首页 > 最新文献

2013 16th International Conference on Network-Based Information Systems最新文献

英文 中文
Secure Aggregation and Attack Detection for Smart Grid System 智能电网系统的安全聚合与攻击检测
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.41
Inshil Doh, Jiyoung Lim, K. Chae
Smart grid is a very efficient and intelligent system for managing and monitoring the electricity usage and it can be applied in many useful areas. It supports energy producers and consumers efficiently by supporting the estimation and provision of the proper amount of electricity in proper time. However, when the information is altered or forged by the attackers, it could cause the system malfunction. In addition to that, some attacks could waste the system resources on purpose and could lead to disastrous results. In this work, we propose a secure data aggregation mechanism providing verification of the aggregated data and detection of the compromised node to prevent the DoS(Denial of Service) attack based on the homomorphic encryption.
智能电网是一种高效、智能的电力管理和监控系统,它可以应用于许多有用的领域。它通过支持在适当的时间估计和提供适当的电量,有效地支持能源生产者和消费者。但是,当这些信息被攻击者篡改或伪造时,可能会导致系统故障。除此之外,一些攻击可能会故意浪费系统资源,并可能导致灾难性的结果。在这项工作中,我们提出了一种安全的数据聚合机制,提供聚合数据的验证和受损节点的检测,以防止基于同态加密的DoS(拒绝服务)攻击。
{"title":"Secure Aggregation and Attack Detection for Smart Grid System","authors":"Inshil Doh, Jiyoung Lim, K. Chae","doi":"10.1109/NBiS.2013.41","DOIUrl":"https://doi.org/10.1109/NBiS.2013.41","url":null,"abstract":"Smart grid is a very efficient and intelligent system for managing and monitoring the electricity usage and it can be applied in many useful areas. It supports energy producers and consumers efficiently by supporting the estimation and provision of the proper amount of electricity in proper time. However, when the information is altered or forged by the attackers, it could cause the system malfunction. In addition to that, some attacks could waste the system resources on purpose and could lead to disastrous results. In this work, we propose a secure data aggregation mechanism providing verification of the aggregated data and detection of the compromised node to prevent the DoS(Denial of Service) attack based on the homomorphic encryption.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121027551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Marking Intrusion of Transaction-Based Applications in Wireless Storage Area Network 无线存储区域网络中基于事务应用的入侵标记
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.91
S. Chatti, Habib Ounelli
Due to the increasing amount of data handled by business applications and the need of an easy way to access data by multiple servers, storage area networks (SAN) have been proposed as a solution to be deployed in enterprises networks. Introducing the wireless aspects to the SAN environment enables more flexibility but it introduces at the same time a set of threats and vulnerabilities that may be exploited by the intruder in order to cause damage to network resources. The integration of transaction-based applications in these environment introduces an additional set of threats that may prevent the correct processing in the wireless storage area network (WSAN) environment. In this context, we propose a marking intrusion for WSAN environment.
由于业务应用程序处理的数据量不断增加,并且需要一种简便的方式来通过多台服务器访问数据,存储区域网络(SAN)被提出作为一种部署在企业网络中的解决方案。将无线方面引入SAN环境可以实现更大的灵活性,但同时也引入了一组威胁和漏洞,入侵者可能会利用这些威胁和漏洞对网络资源造成破坏。在这些环境中集成基于事务的应用程序会引入一组额外的威胁,这些威胁可能会阻止无线存储区域网络(WSAN)环境中的正确处理。在此背景下,我们提出了一种WSAN环境下的标记入侵。
{"title":"Marking Intrusion of Transaction-Based Applications in Wireless Storage Area Network","authors":"S. Chatti, Habib Ounelli","doi":"10.1109/NBiS.2013.91","DOIUrl":"https://doi.org/10.1109/NBiS.2013.91","url":null,"abstract":"Due to the increasing amount of data handled by business applications and the need of an easy way to access data by multiple servers, storage area networks (SAN) have been proposed as a solution to be deployed in enterprises networks. Introducing the wireless aspects to the SAN environment enables more flexibility but it introduces at the same time a set of threats and vulnerabilities that may be exploited by the intruder in order to cause damage to network resources. The integration of transaction-based applications in these environment introduces an additional set of threats that may prevent the correct processing in the wireless storage area network (WSAN) environment. In this context, we propose a marking intrusion for WSAN environment.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123215802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of Dynamic Running Mode Switch Mechanism by Presence of OS Protection 基于操作系统保护的动态运行模式切换机制评估
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.56
K. Yokoyama, H. Kumon, H. Taniguchi
System call is high-cost operation because it causes switch the running mode of a process. As a solution reduce overhead of system call, we have proposed the Dynamic running Mode Switch Mechanism (DMSM) which can switch the running mode of process dynamically. Because DMSM enables that system call is substituted by simple function call, it dramatically improved of overhead of system call. However, DMSM cannot protect the OS to access an applications program executing by supervisor-mode. In this paper, we propose protection function of OS from an application with a supervisor-mode. We propose two types of protection function, i.e., virtual space switch mechanism and segmentation switch mechanism. We also evaluate the effectiveness of two protection functions compared with original DMSM.
