首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation FDR-ABE:灵活直接撤销的基于属性的加密
Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li
In attribute-based encryption (ABE) systems, the revocation issue is essential and difficult, since users may change their attributes frequently in practice and each attribute is conceivably shared by multiple users. To our knowledge, all the existing ABE schemes fail to support flexible and direct revocation due to the burdensome update of attribute secret keys and cipher texts. Aiming at tackling the challenge above, in this paper, we formalize the notion of cipher text policy ABE with flexible and direct revocation (FDR-CP-ABE), and give out a concrete construction, which supports direct attribute and user revocation and is applicable to the data sharing architecture. The proposed FDR-CP-ABE scheme outperforms the previous revocation-related methods in that it has constant-size cipher texts and only partial cipher texts need to be updated whenever revocation events occur. Furthermore, we show that our FDR-CP-ABE scheme is provably secure in the standard model and it cannot be achieved by trivial combinations of the techniques of CP-ABE and BE.
在基于属性的加密(ABE)系统中,撤销问题是关键和困难的,因为用户在实践中可能经常更改其属性,并且每个属性可能由多个用户共享。据我们所知,由于属性密钥和密文的更新繁琐,现有的所有ABE方案都不支持灵活和直接的撤销。针对上述挑战,本文形式化了灵活直接撤销的密文策略ABE (FDR-CP-ABE)的概念,并给出了一个支持直接属性和用户撤销的具体结构,适用于数据共享体系结构。提出的FDR-CP-ABE方案优于以往的与撤销相关的方法,因为它具有恒定大小的密文,并且每当发生撤销事件时只需更新部分密文。此外,我们证明了我们的FDR-CP-ABE方案在标准模型中是可证明的安全的,并且不能通过CP-ABE和be技术的简单组合来实现。
{"title":"FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation","authors":"Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li","doi":"10.1109/INCoS.2013.16","DOIUrl":"https://doi.org/10.1109/INCoS.2013.16","url":null,"abstract":"In attribute-based encryption (ABE) systems, the revocation issue is essential and difficult, since users may change their attributes frequently in practice and each attribute is conceivably shared by multiple users. To our knowledge, all the existing ABE schemes fail to support flexible and direct revocation due to the burdensome update of attribute secret keys and cipher texts. Aiming at tackling the challenge above, in this paper, we formalize the notion of cipher text policy ABE with flexible and direct revocation (FDR-CP-ABE), and give out a concrete construction, which supports direct attribute and user revocation and is applicable to the data sharing architecture. The proposed FDR-CP-ABE scheme outperforms the previous revocation-related methods in that it has constant-size cipher texts and only partial cipher texts need to be updated whenever revocation events occur. Furthermore, we show that our FDR-CP-ABE scheme is provably secure in the standard model and it cannot be achieved by trivial combinations of the techniques of CP-ABE and BE.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124845729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Research on Cloud Computing Based Data Processing for Financial Terminal Equipment 基于云计算的金融终端设备数据处理研究
Zhou Zhi-zhao
In financial system, distributed terminal equipments generate huge mass of data that containing much valuable information. The integrated analysis of the distributed data combining with traditional information will reveal the potential business value and provide a brand new view. Based on the infrastructure of cloud computing service platform, propose a practical scheme of financial data processing which composing of data acquisition, processing, storage and analysis. Present the key technologies of data loading, migration, MapReduce processing, remote analysis and flashback, and describe the execution of these technologies within cloud computing framework.
在金融系统中,分布式终端设备产生了大量的数据,这些数据中包含了很多有价值的信息。将分布式数据与传统信息相结合进行综合分析,将揭示潜在的商业价值,提供全新的视角。基于云计算服务平台的基础设施,提出了一种由数据采集、处理、存储和分析组成的实用的金融数据处理方案。介绍了数据加载、迁移、MapReduce处理、远程分析和倒叙等关键技术,并描述了这些技术在云计算框架下的实现。
{"title":"Research on Cloud Computing Based Data Processing for Financial Terminal Equipment","authors":"Zhou Zhi-zhao","doi":"10.1109/INCOS.2013.110","DOIUrl":"https://doi.org/10.1109/INCOS.2013.110","url":null,"abstract":"In financial system, distributed terminal equipments generate huge mass of data that containing much valuable information. The integrated analysis of the distributed data combining with traditional information will reveal the potential business value and provide a brand new view. Based on the infrastructure of cloud computing service platform, propose a practical scheme of financial data processing which composing of data acquisition, processing, storage and analysis. Present the key technologies of data loading, migration, MapReduce processing, remote analysis and flashback, and describe the execution of these technologies within cloud computing framework.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures 具有非单调访问结构的完全安全的基于属性的加密
Xiaoyuan Yang, Weidong Du, Xu An Wang, Liqiang Wang
Along with the development of the Internet, the traditional public key encryption system becomes insufficient for many newly emerging applications, such as the cloud services. Then the ABE is proposed to meet the urgent demands. The study on attribute-based encryption mainly concern on two issues: how to improve its expressibility and achieve stronger security. This paper has proposed a attribute-based encryption scheme that has good property in both two points: our scheme allows a user's private key to be expressed in non-monotonic access structures, and we prove its fully security in the standard model. Furthermore, the performance of our scheme is as efficient as the less expressive and selective security ones.
