首页 > 最新文献

2012 Fourth International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings 一种适用于多用户认证的高效概率cp - cm安全身份签名方案
Xi Sun, Zhengtao Jiang, Meirong Zhou, Yumin Wang
Digital signature is a foundational cryptographic primitive in modern information systems. Identity-based signatures are advantageous over signatures in the conventional public key infrastructure setting. Observing that most information systems are implemented in a multi-user setting in which some users might be corrupted, this paper proposes a new identity-based signature scheme. The new scheme is proven to be existentially unforgeable against chosen-principle and chosen-message (CP-CM) attackers who are the strongest attackers so far defined for identity-based signatures. The security of our scheme relies on the standard computational Diffie-Hellman (CDH) assumption. The proof is given in the random oracle model where a hash function modeled as random oracle. Analysis shows that our scheme is also more efficient than the state of the art in terms of computation and communication. This implies that our proposal is practical to realize efficient and secure authentication in multi-user settings.
数字签名是现代信息系统中最基本的密码原语。基于身份的签名比传统公钥基础设施设置中的签名更有优势。考虑到大多数信息系统都是在多用户环境下实现的,其中一些用户可能会被破坏,本文提出了一种新的基于身份的签名方案。新方案被证明对选择原则和选择消息(CP-CM)攻击者是存在不可伪造的,CP-CM是迄今为止针对基于身份签名定义的最强攻击者。该方案的安全性依赖于标准的计算Diffie-Hellman (CDH)假设。在随机oracle模型中给出了证明,其中哈希函数建模为随机oracle。分析表明,我们的方案在计算和通信方面也比目前的技术更有效。这意味着我们的方案可以在多用户环境中实现高效、安全的身份验证。
{"title":"An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings","authors":"Xi Sun, Zhengtao Jiang, Meirong Zhou, Yumin Wang","doi":"10.1109/iNCoS.2012.87","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.87","url":null,"abstract":"Digital signature is a foundational cryptographic primitive in modern information systems. Identity-based signatures are advantageous over signatures in the conventional public key infrastructure setting. Observing that most information systems are implemented in a multi-user setting in which some users might be corrupted, this paper proposes a new identity-based signature scheme. The new scheme is proven to be existentially unforgeable against chosen-principle and chosen-message (CP-CM) attackers who are the strongest attackers so far defined for identity-based signatures. The security of our scheme relies on the standard computational Diffie-Hellman (CDH) assumption. The proof is given in the random oracle model where a hash function modeled as random oracle. Analysis shows that our scheme is also more efficient than the state of the art in terms of computation and communication. This implies that our proposal is practical to realize efficient and secure authentication in multi-user settings.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Binary Authentication Tree Algorithm for Vehicular Networks 一种改进的车载网络二叉认证树算法
Huaqun Wang, Bo Qin, J. Domingo-Ferrer
Vehicular networks are gaining popularity because vehicular communications are able to help minimize accidents, improve traffic conditions, etc. To avoid malicious attacks and potential abuse, employing digital signatures is widely recognized as the most efficient approach for vehicular networks. However, when the number of signatures received by a roadside unit (RSU) becomes large, a scalability problem emerges immediately: it can be difficult for the RSU to sequentially verify every received signature within 100-300ms as required by the current Dedicated Short Range Communications (DSRC) broadcast protocol. Jiang et al. proposed a robust and efficient signature scheme for vehicular-to-infrastructure communications, called binary authentication tree. In this paper, we show that their binary authentication algorithm is insecure to at least two attacks. The first attack shows that the original binary authentication algorithm is universally forgeable under chosen-message attacks, i.e., the attacker can forge other vehicles' authentication on any message under chosen-message attack. The second attack shows that the original binary authentication algorithm is universally forgeable, i.e., the attacker can forge other vehicles' authentication on any message at will. Although Jiang et al.'s scheme is insecure, it can be repaired. Using the binary authentication tree model, we repair their scheme in order to make it provably secure and efficient.
