期刊文献+
共找到80篇文章
< 1 2 4 >
每页显示 20 50 100
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
1
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
在线阅读 下载PDF
Self-Adapting Routing for Two-Layered Satellite Networks 被引量:3
2
作者 刘小跃 马建峰 郝选文 《China Communications》 SCIE CSCD 2011年第4期116-124,共9页
The rapid advancement of communication and satellite technology drives broadband satellite networks to carry different traffic loads.However,traffic class routing of satellite cannot be provided by the existing 2-laye... The rapid advancement of communication and satellite technology drives broadband satellite networks to carry different traffic loads.However,traffic class routing of satellite cannot be provided by the existing 2-layerd satellite networks.In this paper,a 2-layered satellite network composed of low-Earth orbit and medium-Earth orbit satellite networks is presented,and a novel Self-adapting Routing Protocol(SRP)is developed.This scheme aims to adopt self-adapting routing algorithm to support different traffic classes.Meanwhile,the path discovery processing is invoked independently for each individual origin/destination pair.Simulation results are provided to evaluate the performance of the new scheme in terms of end-to-end delay,normalized data throughput,delay jitter and delivery ratio. 展开更多
关键词 SATELLITE ROUTING traffic class 2-layered
在线阅读 下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
3
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
在线阅读 下载PDF
Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks 被引量:1
4
作者 陈曦 田有亮 +1 位作者 李兴华 马建峰 《China Communications》 SCIE CSCD 2011年第4期132-140,共9页
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-... In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks. 展开更多
关键词 opportunistic networks social context-based routing identity-based signature threshold cryptography
在线阅读 下载PDF
Shortest Link Scheduling in Wireless Networks with Oblivious Power Control 被引量:1
5
作者 Chunmei Ma Jiguo Yu +1 位作者 Baogui Huang Yu Meng 《China Communications》 SCIE CSCD 2021年第4期137-152,共16页
Link scheduling has always been a fundamental problem in wireless networks for its direct impacts on the performance of wireless networks such as throughput capacity,transmission delay,lifetime,etc.Existing work is ma... Link scheduling has always been a fundamental problem in wireless networks for its direct impacts on the performance of wireless networks such as throughput capacity,transmission delay,lifetime,etc.Existing work is mainly established under graphbased models,which are not only impractical but also incorrect due to the essentially fading characteristics of signals.In this paper,we study the shortest link scheduling problem under two more realistic models,namely the signal to interference plus noise ratio(SINR)model and the Rayleigh fading model.We propose a centralized square-based scheduling algorithm(CSSA)with oblivious power control under the SINR model and prove its correctness under both the SINR model and the Rayleigh fading model.Furthermore,we extend CSSA and propose a distributed square-based scheduling algorithm(DSSA).Note that DSSA adopts CSMA/CA so that a wireless node can compete for the wireless channel before starting its communication.We also show theoretical analysis and conduct extensive simulations to exhibit the correctness and efficiency of our algorithms. 展开更多
关键词 link scheduling SINR Rayleigh fading wireless networks wireless communications
在线阅读 下载PDF
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks 被引量:1
6
作者 Lingwei Xu Hao Yin +4 位作者 Hong Jia Wenzhong Lin Xinpeng Zhou Yong Fu Xu Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第2期400-410,共11页
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interc... Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent years.The mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all things.The variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication environments.Ensuring data secure transmission is critical for mobile IIoT networks.This paper investigates the data secure transmission performance prediction of mobile IIoT networks.To cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first derived.Then,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction algorithm.For mobile signals,the important features may be removed by the pooling layers.This will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is designed.Out of the input and output layers,it removes the pooling layer and contains six convolution layers.Elman,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed algorithm.Through simulation analysis,good prediction accuracy is achieved by the CNN algorithm.The prediction accuracy obtains a 59%increase. 展开更多
