Pub Date : 2021-01-01DOI: 10.23977/jeis.2021.060211
Jingyuan Li
Aiming at the problem of long signature generation and verification time caused by low operation efficiency in ring signature algorithm based on composite order group, an asymmetric identity based ring signature scheme based on prime order group is proposed. The model definition and specific identity based ring signature scheme design of the proposed scheme are described, and the correctness and security of the proposed scheme are analyzed. Finally, the efficiency of the core operation part of the algorithm is explained. Compared with the correlation signature algorithm based on composite order group, the optimization has a great improvement in operation overhead and performance, and the designed scheme is unforgeable. The designed signature scheme meets the unconditional anonymity and unforgeability of ring signature.
{"title":"Efficient identity based ring signature scheme in prime order group","authors":"Jingyuan Li","doi":"10.23977/jeis.2021.060211","DOIUrl":"https://doi.org/10.23977/jeis.2021.060211","url":null,"abstract":"Aiming at the problem of long signature generation and verification time caused by low operation efficiency in ring signature algorithm based on composite order group, an asymmetric identity based ring signature scheme based on prime order group is proposed. The model definition and specific identity based ring signature scheme design of the proposed scheme are described, and the correctness and security of the proposed scheme are analyzed. Finally, the efficiency of the core operation part of the algorithm is explained. Compared with the correlation signature algorithm based on composite order group, the optimization has a great improvement in operation overhead and performance, and the designed scheme is unforgeable. The designed signature scheme meets the unconditional anonymity and unforgeability of ring signature.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-25DOI: 10.23977/JEIS.2019.41001
Xu Zhu
To reflect the application value of data development, based on the data of multiple data sources, the water conservancy and the big data service were studied. First, the acquisition of public data was studied. Computers were used to quickly and efficiently collect data into libraries, which greatly reduce the difficulty of data acquisition. Then, the method of data cleaning was determined to improve data quality and enhance the effectiveness and reliability of the data in the application process. Finally, the water conservancy prediction model was applied to the flood prevention decision-making service system based on the integrated platform. The results showed that the acquisition of public data greatly improved the efficiency of data acquisition. By cleaning the obtained data of repeated values, error values, outliers and missing values, higher quality water situation data was obtained. The water conservancy prediction model improved the accuracy of the prediction, and the flood control decision service system provided an efficient and operational integrated platform. Therefore, the water conservancy prediction model has a certain guiding role in flood control decision-making. It is the key to big data services for water conservancy.
{"title":"Water Conservancy Data Acquisition and Big Data Service Based on Multi-data Sources","authors":"Xu Zhu","doi":"10.23977/JEIS.2019.41001","DOIUrl":"https://doi.org/10.23977/JEIS.2019.41001","url":null,"abstract":"To reflect the application value of data development, based on the data of multiple data sources, the water conservancy and the big data service were studied. First, the acquisition of public data was studied. Computers were used to quickly and efficiently collect data into libraries, which greatly reduce the difficulty of data acquisition. Then, the method of data cleaning was determined to improve data quality and enhance the effectiveness and reliability of the data in the application process. Finally, the water conservancy prediction model was applied to the flood prevention decision-making service system based on the integrated platform. The results showed that the acquisition of public data greatly improved the efficiency of data acquisition. By cleaning the obtained data of repeated values, error values, outliers and missing values, higher quality water situation data was obtained. The water conservancy prediction model improved the accuracy of the prediction, and the flood control decision service system provided an efficient and operational integrated platform. Therefore, the water conservancy prediction model has a certain guiding role in flood control decision-making. It is the key to big data services for water conservancy.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43946801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.23977/jeis.2023.080204
Shuai Yang, Xianfang Wang
: This paper mainly studies computer network security and firewall technology, discussing the functions, main technologies, configurations, security measures, and firewall design ideas of network firewall security technology. With the popularization of computer networks, network security issues are receiving increasing attention from people. We can propose corresponding measures to address the shortcomings and vulnerabilities in current network security and firewall settings, in order to expect our network to be more secure. In terms of ensuring network security and data security, there are data encryption technology, smart card technology, firewall technology, etc. We mainly study firewall technology here. Firewalls can be divided into various types based on their different methods, precautions, and priorities. Afterwards, two basic implementation technologies, firewall packet filtering and application proxy, were introduced. Firewall technology is still in the development stage, and there are still many problems that need to be solved.
{"title":"Analysis of Computer Network Security and Prevention Technology","authors":"Shuai Yang, Xianfang Wang","doi":"10.23977/jeis.2023.080204","DOIUrl":"https://doi.org/10.23977/jeis.2023.080204","url":null,"abstract":": This paper mainly studies computer network security and firewall technology, discussing the functions, main technologies, configurations, security measures, and firewall design ideas of network firewall security technology. With the popularization of computer networks, network security issues are receiving increasing attention from people. We can propose corresponding measures to address the shortcomings and vulnerabilities in current network security and firewall settings, in order to expect our network to be more secure. In terms of ensuring network security and data security, there are data encryption technology, smart card technology, firewall technology, etc. We mainly study firewall technology here. Firewalls can be divided into various types based on their different methods, precautions, and priorities. Afterwards, two basic implementation technologies, firewall packet filtering and application proxy, were introduced. Firewall technology is still in the development stage, and there are still many problems that need to be solved.","PeriodicalId":32534,"journal":{"name":"Journal of Electronics and Information Science","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68787634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}