首页 > 最新文献

2008 International Symposium on Information Theory and Its Applications最新文献

英文 中文
The optimum approximation of signals having quite small side-lobes 副瓣很小的信号的最佳近似
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895626
Y. Kida, T. Kida
We consider set of signals with a main-lobe and a pair of small side-lobes. Weighted square-integral of the main-lobe is assumed to be bounded. Moreover, in order to define divergence of side-lobes of error in the sense of worst-case amplitude in attenuation band, we introduce a measure like Kullback-Leibler divergence and this measure is assumed to be bounded. We prove that the presented approximation minimizes various measures of error of running approximation at the same time.
我们考虑一组具有一个主瓣和一对小副瓣的信号。假设主瓣的加权平方积分是有界的。此外,为了在衰减带的最坏振幅意义上定义误差旁瓣的散度,我们引入了Kullback-Leibler散度,并假定该散度是有界的。我们证明了所提出的近似能同时使运行近似的各种误差最小化。
{"title":"The optimum approximation of signals having quite small side-lobes","authors":"Y. Kida, T. Kida","doi":"10.1109/ISITA.2008.4895626","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895626","url":null,"abstract":"We consider set of signals with a main-lobe and a pair of small side-lobes. Weighted square-integral of the main-lobe is assumed to be bounded. Moreover, in order to define divergence of side-lobes of error in the sense of worst-case amplitude in attenuation band, we introduce a measure like Kullback-Leibler divergence and this measure is assumed to be bounded. We prove that the presented approximation minimizes various measures of error of running approximation at the same time.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131075511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bursty narrowband relay networks in the low-SNR regime 低信噪比条件下的突发窄带中继网络
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895549
Tony Q. S. Quek, Hyundong Shin
In a wireless network, the use of cooperation among nodes can significantly improve capacity and robustness to fading. Node cooperation can take many forms, including relaying and coordinated beamforming. However, many cooperation techniques have been developed for operation in narrowband systems for high signal-to-noise ratio (SNR) applications. It is important to study how relay networks perform in a low-SNR regime, where the available degrees of freedom is large and the resulting SNR per degree of freedom is small. In this paper, we investigate the achievable rates and scaling laws of bursty amplify-and-forward relay networks in the low-SNR regime. Specifically, our results allow us to understand the effect of different system parameters on the achievable rates and scaling laws in the low-SNR regime, and highlight the role of bursty transmissions in this regime. These results entirely depend on the geographic locations of the nodes and are applicable for both fixed and random networks. We identify four scaling regimes that depend on the growth of the number of relay nodes and the increase of burstiness relative to the SNR.
在无线网络中,利用节点间的协作可以显著提高网络容量和抗衰落的鲁棒性。节点合作可以采取多种形式,包括中继和协调波束形成。然而,针对高信噪比(SNR)应用的窄带系统,已经开发了许多合作技术。研究中继网络在低信噪比条件下的性能是很重要的,在这种情况下,可用的自由度很大,而每个自由度的信噪比很小。本文研究了低信噪比条件下突发放大转发中继网络的可实现速率和标度规律。具体来说,我们的研究结果使我们能够理解不同系统参数对低信噪比下可实现速率和标度规律的影响,并突出了突发传输在该状态下的作用。这些结果完全取决于节点的地理位置,适用于固定和随机网络。我们确定了四种缩放机制,它们依赖于中继节点数量的增长和相对于信噪比的突发性的增加。
{"title":"Bursty narrowband relay networks in the low-SNR regime","authors":"Tony Q. S. Quek, Hyundong Shin","doi":"10.1109/ISITA.2008.4895549","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895549","url":null,"abstract":"In a wireless network, the use of cooperation among nodes can significantly improve capacity and robustness to fading. Node cooperation can take many forms, including relaying and coordinated beamforming. However, many cooperation techniques have been developed for operation in narrowband systems for high signal-to-noise ratio (SNR) applications. It is important to study how relay networks perform in a low-SNR regime, where the available degrees of freedom is large and the resulting SNR per degree of freedom is small. In this paper, we investigate the achievable rates and scaling laws of bursty amplify-and-forward relay networks in the low-SNR regime. Specifically, our results allow us to understand the effect of different system parameters on the achievable rates and scaling laws in the low-SNR regime, and highlight the role of bursty transmissions in this regime. These results entirely depend on the geographic locations of the nodes and are applicable for both fixed and random networks. We identify four scaling regimes that depend on the growth of the number of relay nodes and the increase of burstiness relative to the SNR.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study on occurrence rates per bit for the logistic map over integers 整数逻辑映射每比特出现率的研究
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895616
Shunsuke Araki, Takeru Miyazaki, S. Uehara
We are investigating the logistic map over integers with finite precisions and sequences out-putted by the iterative mapping. In our proposed simple pseudo-random number generator with the logistic map over integers, we implicitly assumed that 0 and 1 occurrence frequencies per bit of outputs by the map are nearly equal. By some numerical experiments, we got the conjecture that occurrence rates per bit are nearly equal for many bits of 2n-bit values in the intermediate step of the map by one iteration and many iterations.