关键词 Mobile IIoT networks Data secure transmission Performance analysis Intelligent prediction Improved CNN
在线阅读 下载PDF
Millimeter Wave Massive MIMO Heterogeneous Networks Using Fuzzy-Based Deep Convolutional Neural Network (FDCNN)
7
作者 Hussain Alaaedi Masoud Sabaei 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期633-646,共14页
Enabling high mobility applications in millimeter wave(mmWave)based systems opens up a slew of new possibilities,including vehicle communi-cations in addition to wireless virtual/augmented reality.The narrow beam usag... Enabling high mobility applications in millimeter wave(mmWave)based systems opens up a slew of new possibilities,including vehicle communi-cations in addition to wireless virtual/augmented reality.The narrow beam usage in addition to the millimeter waves sensitivity might block the coverage along with the reliability of the mobile links.In this research work,the improvement in the quality of experience faced by the user for multimedia-related applications over the millimeter-wave band is investigated.The high attenuation loss in high frequencies is compensated with a massive array structure named Multiple Input and Multiple Output(MIMO)which is utilized in a hyperdense environment called heterogeneous networks(HetNet).The optimization problem which arises while maximizing the Mean Opinion Score(MOS)is analyzed along with the QoE(Quality of Experience)metric by considering the Base Station(BS)powers in addition to the needed Quality of Service(QoS).Most of the approaches related to wireless network communication are not suitable for the millimeter-wave band because of its problems due to high complexity and its dynamic nature.Hence a deep reinforcement learning framework is developed for tackling the same opti-mization problem.In this work,a Fuzzy-based Deep Convolutional Neural Net-work(FDCNN)is proposed in addition to a Deep Reinforcing Learning Framework(DRLF)for extracting the features of highly correlated data.The investigational results prove that the proposed method yields the highest satisfac-tion to the user by increasing the number of antennas in addition with the small-scale antennas at the base stations.The proposed work outperforms in terms of MOS with multiple antennas. 展开更多
关键词 Multiple-input and multiple-output quality of experience quality of service(qos) fuzzy-based deep convolutional neural network
在线阅读 下载PDF
Evaluation and Comparative Study of Wireless Sensors Networks Hierarchical Protocols
8
作者 Hassan Echoukairi Khalid Bouragba Mohammed Ouzzif 《通讯和计算机(中英文版)》 2016年第3期140-145,共6页
关键词 无线传感器网络 网络分层协议 评价 节点密度 定位功能 度量参数 模拟器 NS2
在线阅读 下载PDF
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
9
作者 SONG Jian HUANG Meng +3 位作者 LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang 《Journal of Ocean University of China》 2025年第2期377-386,共10页
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe navigation.However,vessel motion and challenging environmental conditions often affect measurement... Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe navigation.However,vessel motion and challenging environmental conditions often affect measurement precision.To address this issue,this study proposes an innovative framework for correcting and predicting shipborne wind speed.By integrating a main network with a momentum updating network,the proposed framework effectively extracts features from the time and frequency domains,thereby allowing for precise adjustments and predictions of shipborne wind speed data.Validation using real sensor data collected at the Qingdao Oceanographic Institute demonstrates that the proposed method outperforms existing approaches in single-and multi-step predictions compared to existing methods,achieving higher accuracy in wind speed forecasting.The proposed innovative approach offers a promising direction for future validation in more realistic maritime onboard scenarios. 展开更多
关键词 time series prediction wind speed correction comparative learning shipborne sensor
在线阅读 下载PDF
High-speed pHEMT-based low noise amplifier for 2.4-GHz wireless communication
10