车载网络越来越受欢迎,因为车载通信能够帮助减少事故,改善交通状况等。为了避免恶意攻击和潜在的滥用,使用数字签名被广泛认为是车辆网络最有效的方法。然而,当路边单元(RSU)接收到的签名数量变大时,可扩展性问题立即出现:RSU很难按照当前专用短程通信(DSRC)广播协议的要求,在100-300ms内依次验证每个接收到的签名。Jiang等人提出了一种鲁棒且高效的车对基础设施通信签名方案,称为二进制认证树。在本文中,我们证明了他们的二进制认证算法对至少两种攻击是不安全的。第一次攻击表明,在选择消息攻击下,原始的二进制认证算法具有普遍可伪造性,即攻击者可以在选择消息攻击下对任何消息伪造其他车辆的认证。第二次攻击表明,原始的二进制认证算法具有普遍可伪造性,即攻击者可以任意伪造其他车辆对任何消息的认证。虽然Jiang等人的方案是不安全的,但它是可以修复的。利用二叉认证树模型对其方案进行修复,使其具有可证明的安全性和有效性。
{"title":"An Improved Binary Authentication Tree Algorithm for Vehicular Networks","authors":"Huaqun Wang, Bo Qin, J. Domingo-Ferrer","doi":"10.1109/iNCoS.2012.27","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.27","url":null,"abstract":"Vehicular networks are gaining popularity because vehicular communications are able to help minimize accidents, improve traffic conditions, etc. To avoid malicious attacks and potential abuse, employing digital signatures is widely recognized as the most efficient approach for vehicular networks. However, when the number of signatures received by a roadside unit (RSU) becomes large, a scalability problem emerges immediately: it can be difficult for the RSU to sequentially verify every received signature within 100-300ms as required by the current Dedicated Short Range Communications (DSRC) broadcast protocol. Jiang et al. proposed a robust and efficient signature scheme for vehicular-to-infrastructure communications, called binary authentication tree. In this paper, we show that their binary authentication algorithm is insecure to at least two attacks. The first attack shows that the original binary authentication algorithm is universally forgeable under chosen-message attacks, i.e., the attacker can forge other vehicles' authentication on any message under chosen-message attack. The second attack shows that the original binary authentication algorithm is universally forgeable, i.e., the attacker can forge other vehicles' authentication on any message at will. Although Jiang et al.'s scheme is insecure, it can be repaired. Using the binary authentication tree model, we repair their scheme in order to make it provably secure and efficient.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127451114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimizing Task Allocation on Fire Fighting 消防任务分配优化
Frank-Gerrit Poggenpohl, Dennis Güttinger
In this work we consider the problem of allocating tasks to fire brigade roles when facing major incidents like conflagrations or natural disasters. Due to missing experience with major incidents, a balanced workload of the different roles cannot be guaranteed, as task allocation is usually done manually by operations managers based on their empirical knowledge. Concerning this, we will introduce a new concept of role specific penalty functions that assign a stress level to every role depending on its working time. As the resulting problem is NP-complete, we will use an optimization strategy that combines a greedy approach with a modified version of the simulated annealing algorithm to approximatively solve this optimization problem. In our experimental study we will see that the assignment of tasks to roles computed by this algorithm on an empirical data set leads to a smaller total processing time and to a more balanced workload of roles compared to action plan recommendations given by six operations managers from the fire brigade.