我们研究了有限精度整数和由迭代映射输出的序列的逻辑映射。在我们提出的具有整数逻辑映射的简单伪随机数生成器中,我们隐式地假设映射输出的每比特0和1的出现频率几乎相等。通过一些数值实验,通过一次迭代和多次迭代,我们得到了在映射的中间步骤中,2n位值的许多位每比特的出现率几乎相等的猜想。
{"title":"A study on occurrence rates per bit for the logistic map over integers","authors":"Shunsuke Araki, Takeru Miyazaki, S. Uehara","doi":"10.1109/ISITA.2008.4895616","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895616","url":null,"abstract":"We are investigating the logistic map over integers with finite precisions and sequences out-putted by the iterative mapping. In our proposed simple pseudo-random number generator with the logistic map over integers, we implicitly assumed that 0 and 1 occurrence frequencies per bit of outputs by the map are nearly equal. By some numerical experiments, we got the conjecture that occurrence rates per bit are nearly equal for many bits of 2n-bit values in the intermediate step of the map by one iteration and many iterations.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130275924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Suppression of partial-band-noise jamming for FFH/MFSK systems over frequency-selective Rician-fading channels 频率选择性衰落信道上FFH/MFSK系统部分带噪声干扰的抑制
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895503
Jiliang Zhang, K. C. Teh, K. H. Li
The effects of partial-band-noise jamming and additive white Gaussian noise on the bit-error rate (BER) performance of fast frequency-hopped M-ary frequency-shift-keying (FFH/MFSK) systems over frequency-selective Rician-fading channels are studied. The FFH/MFSK systems employing the linear-combining receiver and the product-combining receiver are investigated. The analytical BER expressions are derived based on characteristic function approach, which is applicable for higher diversity levels. The analytical expressions, validated by simulation results, show that the product-combining receiver is superior to the linear-combining receiver when the jamming power is relatively strong.
研究了部分带噪声干扰和加性高斯白噪声对频率选择性衰落信道上快速跳频移频键控(FFH/MFSK)系统误码率的影响。研究了采用线性组合接收机和乘积组合接收机的FFH/MFSK系统。分析的误码率表达式基于特征函数法,适用于更高的多样性水平。仿真结果验证了解析表达式的正确性,表明当干扰功率较强时,乘积组合接收机优于线性组合接收机。
{"title":"Suppression of partial-band-noise jamming for FFH/MFSK systems over frequency-selective Rician-fading channels","authors":"Jiliang Zhang, K. C. Teh, K. H. Li","doi":"10.1109/ISITA.2008.4895503","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895503","url":null,"abstract":"The effects of partial-band-noise jamming and additive white Gaussian noise on the bit-error rate (BER) performance of fast frequency-hopped M-ary frequency-shift-keying (FFH/MFSK) systems over frequency-selective Rician-fading channels are studied. The FFH/MFSK systems employing the linear-combining receiver and the product-combining receiver are investigated. The analytical BER expressions are derived based on characteristic function approach, which is applicable for higher diversity levels. The analytical expressions, validated by simulation results, show that the product-combining receiver is superior to the linear-combining receiver when the jamming power is relatively strong.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of ranging error on Base Station Cooperation OFDM system 测距误差对基站合作OFDM系统的影响
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895401
M. Kim, O. Miyagi, I. Garcia, K. Sakaguchi, K. Araki
Base Station Cooperation Transmission of OFDM symbols (BSC-OFDM) is a promising approach to increase cell-edge capacity. The effect of Ranging Error on BSC-OFDM is investigated in this paper. Timing offset greater than 1 OFDM symbol in analytically duration creates asynchronous interference. Results show that a single ranging code transmitted by a mobile station provides greater capacity over a scheme with a separate orthogonal ranging code for each base station.