作者 Omar S.Abdulwahid Ahmad N.Abdulfattah +2 位作者 Saad G.Muttlak Mohammadreza Sadeghi Mohamed Missous 《Journal of Electronic Science and Technology》 2025年第4期80-94,共15页
In the era of rapidly expanding wireless technologies,the push for larger spectrum efficiency and better signal integrity has intensified the need for high-efficient and low noise amplifiers(LNAs).A two-stage LNA base... In the era of rapidly expanding wireless technologies,the push for larger spectrum efficiency and better signal integrity has intensified the need for high-efficient and low noise amplifiers(LNAs).A two-stage LNA based on the GaAs/InGaAs pseudomorphic high electron mobility transistor(pHEMT)with a relatively large gate length of 2μm is designed for high-performance 2.4-GHz wireless communication.The I-V characteristic and two-port high-frequency S-parameter of the transistor are measured by on-wafer probing techniques.The results indicate that a discrete transistor with a gate size of 2μm×50μm can provide a maximum transconductance of 16 mS,corresponding to a maximum current-gain cut-off frequency of 7 GHz and maximum oscillation frequency of 8 GHz at the 1-V drain-source voltage.With the impedance matching networks based transmission line technique,an extended integrated layout structure is designed and simulated by using the momentum simulation tool embedded in Advanced Design System,to alleviate the trade-off between noise figure(NF)and gain of the circuit.The findings show that the transistor based on the GaAs/InGaAs technology is capable of delivering high performance with power consumption low to 16 mW,where the maximum simulated gain of 21.5 dB and minimum NF of 2.4 dB are achieved.In terms of linearity,the proposed LNA provides terrific output 1-dB compression of-3 dBm and output third-order intercept point values of 10 dBm.The bandwidth of 0.12 GHz and figure-of-merit of 12 are obtained,which are comparable to that of existing LNAs based on pHEMT.Such a device may benefit to accelerate the development of more robust and power-efficient front-end modules in modern wireless systems,especially for advancing performance-driven applications. 展开更多
关键词 Low noise amplifier Noise figure pHEMT characterization Transistor modeling Wireless communication
在线阅读 下载PDF
A Filter-Based Feature Selection Framework to Detect Phishing URLs Using Stacking Ensemble Machine Learning
11
作者 Nimra Bari Tahir Saleem +3 位作者 Munam Shah Abdulmohsen Algarni Asma Patel Insaf Ullah 《Computer Modeling in Engineering & Sciences》 2025年第10期1167-1187,共21页
Today,phishing is an online attack designed to obtain sensitive information such as credit card and bank account numbers,passwords,and usernames.We can find several anti-phishing solutions,such as heuristic detection,... Today,phishing is an online attack designed to obtain sensitive information such as credit card and bank account numbers,passwords,and usernames.We can find several anti-phishing solutions,such as heuristic detection,virtual similarity detection,black and white lists,and machine learning(ML).However,phishing attempts remain a problem,and establishing an effective anti-phishing strategy is a work in progress.Furthermore,while most antiphishing solutions achieve the highest levels of accuracy on a given dataset,their methods suffer from an increased number of false positives.These methods are ineffective against zero-hour attacks.Phishing sites with a high False Positive Rate(FPR)are considered genuine because they can cause people to lose a lot ofmoney by visiting them.Feature selection is critical when developing phishing detection strategies.Good feature selection helps improve accuracy;however,duplicate features can also increase noise in the dataset and reduce the accuracy of the algorithm.Therefore,a combination of filter-based feature selection methods is proposed to detect phishing attacks,including constant feature removal,duplicate feature removal,quasi-feature removal,correlated feature removal,mutual information extraction,and Analysis of Variance(ANOVA)testing.The technique has been tested with differentMachine Learning classifiers:Random Forest,Artificial Neural Network(ANN),Ada-Boost,Extreme Gradient Boosting(XGBoost),Logistic Regression,Decision Trees,Gradient Boosting Classifiers,Support Vector Machine(SVM),and two types of ensemble models,stacking and majority voting to gain A low false positive rate is achieved.Stacked ensemble classifiers(gradient boosting,randomforest,support vector machine)achieve 1.31%FPR and 98.17%accuracy on Dataset 1,2.81%FPR and Dataset 3 shows 2.81%FPR and 97.61%accuracy,while Dataset 2 shows 3.47%FPR and 96.47%accuracy. 展开更多