在这项工作中,我们考虑了在面对火灾或自然灾害等重大事件时分配任务给消防队角色的问题。由于缺乏处理重大事件的经验,无法保证不同角色的工作量平衡,因为任务分配通常是由运营经理根据经验知识手动完成的。对此,我们将引入角色特定惩罚函数的新概念,根据每个角色的工作时间为其分配压力水平。由于所得到的问题是np完全的,我们将使用一种优化策略,将贪婪方法与改进版的模拟退火算法结合起来,近似地解决这个优化问题。在我们的实验研究中,我们将看到,与来自消防队的六名操作经理给出的行动计划建议相比,通过该算法在经验数据集上计算角色的任务分配导致了更短的总处理时间和更平衡的角色工作量。
{"title":"Optimizing Task Allocation on Fire Fighting","authors":"Frank-Gerrit Poggenpohl, Dennis Güttinger","doi":"10.1109/iNCoS.2012.14","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.14","url":null,"abstract":"In this work we consider the problem of allocating tasks to fire brigade roles when facing major incidents like conflagrations or natural disasters. Due to missing experience with major incidents, a balanced workload of the different roles cannot be guaranteed, as task allocation is usually done manually by operations managers based on their empirical knowledge. Concerning this, we will introduce a new concept of role specific penalty functions that assign a stress level to every role depending on its working time. As the resulting problem is NP-complete, we will use an optimization strategy that combines a greedy approach with a modified version of the simulated annealing algorithm to approximatively solve this optimization problem. In our experimental study we will see that the assignment of tasks to roles computed by this algorithm on an empirical data set leads to a smaller total processing time and to a more balanced workload of roles compared to action plan recommendations given by six operations managers from the fire brigade.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125383566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Interference Alignment with Complex FDPM-Based Subspace Tracking in MIMO Cognitive Networks 基于复杂fdpm的MIMO认知网络子空间跟踪干扰对准
Bin Zhu, J. Ge, Xiaoye Shi, Yunxia Huang
This paper addresses the implementation of interference alignment (IA) in cognitive networks, where the unlicensed secondary transmitter-receiver pairs modeled as a K-user multiple-input and multiple-output (MIMO) interference channel coexist with the licensed multi-antenna primary user. Starting from investigating the constraint conditions of IA scheme in MIMO cognitive networks, a practical IA algorithm is developed based on the minor subspace tracking that utilizes the fast data projection method (FDPM), which requires no channel knowledge of secondary network. In the proposed algorithm, each secondary transmitter first aligns their transmitted signal into the null space of the channel matrix from itself to the primary user without causing any interference to the primary. Then secondary transmitters and receivers alternately design the precoding and post processing matrices through a training period which exploits the complex FDPM-based subspace tracking, thus eliminating interference among secondary users. Simulation results show that the proposed algorithm can achieve a high sum rate performance while requiring low computational complexity.
本文讨论了认知网络中干扰对准(IA)的实现,其中未授权的辅助发射器-接收器对建模为k用户多输入多输出(MIMO)干扰信道,与许可的多天线主用户共存。从研究MIMO认知网络中IA方案的约束条件出发,提出了一种实用的基于子空间跟踪的IA算法,该算法利用快速数据投影法(FDPM),不需要二次网络的信道知识。在提出的算法中,每个辅助发射机首先将其发射的信号对准从自身到主用户的信道矩阵的零空间,而不会对主用户造成任何干扰。然后,通过一段时间的训练,利用复杂的fdpm子空间跟踪技术,二次用户和接收机交替设计预编码和后处理矩阵,从而消除二次用户之间的干扰。仿真结果表明,该算法可以在较低的计算复杂度下获得较高的和速率性能。
{"title":"Interference Alignment with Complex FDPM-Based Subspace Tracking in MIMO Cognitive Networks","authors":"Bin Zhu, J. Ge, Xiaoye Shi, Yunxia Huang","doi":"10.1109/iNCoS.2012.35","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.35","url":null,"abstract":"This paper addresses the implementation of interference alignment (IA) in cognitive networks, where the unlicensed secondary transmitter-receiver pairs modeled as a K-user multiple-input and multiple-output (MIMO) interference channel coexist with the licensed multi-antenna primary user. Starting from investigating the constraint conditions of IA scheme in MIMO cognitive networks, a practical IA algorithm is developed based on the minor subspace tracking that utilizes the fast data projection method (FDPM), which requires no channel knowledge of secondary network. In the proposed algorithm, each secondary transmitter first aligns their transmitted signal into the null space of the channel matrix from itself to the primary user without causing any interference to the primary. Then secondary transmitters and receivers alternately design the precoding and post processing matrices through a training period which exploits the complex FDPM-based subspace tracking, thus eliminating interference among secondary users. Simulation results show that the proposed algorithm can achieve a high sum rate performance while requiring low computational complexity.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"707 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122988835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Non-interactive Secure Outsourced Computation Scheme in Multi-party Cloud 多方云中的非交互安全外包计算方案
Shu Guo, Haixia Xu
Cloud computing is becoming concerned both in academia and industry and one of the most important applications is outsourced computation. A computationally weak client out sources tasks to one or more workers in cloud, and this is called outsourced computation. This paper presents an outsourced protocol based on Kamara's scheme [19], and it allows the client to outsource their computation to more than one workers while keeping privacy and correctness. Kamara proposed security definitions, while regretfully, didn't show the description of the protocol. This paper presents a specific scheme in which the workers computes directly on shares that client send to them, so the workers don't have to interactive with each other. This protocol has these advantages: the protocol keeps privacy of the original input, the workers have no interactivity with each other during the execution, the protocol keeps the threshold unchanged.