基站合作传输OFDM符号(BSC-OFDM)是一种很有前途的提高蜂窝边缘容量的方法。研究了测距误差对BSC-OFDM的影响。在分析持续时间内,大于1个OFDM符号的时序偏移会产生异步干扰。结果表明,与每个基站使用单独的正交距离码方案相比,由移动站传输的单一距离码方案提供了更大的容量。
{"title":"Effect of ranging error on Base Station Cooperation OFDM system","authors":"M. Kim, O. Miyagi, I. Garcia, K. Sakaguchi, K. Araki","doi":"10.1109/ISITA.2008.4895401","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895401","url":null,"abstract":"Base Station Cooperation Transmission of OFDM symbols (BSC-OFDM) is a promising approach to increase cell-edge capacity. The effect of Ranging Error on BSC-OFDM is investigated in this paper. Timing offset greater than 1 OFDM symbol in analytically duration creates asynchronous interference. Results show that a single ranging code transmitted by a mobile station provides greater capacity over a scheme with a separate orthogonal ranging code for each base station.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125607006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beamforming design for the MIMO downlink for maximizing Weighted Sum-Rate 最大化加权和速率的MIMO下行波束成形设计
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895555
R. Agarwal, J. Cioffi
This work studies linear transmit filter design for weighted sum-rate (WSR) maximization in the multiple input multiple output broadcast channel (MIMO-BC). The problem of finding the optimal transmit filter is non-convex and intractable to solve. Motivated by the iterative algorithm that solves for the optimal transmit and receive filters for minimizing sum-mean square error (MSE), this paper suggests to use weighted minimum mean square error (WMMSE) optimization in the MIMO-BC. The paper presents an iterative algorithm to maximize WSR. Numerical results for sum-rate using the derived filter are provided under different system settings.
本文研究了多输入多输出广播信道(MIMO-BC)中加权和速率(WSR)最大化的线性传输滤波器设计。寻找最优传输滤波器的问题是非凸的,难以解决。基于求解最大均方误差(sum-mean square error, MSE)的最优收发滤波器的迭代算法,本文建议在MIMO-BC中采用加权最小均方误差(weighted minimum mean square error, WMMSE)优化。本文提出了一种最大化WSR的迭代算法。在不同的系统设置下,给出了使用该滤波器计算和速率的数值结果。
{"title":"Beamforming design for the MIMO downlink for maximizing Weighted Sum-Rate","authors":"R. Agarwal, J. Cioffi","doi":"10.1109/ISITA.2008.4895555","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895555","url":null,"abstract":"This work studies linear transmit filter design for weighted sum-rate (WSR) maximization in the multiple input multiple output broadcast channel (MIMO-BC). The problem of finding the optimal transmit filter is non-convex and intractable to solve. Motivated by the iterative algorithm that solves for the optimal transmit and receive filters for minimizing sum-mean square error (MSE), this paper suggests to use weighted minimum mean square error (WMMSE) optimization in the MIMO-BC. The paper presents an iterative algorithm to maximize WSR. Numerical results for sum-rate using the derived filter are provided under different system settings.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125974282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Lossy source coding algorithm using lossless multi-terminal source codes 有损源编码算法采用无损多终端源代码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895482
J. Muramatsu, S. Miyake
A lossy source coding algorithm is presented that employs lossless multi-terminal source codes. By using nearly optimal lossless multi-terminal source codes, the proposed algorithm achieves the rate-distortion limit. The construction of lossless multi-terminal source codes, which are needed for the lossy source coding algorithm, can be realized by using sparse matrices, known as Low Density Parity Check (LDPC) matrices, or Turbo codes, and practically efficient decoding algorithms such as the Belief Propagation (BP) algorithm and the Linear Codes Linear Program (LCLP) algorithm.