关键词 Phishing detection feature selection phishing detection stacking ensemble machine learning phishing URL
在线阅读 下载PDF
Hydrographic control on subsurface chlorophyll maximum in the northern South China Sea in autumn
12
作者 Xiang GONG Hui LIU +2 位作者 Xun GONG Jiyao LIU Huiwang GAO 《Journal of Oceanology and Limnology》 2025年第4期1213-1226,共14页
As a frequently-observed phenomenon in the northern South China Sea(nSCS),subsurface chlorophyll maximum(SCM)evolution from summer to winter remains unclear,neither the associated hydrographic control.In this study,on... As a frequently-observed phenomenon in the northern South China Sea(nSCS),subsurface chlorophyll maximum(SCM)evolution from summer to winter remains unclear,neither the associated hydrographic control.In this study,on the basis of in-situ data of fall-season cruises in 2004–2006,we characterized the depth,thickness and intensity of the SCM in the nSCS using a general Gaussian-function fitting approach,and investigated a linkage to the corresponding ocean vertical buoyance properties.Our results show that the SCM becomes deeper,thicker and less intense offshore-wards in the nSCS during fall seasons.In parallel,a correlation between the SCM variation and mixed layer depth exists in the nSCS,and it becomes pronounced in the shelf region compared to the slope and basin areas in autumn.Physically,once warmer surface ocean and thus stronger thermo-determined stratification,the SCM layer goes deeper and becomes thicker and less intense in the nSCS,especially in the shelf area of the nSCS.Moreover,the impact of water temperatures at deeper layers on the vertical stratification exerts more consequent roles on the spatial variability of SCM,compared to surface temperatures in the nSCS.Specifically,the isotherm line of 22℃ acts as crucial indicator for variations of the SCM in the nSCS during autumns. 展开更多
关键词 subsurface chlorophyll maximum(SCM) northern South China Sea(nSCS) autumn season hydrographic control
在线阅读 下载PDF
Response of the Yellow and East China seas low-trophic ecosystems to two typhoons at different translational speeds
13
作者 Lei ZHU Jing ZHANG +6 位作者 Changcen SHI Wei YANG Haiyan ZHANG Yucheng WANG Guangliang LIU Changwei BIAN Liang ZHAO 《Journal of Oceanology and Limnology》 2025年第5期1441-1461,共21页
Frequent typhoons can significantly change the temperature,nutrient availability,and phytoplankton biomass in marginal seas.The oceanic response to typhoons is usually influenced by the features of the typhoon,among w... Frequent typhoons can significantly change the temperature,nutrient availability,and phytoplankton biomass in marginal seas.The oceanic response to typhoons is usually influenced by the features of the typhoon,among which the translational speed is critically important.By using a high resolution coupled physical-biological model,we investigated the response of the Yellow and East China seas(YECS)to two typhoons at different translational speeds,Muifa in August 2011 and Bolaven in August 2012.The model well reproduced the spatial and temporal variations of temperature,chlorophyll-a concentration over the YECS.Results show that typhoons with slower translational speeds uplift more deep water,leading to a more significant oceanic response.Divergence and convergence caused nutrient fluxes in opposite directions in the surface and bottom layers.Moreover,the nutrient flux in the bottom layer was greater than that in the surface layer.These phenomena are closely related to the spatial distribution of nutrients.Further studies show that the degree of ocean response to typhoons is highly correlated with the initial conditions of physical and biological elements of the upper ocean before the typhoon,as well as with ocean structure.Pretyphoon initial conditions of oceanic physical and ecological elements,mixed layer depth,and potential energy anomalies can all alter the degree of typhoon-induced oceanic response.This study emphasizes the important roles of the translational speed of typhoons and the initial oceanic conditions in the oceanic response to typhoons. 展开更多
关键词 typhoon Yellow and East China seas(YECS) translational speed Ekman pumping
在线阅读 下载PDF
Provable Efficient Certificateless Group Key Exchange Protocol 被引量:8
14