系统调用是一种高成本的操作,因为它会导致进程运行模式的切换。为了减少系统调用的开销,我们提出了动态运行模式切换机制(DMSM),该机制可以动态地切换进程的运行模式。由于DMSM允许用简单的函数调用代替系统调用,极大地改善了系统调用的开销。但是,DMSM不能保护操作系统访问以管理员模式执行的应用程序。在本文中,我们提出了操作系统对具有管理模式的应用程序的保护功能。我们提出了两种保护功能,即虚拟空间切换机制和分段切换机制。与原始DMSM相比,我们还评估了两种保护功能的有效性。
{"title":"Evaluation of Dynamic Running Mode Switch Mechanism by Presence of OS Protection","authors":"K. Yokoyama, H. Kumon, H. Taniguchi","doi":"10.1109/NBiS.2013.56","DOIUrl":"https://doi.org/10.1109/NBiS.2013.56","url":null,"abstract":"System call is high-cost operation because it causes switch the running mode of a process. As a solution reduce overhead of system call, we have proposed the Dynamic running Mode Switch Mechanism (DMSM) which can switch the running mode of process dynamically. Because DMSM enables that system call is substituted by simple function call, it dramatically improved of overhead of system call. However, DMSM cannot protect the OS to access an applications program executing by supervisor-mode. In this paper, we propose protection function of OS from an application with a supervisor-mode. We propose two types of protection function, i.e., virtual space switch mechanism and segmentation switch mechanism. We also evaluate the effectiveness of two protection functions compared with original DMSM.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117143843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing 一种基于云计算的隐私保护数据聚合方案
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.24
Mebae Ushida, Kouichi Itoh, Yoshinori Katayama, Fumihiko Kozakura, H. Tsuda
In recent years, the evolution of the cloud computing increases the demand of the services which provides profitable information analyzed from huge data from heterogeneous information sources. In order to reduce the user's anxiety to store the private and confidential information in the cloud, various Privacy Preserving Data Mining (PPDM) techniques are developed, which enable the cloud to perform data mining from secured data. In this paper, we propose a PPDM technique specialized in data aggregation that satisfies following two requirements: (1)The information stored in the cloud is guaranteed against information leakage, because no profitable information is obtained from the secured data without the users' secret information, which is not stored in the cloud. (2)The cloud provides multi-level granularity of the aggregation results according to the user's authority.