提出了一种采用无损多终端源代码的有损源编码算法。该算法通过使用近乎最优的无损多终端源代码,实现了对码率失真的限制。有损源编码算法所需要的无损多终端源代码的构造可以通过使用稀疏矩阵(称为低密度奇偶校验(LDPC)矩阵)或Turbo码,以及诸如信念传播(BP)算法和线性码线性程序(LCLP)算法等实用高效的译码算法来实现。
{"title":"Lossy source coding algorithm using lossless multi-terminal source codes","authors":"J. Muramatsu, S. Miyake","doi":"10.1109/ISITA.2008.4895482","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895482","url":null,"abstract":"A lossy source coding algorithm is presented that employs lossless multi-terminal source codes. By using nearly optimal lossless multi-terminal source codes, the proposed algorithm achieves the rate-distortion limit. The construction of lossless multi-terminal source codes, which are needed for the lossy source coding algorithm, can be realized by using sparse matrices, known as Low Density Parity Check (LDPC) matrices, or Turbo codes, and practically efficient decoding algorithms such as the Belief Propagation (BP) algorithm and the Linear Codes Linear Program (LCLP) algorithm.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On security enhancement of long-term private key for the tripartite authenticated key agreement protocol 三方认证密钥协议中长期私钥的安全性增强
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895437
M. Nomura, K. Nakamura
In this paper, we propose a scheme that enhances the security of long-term private key lID used in the tripartite authenticated key agreement protocol. In this scheme, we use (H(lIDPmacr)lID)P (H: hash function) instead of lIDP (P: a rational point of the defined elliptic curve over Fp) as a static public key and tauID1, tauID2 as two ephemeral private keys. From this, even though the bit length of p (p's security parameter) is more lessened, we can preserve equal security to conventional schemes in respect of the secrecy of the long-term private key.
本文提出了一种提高三方认证密钥协议中使用的长期私钥id安全性的方案。在这个方案中,我们使用(H(lIDPmacr)lID)P (H:哈希函数)代替lipp (P:定义的椭圆曲线在Fp上的一个有理点)作为静态公钥,tauID1, tauID2作为两个临时私钥。由此,即使p的位长(p的安全参数)更小,我们也可以在长期私钥的保密性方面保持与传统方案相同的安全性。
{"title":"On security enhancement of long-term private key for the tripartite authenticated key agreement protocol","authors":"M. Nomura, K. Nakamura","doi":"10.1109/ISITA.2008.4895437","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895437","url":null,"abstract":"In this paper, we propose a scheme that enhances the security of long-term private key l<sub>ID</sub> used in the tripartite authenticated key agreement protocol. In this scheme, we use (H(l<sub>ID</sub>Pmacr)l<sub>ID</sub>)P (H: hash function) instead of l<sub>ID</sub>P (P: a rational point of the defined elliptic curve over F<sub>p</sub>) as a static public key and tau<sub>ID1</sub>, tau<sub>ID2</sub> as two ephemeral private keys. From this, even though the bit length of p (p's security parameter) is more lessened, we can preserve equal security to conventional schemes in respect of the secrecy of the long-term private key.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114487168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rate adaptive modulation with MIMO mode switching between spatial multiplexing and diversity 在空间复用和分集之间进行MIMO模式切换的速率自适应调制
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895551
Chanhong Kim, Jungwoo Lee
Multiple-input multiple-output (MIMO) systems give high data rates through spatial multiplexing or diversity using space-time codes. We propose a rate-adaptive modulation scheme combined with mode switching between spatial multiplexing and orthogonal space-time block coding. We first find out which modulation level and mode maximize the spectral efficiency with a given target bit error ratio (BER). If the rates of the two MIMO modes are the same, we select one mode which gives lower BER than the other. We also propose a simple mode switching algorithm using effective SNR and constellation specific constant. Numerical results demonstrate improvement over each fixed mode with adaptive modulation in terms of average spectral efficiency.
