test for simultaneous testing of these two components is proposed, applicable to both continuous and discrete data. Results of simulation studies are reported to summarize empirical power under several scenarios. We give recommendations for the minimum sample size which is necessary to achieve suitable test performance in specific examples.
文摘For square contingency tables with ordered categories, the present paper gives several theorems that the symmetry model holds if and only if the generalized linear diagonals-parameter symmetry model for cell probabilities and for cumulative probabilities and the mean nonequality model of row and column variables hold. It also shows the orthogonality of statistic for testing goodness-of-fit of the symmetry model. An example is given.
文摘The meteorological measurement automatic temperature testing system has a defective image. To solve the problem such as noise and insufficient contrast, and put forward the research program for image pretreatment, the median filter, histogram equalization and image binarization, methods were used to remove noise and enhance images. Results showed that feature points were clear and accurate after the experiment. This simulation experiment prepared for the follow-up subsequent recognition process.
文摘当今科技飞速发展,隐私保护成为一个重要议题.为了确保数据的安全性,通常选择将数据加密后存储在云服务器上,然而这样云服务器无法对加密后的数据进行计算、统计等有效处理,从而使得很多应用场景受限.为了解决这个问题,提出一种基于环上容错学习(ring learning with error,R-LWE)问题的PKE-MET(public-key encryption with a multiple-ciphertext equality test)方案,并给出了正确性和安全性分析.该方案允许云服务器同时对多个密文执行相等性测试,还能够抵抗量子计算攻击.基于Palisade库对方案进行了实现,从理论与实现的角度与其他方案进行了比较分析.相较于其他方案,该方案具有高效、运行时间短的优点.