云计算在学术界和工业界都受到关注,其中最重要的应用之一是外包计算。计算能力弱的客户端将任务外包给云中的一个或多个工作人员,这被称为外包计算。本文提出了一种基于Kamara的[19]方案的外包协议,该协议允许客户将其计算外包给多个工作人员,同时保持隐私和正确性。Kamara提出了安全定义,但遗憾的是,没有显示协议的描述。本文提出了一种特定的方案,在该方案中,工人直接对客户端发送给他们的共享进行计算,这样工人之间就不必相互交互。该协议具有以下优点:协议保持了原始输入的隐私性,工作者在执行过程中彼此之间没有交互,协议保持阈值不变。
{"title":"A Non-interactive Secure Outsourced Computation Scheme in Multi-party Cloud","authors":"Shu Guo, Haixia Xu","doi":"10.1109/iNCoS.2012.50","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.50","url":null,"abstract":"Cloud computing is becoming concerned both in academia and industry and one of the most important applications is outsourced computation. A computationally weak client out sources tasks to one or more workers in cloud, and this is called outsourced computation. This paper presents an outsourced protocol based on Kamara's scheme [19], and it allows the client to outsource their computation to more than one workers while keeping privacy and correctness. Kamara proposed security definitions, while regretfully, didn't show the description of the protocol. This paper presents a specific scheme in which the workers computes directly on shares that client send to them, so the workers don't have to interactive with each other. This protocol has these advantages: the protocol keeps privacy of the original input, the workers have no interactivity with each other during the execution, the protocol keeps the threshold unchanged.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129345094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Multi-agent Matchmaker Based on Hidden Markov Model for Decentralized Grid Scheduling 基于隐马尔可夫模型的分布式网格调度多智能体撮合算法
Holman Bolívar Barón, Mario Martínez Rojas, R. G. Crespo, Oscar Sanjuán Martínez
Design of scheduling algorithms for a heterogeneous computing system interconnected with an arbitrary communication network is one of the actual concerns in distributed systems research, due to the heterogeneous nature of resource, computing capacity, memory, devices, internet and institutional policies. Multi-agent systems have been a nice option of solution because of its distributed nature, autonomy, solidarity and proactivity. Though, in works related, is ignored the lack of control that the scheduler has the resources. We show the process of designing of a scheduler based on multi-agent systems. We used for the development, approach is proposed by Telecom Italia Lab, because the system was developed using the Java Agent Development Framework (JADE) because it meets all the standard of Intelligent Physical Agents Foundation. For the matchmaker process, we propose to use hidden Markov models because it facilitates the prediction of availability of the grid's resources and can evolve over time.