多输入多输出(MIMO)系统通过使用空时码的空间多路复用或分集提供高数据速率。提出了一种结合空间复用和正交空时分组编码模式切换的速率自适应调制方案。我们首先找出在给定目标误码率(BER)的情况下,哪种调制电平和模式能使频谱效率最大化。如果两种MIMO模式的速率相同,我们选择其中一种模式的误码率比另一种低。我们还提出了一种利用有效信噪比和星座特定常数的简单模式切换算法。数值结果表明,在平均频谱效率方面,自适应调制比每个固定模式都有改善。
{"title":"Rate adaptive modulation with MIMO mode switching between spatial multiplexing and diversity","authors":"Chanhong Kim, Jungwoo Lee","doi":"10.1109/ISITA.2008.4895551","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895551","url":null,"abstract":"Multiple-input multiple-output (MIMO) systems give high data rates through spatial multiplexing or diversity using space-time codes. We propose a rate-adaptive modulation scheme combined with mode switching between spatial multiplexing and orthogonal space-time block coding. We first find out which modulation level and mode maximize the spectral efficiency with a given target bit error ratio (BER). If the rates of the two MIMO modes are the same, we select one mode which gives lower BER than the other. We also propose a simple mode switching algorithm using effective SNR and constellation specific constant. Numerical results demonstrate improvement over each fixed mode with adaptive modulation in terms of average spectral efficiency.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121037700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deniable ring authenticated private key establishment 可否认环认证私钥建立
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895467
E.T. Taniguchi, H. Yamamoto
In this paper, we extend the work by M. Naor [7] on deniable ring authentication to include key establishment. Two secure deniable private key establishment protocols will be proposed. These two related schemes create only a secure private channel between Alice and Bob where the identity of Bob remains completely hidden. The first scheme does not require Alice to been within the user set S and in fact does not even require Alice to have a public-private key pair. The second scheme requires that Alice choose a user set S such that she is also within set S. This scheme also indirectly requires that Alice have a public-private key pair. Similar to the deniable ring authentication protocol by Naor, the protocols proposed here only assumes the existence of strong public key encryption schemes where all members have already established public and private keys. Finally, the problem of ciphertext search and ciphertext ambiguity will also be examined and a solution will be proposed.
在本文中,我们扩展了M. Naor[7]在可否认环认证方面的工作,使其包含密钥建立。提出了两种安全的可否认私钥建立协议。这两个相关的方案只在Alice和Bob之间创建一个安全的私有通道,其中Bob的身份完全隐藏。第一种方案不要求Alice在用户集S内,实际上甚至不要求Alice拥有公私钥对。第二种方案要求Alice选择一个用户集S,这样她也在集合S内。该方案还间接要求Alice拥有一个公私钥对。与Naor提出的可否认环认证协议类似,本文提出的协议仅假设存在强公钥加密方案,其中所有成员都已经建立了公钥和私钥。最后,对密文搜索和密文歧义问题进行了研究,并提出了解决方案。
{"title":"Deniable ring authenticated private key establishment","authors":"E.T. Taniguchi, H. Yamamoto","doi":"10.1109/ISITA.2008.4895467","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895467","url":null,"abstract":"In this paper, we extend the work by M. Naor [7] on deniable ring authentication to include key establishment. Two secure deniable private key establishment protocols will be proposed. These two related schemes create only a secure private channel between Alice and Bob where the identity of Bob remains completely hidden. The first scheme does not require Alice to been within the user set S and in fact does not even require Alice to have a public-private key pair. The second scheme requires that Alice choose a user set S such that she is also within set S. This scheme also indirectly requires that Alice have a public-private key pair. Similar to the deniable ring authentication protocol by Naor, the protocols proposed here only assumes the existence of strong public key encryption schemes where all members have already established public and private keys. Finally, the problem of ciphertext search and ciphertext ambiguity will also be examined and a solution will be proposed.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"EM-28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 International Symposium on Information Theory and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1