近年来,云计算的发展增加了对服务的需求,这些服务可以从异构信息源的海量数据中分析出有用的信息。为了减少用户在云中存储隐私和机密信息的焦虑,开发了各种隐私保护数据挖掘(PPDM)技术,使云能够从安全数据中进行数据挖掘。在本文中,我们提出了一种专门用于数据聚合的PPDM技术,该技术满足以下两个要求:(1)存储在云中的信息不会泄露,因为如果没有存储在云中的用户的秘密信息,则不会从安全的数据中获得任何有用的信息。(2)云根据用户权限提供聚合结果的多级粒度。
{"title":"A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing","authors":"Mebae Ushida, Kouichi Itoh, Yoshinori Katayama, Fumihiko Kozakura, H. Tsuda","doi":"10.1109/NBiS.2013.24","DOIUrl":"https://doi.org/10.1109/NBiS.2013.24","url":null,"abstract":"In recent years, the evolution of the cloud computing increases the demand of the services which provides profitable information analyzed from huge data from heterogeneous information sources. In order to reduce the user's anxiety to store the private and confidential information in the cloud, various Privacy Preserving Data Mining (PPDM) techniques are developed, which enable the cloud to perform data mining from secured data. In this paper, we propose a PPDM technique specialized in data aggregation that satisfies following two requirements: (1)The information stored in the cloud is guaranteed against information leakage, because no profitable information is obtained from the secured data without the users' secret information, which is not stored in the cloud. (2)The cloud provides multi-level granularity of the aggregation results according to the user's authority.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application for Mobile Cloud Learning 移动云学习应用
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.46
Jae Dong Lee, J. Park
E-learning applications and processes include Web-based learning, computer-based learning, virtual classrooms and digital collaboration. Recently, in the system development case, cloud computing has applied for learning system. This research aims to make a model for mobile cloud learning system and its application. In the system, it has three layers; system layer, application layer and user layer.
电子学习应用和过程包括基于网络的学习、基于计算机的学习、虚拟教室和数字协作。最近,在系统开发案例中,云计算应用于学习系统。本研究旨在为移动云学习系统及其应用建立一个模型。在这个系统中,它有三层;系统层、应用层和用户层。
{"title":"Application for Mobile Cloud Learning","authors":"Jae Dong Lee, J. Park","doi":"10.1109/NBiS.2013.46","DOIUrl":"https://doi.org/10.1109/NBiS.2013.46","url":null,"abstract":"E-learning applications and processes include Web-based learning, computer-based learning, virtual classrooms and digital collaboration. Recently, in the system development case, cloud computing has applied for learning system. This research aims to make a model for mobile cloud learning system and its application. In the system, it has three layers; system layer, application layer and user layer.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Targeted Advertisement Using Smartphones and Cloud Computing 利用智能手机和云计算进行定向广告
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.22
M. Durresi, Tamara Luarasi, I. Baholli, A. Durresi
Targeted advertisement is an efficient way of matching clients' buying preferences with potential products from various vendors. We propose an application architecture that uses smart phones and cloud computing to distribute in real time advertisement information to clients by matching their location, preferences and price range with available products. Our tests of the proposed application show its applicability in targeted advertisement.
定向广告是一种将客户的购买偏好与不同供应商的潜在产品相匹配的有效方式。我们提出了一种应用程序架构,该架构使用智能手机和云计算,通过将客户的位置、偏好和价格范围与可用产品相匹配,向客户分发实时广告信息。我们对所提出的应用程序进行了测试,证明了它在定向广告中的适用性。
{"title":"Targeted Advertisement Using Smartphones and Cloud Computing","authors":"M. Durresi, Tamara Luarasi, I. Baholli, A. Durresi","doi":"10.1109/NBiS.2013.22","DOIUrl":"https://doi.org/10.1109/NBiS.2013.22","url":null,"abstract":"Targeted advertisement is an efficient way of matching clients' buying preferences with potential products from various vendors. We propose an application architecture that uses smart phones and cloud computing to distribute in real time advertisement information to clients by matching their location, preferences and price range with available products. Our tests of the proposed application show its applicability in targeted advertisement.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"108 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128693198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
GEESE: A Cognitive USN Platform 鹅:一个认知USN平台
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.145
Junyoung Park, Youngjun Lee, Kyungroul Lee, Hanggon Kim, Dmitry Volokhov, Kangbin Yim
This paper introduces a framework for a ubiquitous sensor network along with its prototype platform, as a testbed for cognitive computing and routing algorithms. As wireless sensor networks have attracted worldwide attention as an important building block of the "Internet of Things", the cognitive sensor network is currently becoming a popular research topic as an intelligently-enhanced and power-efficient dynamic network. However, related research is still at the conceptual stage, and a realized test platform is essential. The combination of a framework and platform introduced in this paper is expected to be a useful testbed for cognitive computations and dynamic routing algorithms.