由于资源、计算能力、内存、设备、互联网和制度政策的异构性,与任意通信网络互连的异构计算系统的调度算法设计是分布式系统研究中实际关注的问题之一。多代理系统是一个很好的解决方案,因为它具有分布式、自主性、团结性和主动性。虽然,在相关工作中,忽略了调度程序对资源缺乏控制。给出了一个基于多智能体系统的调度程序的设计过程。我们采用了意大利电信实验室提出的开发方法,因为该系统是使用Java Agent开发框架(JADE)开发的,因为它符合智能物理代理基金会的所有标准。对于媒人过程,我们建议使用隐马尔可夫模型,因为它有助于预测网格资源的可用性,并且可以随着时间的推移而发展。
{"title":"A Multi-agent Matchmaker Based on Hidden Markov Model for Decentralized Grid Scheduling","authors":"Holman Bolívar Barón, Mario Martínez Rojas, R. G. Crespo, Oscar Sanjuán Martínez","doi":"10.1109/iNCoS.2012.102","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.102","url":null,"abstract":"Design of scheduling algorithms for a heterogeneous computing system interconnected with an arbitrary communication network is one of the actual concerns in distributed systems research, due to the heterogeneous nature of resource, computing capacity, memory, devices, internet and institutional policies. Multi-agent systems have been a nice option of solution because of its distributed nature, autonomy, solidarity and proactivity. Though, in works related, is ignored the lack of control that the scheduler has the resources. We show the process of designing of a scheduler based on multi-agent systems. We used for the development, approach is proposed by Telecom Italia Lab, because the system was developed using the Java Agent Development Framework (JADE) because it meets all the standard of Intelligent Physical Agents Foundation. For the matchmaker process, we propose to use hidden Markov models because it facilitates the prediction of availability of the grid's resources and can evolve over time.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130543645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation for Acquiring Method for Agents' Actions with Ant Colony Optimization in Robo Cup Rescue Simulation System 机器人杯救援仿真系统中agent动作获取方法的蚁群优化评价
Hisayuki Sasaoka
This paper has presented acquiring method for agents' actions using Ant Colony Optimization (ACO) in multi-agent system. ACO is one of powerful meta-heuristics algorithms and some researchers have reported the effectiveness of some applications with the algorithm [1-4]. I have developed fire brigade agents using proposed method in Robo Cup rescue simulation system. The final goal of this research is an achievement of co-operations for hetero-agent in multi-agent systems. Then this research for implementation for fire brigade agents in my team is the first step of this goal.
提出了一种基于蚁群算法的多智能体系统中智能体动作获取方法。蚁群算法是一种强大的元启发式算法,一些研究人员已经报道了该算法在一些应用中的有效性[1-4]。我在机器人杯救援模拟系统中使用所提出的方法开发了消防队特工。本研究的最终目标是实现多智能体系统中不同智能体之间的协作。而本次针对我所在团队的消防队员实施的研究就是实现这一目标的第一步。
{"title":"Evaluation for Acquiring Method for Agents' Actions with Ant Colony Optimization in Robo Cup Rescue Simulation System","authors":"Hisayuki Sasaoka","doi":"10.1109/iNCoS.2012.104","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.104","url":null,"abstract":"This paper has presented acquiring method for agents' actions using Ant Colony Optimization (ACO) in multi-agent system. ACO is one of powerful meta-heuristics algorithms and some researchers have reported the effectiveness of some applications with the algorithm [1-4]. I have developed fire brigade agents using proposed method in Robo Cup rescue simulation system. The final goal of this research is an achievement of co-operations for hetero-agent in multi-agent systems. Then this research for implementation for fire brigade agents in my team is the first step of this goal.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114614697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model 标准模型中无证书加密方案的密码分析
Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li
Certificateless public key cryptography (CL-PKC) is an important type of public key cryptography, which effectively solves the inherent key escrow problem in identity based public key cryptography while keeps its certificate-free property. As the adversarial models in CL-PKC are relatively complex, designing efficient and secure certificate less encryption schemes in the standard model has been an interesting and challenging research topic. In this paper, we give cryptanalysis to an existing certificate less encryption scheme in the standard model. We show its insecurity by demonstrating two kinds of attacks.