随着互联网的发展,传统的公钥加密系统已经无法满足云服务等新兴应用的需求。然后提出了ABE,以满足迫切的需求。基于属性的加密的研究主要关注两个问题:如何提高属性加密的可表达性和实现更强的安全性。本文提出了一种基于属性的加密方案,该方案在两个方面都具有良好的性质:允许用户的私钥在非单调访问结构中表示,并在标准模型中证明了其完全安全性。此外,该方案的性能与表达性较差和选择性较差的安全方案一样高效。
{"title":"Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures","authors":"Xiaoyuan Yang, Weidong Du, Xu An Wang, Liqiang Wang","doi":"10.1109/INCoS.2013.98","DOIUrl":"https://doi.org/10.1109/INCoS.2013.98","url":null,"abstract":"Along with the development of the Internet, the traditional public key encryption system becomes insufficient for many newly emerging applications, such as the cloud services. Then the ABE is proposed to meet the urgent demands. The study on attribute-based encryption mainly concern on two issues: how to improve its expressibility and achieve stronger security. This paper has proposed a attribute-based encryption scheme that has good property in both two points: our scheme allows a user's private key to be expressed in non-monotonic access structures, and we prove its fully security in the standard model. Furthermore, the performance of our scheme is as efficient as the less expressive and selective security ones.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123412198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Collective Knowledge System for Business Partner Co-operation 商业伙伴合作的集体知识系统
M. Gaeta, F. Orciuoli, Pierluigi Ritrovato, Giuseppe D’aniello, A. D. Vivo
In recent years, merchants have increased their interest in marketing strategies based on loyalty programs. Coalition loyalty is one of the most profitable among the aforementioned strategies. This work proposes a co-operation model based on the principles of Collective Knowledge Systems and on Semantic Technologies to support the generation and management of dynamic coalitions of merchants. The main benefit of the proposed model is represented by the possibility, for merchants, to match their needs and define coalition programs (based on conditional coupon) without the involvement of mediators. Moreover, the model provides the capability of defining collaboratively and formally the aforementioned coupons that can be handled by means of technologies for payment and value added services. The proposed model is defined in the context of the TITAN Project aiming at defining an integrated service-oriented Software Platform enabling innovative business scenarios for e-money, e-payments and value added services.
近年来,商家对基于忠诚度计划的营销策略越来越感兴趣。联盟忠诚是上述策略中最有利可图的策略之一。这项工作提出了一种基于集体知识系统原则和语义技术的合作模型,以支持动态商人联盟的生成和管理。所提出的模式的主要好处体现在,对于商家来说,在没有中间人参与的情况下,满足他们的需求并定义联盟计划(基于有条件的优惠券)的可能性。此外,该模型还提供了协作和正式定义上述优惠券的能力,这些优惠券可以通过支付和增值服务技术来处理。提出的模型是在TITAN项目的背景下定义的,该项目旨在定义一个集成的面向服务的软件平台,为电子货币、电子支付和增值服务提供创新的业务场景。
{"title":"A Collective Knowledge System for Business Partner Co-operation","authors":"M. Gaeta, F. Orciuoli, Pierluigi Ritrovato, Giuseppe D’aniello, A. D. Vivo","doi":"10.1109/INCoS.2013.145","DOIUrl":"https://doi.org/10.1109/INCoS.2013.145","url":null,"abstract":"In recent years, merchants have increased their interest in marketing strategies based on loyalty programs. Coalition loyalty is one of the most profitable among the aforementioned strategies. This work proposes a co-operation model based on the principles of Collective Knowledge Systems and on Semantic Technologies to support the generation and management of dynamic coalitions of merchants. The main benefit of the proposed model is represented by the possibility, for merchants, to match their needs and define coalition programs (based on conditional coupon) without the involvement of mediators. Moreover, the model provides the capability of defining collaboratively and formally the aforementioned coupons that can be handled by means of technologies for payment and value added services. The proposed model is defined in the context of the TITAN Project aiming at defining an integrated service-oriented Software Platform enabling innovative business scenarios for e-money, e-payments and value added services.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116563901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles 基于格的后量子强不可伪造身份签名方案
Zhenhua Liu, Xiangsong Zhang, T. Takagi
Inspired by Agrawal, Boneh and Boyen's identity-based encryption scheme, we proposed a post-quantum identity-based signature scheme from lattices. In this construction, two distinct trapdoors are used to find short bases. One trapdoor enables the real implementation to generate short bases for all lattices. The other trapdoor enables the simulator to generate short bases for all lattices. Moreover, the generating short bases are used to sample short vectors as signatures. Based on the hardness of the small integer solution (SIS) problem, the proposed scheme is proven to be strongly unforgeable against adaptive chosen-identity and adaptive chosen-message attacks without using random oracles. Compared with the existing strongly unforgeable identity-based signature schemes, our scheme has the advantages of full security and resistance to quantum computing attacks.