本文介绍了一个泛在传感器网络框架及其原型平台,作为认知计算和路由算法的测试平台。随着无线传感器网络作为“物联网”的重要组成部分受到世界各国的广泛关注,认知传感器网络作为一种智能增强、节能的动态网络正成为当前研究的热点。然而,相关研究仍处于概念阶段,实现测试平台是必不可少的。本文提出的框架与平台的结合有望为认知计算和动态路由算法提供一个有用的测试平台。
{"title":"GEESE: A Cognitive USN Platform","authors":"Junyoung Park, Youngjun Lee, Kyungroul Lee, Hanggon Kim, Dmitry Volokhov, Kangbin Yim","doi":"10.1109/NBiS.2013.145","DOIUrl":"https://doi.org/10.1109/NBiS.2013.145","url":null,"abstract":"This paper introduces a framework for a ubiquitous sensor network along with its prototype platform, as a testbed for cognitive computing and routing algorithms. As wireless sensor networks have attracted worldwide attention as an important building block of the \"Internet of Things\", the cognitive sensor network is currently becoming a popular research topic as an intelligently-enhanced and power-efficient dynamic network. However, related research is still at the conceptual stage, and a realized test platform is essential. The combination of a framework and platform introduced in this paper is expected to be a useful testbed for cognitive computations and dynamic routing algorithms.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127031789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Clustering Algorithm Using Twitter User Biography 基于Twitter用户传记的聚类算法
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.70
Masaki Kohana, S. Okamoto, Masaya Kaneko
Our previous work proposed a clustering algorithm to cluster research documents automatically. It used Web hit counts of AND-search on two words as a document vector. Target documents are clustered with a result of k-means clustering method, in which cosine similarity is used to calculate a distance. This paper uses this algorithm to cluster twitter users. However, the twitter users have different characteristics from the research documents. Therefore, we investigate problems of the using our algorithm for twitter users and propose some ideas to resolve it.
我们之前的工作提出了一种自动聚类研究文献的聚类算法。它使用对两个单词进行and搜索的Web命中次数作为文档向量。使用k-means聚类方法对目标文档进行聚类,其中使用余弦相似度计算距离。本文使用该算法对twitter用户进行聚类。然而,twitter用户的特征与研究文献有所不同。因此,我们对twitter用户使用我们的算法存在的问题进行了研究,并提出了一些解决问题的思路。
{"title":"A Clustering Algorithm Using Twitter User Biography","authors":"Masaki Kohana, S. Okamoto, Masaya Kaneko","doi":"10.1109/NBiS.2013.70","DOIUrl":"https://doi.org/10.1109/NBiS.2013.70","url":null,"abstract":"Our previous work proposed a clustering algorithm to cluster research documents automatically. It used Web hit counts of AND-search on two words as a document vector. Target documents are clustered with a result of k-means clustering method, in which cosine similarity is used to calculate a distance. This paper uses this algorithm to cluster twitter users. However, the twitter users have different characteristics from the research documents. Therefore, we investigate problems of the using our algorithm for twitter users and propose some ideas to resolve it.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114405481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Experiment on Ultra-resolution Video Transmission with Tiled Display Wall in Wide-Area Network 广域网中基于平铺显示墙的超分辨率视频传输实验
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.49
Yasuo Ebara, S. Noda, Akira Sakuraba, Y. Shibata
In order to realize high-realistic sensation tele-communication over wide-area network, we consider that non-verbal communication play an important role, and displaying the existence of participant by high-quality video streaming on large-scale screen system in each remote site is effective. However, the display specification of these systems such as commercial projector and wide-area monitor is low-resolution, and displaying of real video streaming with sufficient quality is difficult. Moreover, displaying video streaming with realistic high-resolution is serious, because there is a limit in the display resolution of video image captured by a single camera. We have constructed the tele-communication environment to display ultra resolution video streaming by multi-transmitting each video image which captured by four cameras with tiled display wall which is a technology to display various high-resolution contents by configuring the large-scale display with two or more LCD panels. In this paper, we have conducted an experiment on ultra-resolution video transmission between remote sites via wide-area network by using this tiled display wall environment in order to examine the feasibility of high-realistic sensation tele-communication, and have reported the experimental results.