无证书公钥加密(CL-PKC)是一种重要的公钥加密方式,它在保持无证书特性的同时,有效地解决了基于身份的公钥加密固有的密钥托管问题。由于CL-PKC中的对抗模型相对复杂,在标准模型下设计高效、安全的无证书加密方案一直是一个有趣而富有挑战性的研究课题。本文在标准模型下对现有的无证书加密方案进行了密码分析。我们通过展示两种类型的攻击来展示它的不安全性。
{"title":"Cryptanalysis of a Certificateless Encryption Scheme in the Standard Model","authors":"Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li","doi":"10.1109/iNCoS.2012.68","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.68","url":null,"abstract":"Certificateless public key cryptography (CL-PKC) is an important type of public key cryptography, which effectively solves the inherent key escrow problem in identity based public key cryptography while keeps its certificate-free property. As the adversarial models in CL-PKC are relatively complex, designing efficient and secure certificate less encryption schemes in the standard model has been an interesting and challenging research topic. In this paper, we give cryptanalysis to an existing certificate less encryption scheme in the standard model. We show its insecurity by demonstrating two kinds of attacks.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Practical Metadata Model for Access Control Modules 访问控制模块的实用元数据模型
Alexandru Petculescu
The Semantic Web, or the Web of meaning, is the second stage of the Web. Its objective is to make a better cooperation between computers and people. Encoding data in forms that make web contents (semantics, meaning) understandable by computer means is a real problem in pervasive environments. In this article I present a metadata design used in implementation of the Mobile services framework presented in our previous paper: "Web services applied to mobile environments". After examining existing solutions for representing metadata, we present a model that best suits mobile environments in terms of adaptability to context modeling and extensibility.
语义网或意义网是网络的第二阶段。它的目标是使计算机和人之间更好地合作。对数据进行编码,使网络内容(语义、意义)能够被计算机理解,这在普及环境中是一个真正的问题。在本文中,我介绍了一种元数据设计,用于实现我们在上一篇论文“应用于移动环境的Web服务”中提出的移动服务框架。在研究了表示元数据的现有解决方案之后,我们提出了一个在上下文建模和可扩展性方面最适合移动环境的模型。
{"title":"A Practical Metadata Model for Access Control Modules","authors":"Alexandru Petculescu","doi":"10.1109/iNCoS.2012.59","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.59","url":null,"abstract":"The Semantic Web, or the Web of meaning, is the second stage of the Web. Its objective is to make a better cooperation between computers and people. Encoding data in forms that make web contents (semantics, meaning) understandable by computer means is a real problem in pervasive environments. In this article I present a metadata design used in implementation of the Mobile services framework presented in our previous paper: \"Web services applied to mobile environments\". After examining existing solutions for representing metadata, we present a model that best suits mobile environments in terms of adaptability to context modeling and extensibility.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Capital in Virtual Organizations 虚拟组织中的社会资本
Saad Alqithami, H. Hexmoor
In this fast growing world, rapid alterations in technologies result in having a huge influence on humans' standard of living, increase global opportunities and globalize shareholders' activities. Executives all over the world are expected to utilize the right technology in order to gain the high level of success for their organizations. These executives require sustainable knowledge, techniques and tools that will allow them to continue to advance and remain ahead of the competition in the business environment. In this paper, we consider the techniques that will give a clear analysis of how social capital can be created within virtual teams or organizations and what value is created with the help of social capital. It will help organizations to examine the type of value they already created with social capital and its reflection in the future.
在这个快速发展的世界里,技术的快速变化对人类的生活水平产生了巨大的影响,增加了全球机会,并使股东的活动全球化。全世界的管理人员都希望利用正确的技术来为他们的组织获得高水平的成功。这些高管需要可持续的知识、技术和工具,使他们能够继续前进,并在商业环境的竞争中保持领先地位。在本文中,我们考虑的技术将给出一个清晰的分析,如何社会资本可以在虚拟团队或组织中创造,并在社会资本的帮助下创造什么价值。它将帮助组织检查他们已经用社会资本创造的价值类型及其在未来的反映。
{"title":"Social Capital in Virtual Organizations","authors":"Saad Alqithami, H. Hexmoor","doi":"10.1109/iNCoS.2012.124","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.124","url":null,"abstract":"In this fast growing world, rapid alterations in technologies result in having a huge influence on humans' standard of living, increase global opportunities and globalize shareholders' activities. Executives all over the world are expected to utilize the right technology in order to gain the high level of success for their organizations. These executives require sustainable knowledge, techniques and tools that will allow them to continue to advance and remain ahead of the competition in the business environment. In this paper, we consider the techniques that will give a clear analysis of how social capital can be created within virtual teams or organizations and what value is created with the help of social capital. It will help organizations to examine the type of value they already created with social capital and its reflection in the future.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126914455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1