作者 CAO Chunjie MA Jianfeng MOON Sangjae 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期41-45,共5页
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ... Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol. 展开更多
关键词 group key exchange certificateless public key cryptography provable security bilinear pairings
在线阅读 下载PDF
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings 被引量:5
15
作者 LI Fagen HU Yupu LIU Shuanggen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期17-20,共4页
Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we... Signcryption is a cryptographic primitive that performs signature and encryption simultaneously, at lower computational costs and communication overheads than the signature-then- encryption approach. In this paper, we propose an efficient multi-recipient signcryption scheme based on the bilinear pairings, which broadcasts a message to multiple users in a secure and authenticated manner. We prove its semantic security and unforgeability under the Gap Diffie-Hellman problem assumption in the random oracle model. The proposed scheme is more efficient than re-signcrypting a message n times using a signcryption scheme in terms of computational costs and communication overheads. 展开更多
关键词 SIGNCRYPTION multi-recipient signcryption bilinear pairings provable security
在线阅读 下载PDF
Optimizing of large-number-patterns string matching algorithms based on definite-state automata 被引量:3
16
作者 陈训逊 方滨兴 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第2期236-239,共4页
Because the small CACHE size of computers, the scanning speed of DFA based multi-pattern string-matching algorithms slows down rapidly especially when the number of patterns is very large. For solving such problems, w... Because the small CACHE size of computers, the scanning speed of DFA based multi-pattern string-matching algorithms slows down rapidly especially when the number of patterns is very large. For solving such problems, we cut down the scanning time of those algorithms (i.e. DFA based) by rearranging the states table and shrinking the DFA alphabet size. Both the methods can decrease the probability of large-scale random memory accessing and increase the probability of continuously memory accessing. Then the hitting rate of the CACHE is increased and the searching time of on the DFA is reduced. Shrinking the alphabet size of the DFA also reduces the storage complication. The AC++algorithm, by optimizing the Aho-Corasick (i.e. AC) algorithm using such methods, proves the theoretical analysis. And the experimentation results show that the scanning time of AC++and the storage occupied is better than that of AC in most cases and the result is much attractive when the number of patterns is very large. Because DFA is a widely used base algorithm in may string matching algorithms, such as DAWG, SBOM etc., the optimizing method discussed is significant in practice. 展开更多
关键词 multi-pattern string-matching definite-state automata Aho-Corasick algorithm CACHE
在线阅读 下载PDF
A New Method for Meet-in-the-Middle Attacks on Reduced AES 被引量:3
17
作者 董晓丽 胡予濮 +1 位作者 韦永壮 陈杰 《China Communications》 SCIE CSCD 2011年第2期21-25,共5页
A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering ... A new 5-round distinguisher of AES with key whitening is presented by using the properties of its round transformation. Based on this distinguisher,we present new meet-in-the-middle attacks on reduced AES considering the key schedule and the time-memory tradeoff approach. New attacks improve the best known meet-in-the-middle attacks on reduced AES presented at FSE2008.We reduce the time complexity of attacks on 7-round AES-192 and 8-round AES-256 by a factor of at least 28. Moreover,the distinguisher can be exploited to develop the attack on 8-round AES-192. 展开更多
关键词 AES RIJNDAEL CRYPTANALYSIS meet-in-the-middle attack
在线阅读 下载PDF
Identity-based Broadcast Encryption with Shorter Transmissions 被引量:2
18
作者 张乐友 胡予濮 牟宁波 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期641-645,共5页
This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphe... This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model. 展开更多
关键词 broadcast encryption identity-based encryption short transmissions provable security
原文传递
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
19
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:2
20
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level Bell states
原文传递
上一页 1 2 4 下一页 到第
使用帮助 返回顶部