为了实现广域网上的高真实感远程通信,我们认为非语言通信发挥着重要作用,在每个远程站点的大屏幕系统上通过高质量视频流显示参与者的存在是有效的。然而,商用投影仪和广域监视器等系统的显示规格较低,难以显示足够质量的真实视频流。此外,由于单个摄像机捕获的视频图像的显示分辨率有限,因此以逼真的高分辨率显示视频流是一个严峻的问题。我们构建了一个显示超分辨率视频流的远程通信环境,通过4个平铺显示墙摄像机拍摄的视频图像进行多路传输,这是一种通过配置两个或多个LCD面板来显示各种高分辨率内容的技术。为了验证高真实感远程通信的可行性,本文利用该平铺显示墙环境进行了远程站点间广域网超分辨率视频传输实验,并报告了实验结果。
{"title":"An Experiment on Ultra-resolution Video Transmission with Tiled Display Wall in Wide-Area Network","authors":"Yasuo Ebara, S. Noda, Akira Sakuraba, Y. Shibata","doi":"10.1109/NBiS.2013.49","DOIUrl":"https://doi.org/10.1109/NBiS.2013.49","url":null,"abstract":"In order to realize high-realistic sensation tele-communication over wide-area network, we consider that non-verbal communication play an important role, and displaying the existence of participant by high-quality video streaming on large-scale screen system in each remote site is effective. However, the display specification of these systems such as commercial projector and wide-area monitor is low-resolution, and displaying of real video streaming with sufficient quality is difficult. Moreover, displaying video streaming with realistic high-resolution is serious, because there is a limit in the display resolution of video image captured by a single camera. We have constructed the tele-communication environment to display ultra resolution video streaming by multi-transmitting each video image which captured by four cameras with tiled display wall which is a technology to display various high-resolution contents by configuring the large-scale display with two or more LCD panels. In this paper, we have conducted an experiment on ultra-resolution video transmission between remote sites via wide-area network by using this tiled display wall environment in order to examine the feasibility of high-realistic sensation tele-communication, and have reported the experimental results.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114949684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Addition Formula on Elliptic Curves Given by Weierstrass Normal Form 用weerstrass范式给出椭圆曲线的一个改进的加法公式
Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.88
Masaaki Shirase
An improved addition formula for an elliptic curve given by Weierstrass form is proposed. First, the coordinate is converted so that P = (0, y1) and Q = (x2, y2), and then the equation of the elliptic curve becomes y2 = x3 + ax2 + bx + c. The proposed formula is thus “x-coordinate of P + Q= (b - 2λy1)/x2”, where λ is the slope of the line through P and Q. The proposed formula can be derived by the geometric definition of point addition. Applying the proposed formula reduces the cost of adding point by about 20% on a system using the mixed coordinate of affine + projective = projective. However, it increases the cost of doubling point, and so we require a further improvement in the future.
提出了一种改进的weerstrass形式椭圆曲线的加法公式。首先将坐标变换为P = (0, y1), Q= (x2, y2),然后椭圆曲线方程变为y2 = x3 + ax2 + bx + c,由此得到“P + Q的x坐标= (b - 2λy1)/x2”,其中λ为经过P和Q的直线斜率。根据点加法的几何定义,可以推导出该公式。在仿射+射影=射影的混合坐标系下,应用该公式可使系统的加点成本降低约20%。但是,它增加了倍点的成本,因此我们需要在未来进一步改进。
{"title":"An Improved Addition Formula on Elliptic Curves Given by Weierstrass Normal Form","authors":"Masaaki Shirase","doi":"10.1109/NBiS.2013.88","DOIUrl":"https://doi.org/10.1109/NBiS.2013.88","url":null,"abstract":"An improved addition formula for an elliptic curve given by Weierstrass form is proposed. First, the coordinate is converted so that P = (0, y<sub>1</sub>) and Q = (x<sub>2</sub>, y<sub>2</sub>), and then the equation of the elliptic curve becomes y<sup>2</sup> = x<sup>3</sup> + ax<sup>2</sup> + bx + c. The proposed formula is thus “x-coordinate of P + Q= (b - 2λ<sub>y1</sub>)/x<sub>2</sub>”, where λ is the slope of the line through P and Q. The proposed formula can be derived by the geometric definition of point addition. Applying the proposed formula reduces the cost of adding point by about 20% on a system using the mixed coordinate of affine + projective = projective. However, it increases the cost of doubling point, and so we require a further improvement in the future.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122676450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 16th International Conference on Network-Based Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1