受Agrawal, Boneh和Boyen基于身份的加密方案的启发,我们提出了一种基于格的后量子身份签名方案。在这种结构中,两个不同的活板门被用来寻找短的基地。一个活板门使实际实现能够为所有格子生成短基。另一个活板门使模拟器能够为所有格子生成短基。此外,利用生成的短基对短向量进行采样作为特征。基于小整数解(SIS)问题的硬度,证明了该方案在不使用随机预言的情况下对自适应选择身份和自适应选择消息攻击具有强不可伪造性。与现有的强不可伪造身份签名方案相比,该方案具有充分的安全性和抗量子计算攻击的优点。
{"title":"Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles","authors":"Zhenhua Liu, Xiangsong Zhang, T. Takagi","doi":"10.1109/INCoS.2013.107","DOIUrl":"https://doi.org/10.1109/INCoS.2013.107","url":null,"abstract":"Inspired by Agrawal, Boneh and Boyen's identity-based encryption scheme, we proposed a post-quantum identity-based signature scheme from lattices. In this construction, two distinct trapdoors are used to find short bases. One trapdoor enables the real implementation to generate short bases for all lattices. The other trapdoor enables the simulator to generate short bases for all lattices. Moreover, the generating short bases are used to sample short vectors as signatures. Based on the hardness of the small integer solution (SIS) problem, the proposed scheme is proven to be strongly unforgeable against adaptive chosen-identity and adaptive chosen-message attacks without using random oracles. Compared with the existing strongly unforgeable identity-based signature schemes, our scheme has the advantages of full security and resistance to quantum computing attacks.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122091344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Design of the Joint Network LDPC Codes for Half-Duplex Cooperative Multi-access Relay Channel 半双工协同多址中继信道联合网络LDPC码的优化设计
Jingyi Wang, S. Che, Y. Li, Junlong Wang
Optimization of degree distribution of the joint network LDPC code for orthogonal multiple-access relay channel (MARC) is investigated in this paper. We first calculated the code capacity of the source-destination link of orthogonal MARC based on a Gaussian approximation, where two sources communicate with one destination in the presence of one relay. Then, a new generalized differential evolution algorithm is developed to iteratively improve the degree distribution of the joint network LDPC code. Simulation results show that, the gap between bit error rate (BER) performance of our designed codes and the decoding threshold is about 0.4dB, and that between the capacity limit and decoding threshold is less than 0.7dB at BER = 10-6.
研究正交多址中继信道(MARC)联合网络LDPC码的度分布优化问题。我们首先基于高斯近似计算了正交MARC的源-目的链路的码容量,其中两个源在一个中继存在的情况下与一个目的通信。然后,提出了一种新的广义差分进化算法,迭代改进联合网络LDPC码的度分布。仿真结果表明,设计的码在误码率(BER)性能与译码阈值之间的差距约为0.4dB,在BER = 10-6时,容量限制与译码阈值之间的差距小于0.7dB。
{"title":"Optimal Design of the Joint Network LDPC Codes for Half-Duplex Cooperative Multi-access Relay Channel","authors":"Jingyi Wang, S. Che, Y. Li, Junlong Wang","doi":"10.1109/INCoS.2013.116","DOIUrl":"https://doi.org/10.1109/INCoS.2013.116","url":null,"abstract":"Optimization of degree distribution of the joint network LDPC code for orthogonal multiple-access relay channel (MARC) is investigated in this paper. We first calculated the code capacity of the source-destination link of orthogonal MARC based on a Gaussian approximation, where two sources communicate with one destination in the presence of one relay. Then, a new generalized differential evolution algorithm is developed to iteratively improve the degree distribution of the joint network LDPC code. Simulation results show that, the gap between bit error rate (BER) performance of our designed codes and the decoding threshold is about 0.4dB, and that between the capacity limit and decoding threshold is less than 0.7dB at BER = 10-6.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128296827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RGTE: A Reputation-Based Global Trust Establishment in VANETs RGTE:基于信誉的全球信任体系
Xiaoqing Li, Jicheng Liu, Xuejun Li, Wei-dong Sun
In recent years Trust Management has become a main method to ensure the security of vehicular ad-hoc networks (VANETs). However, most of the existing trust establishment approaches cannot handle the rapidly changing environment of VANET appropriately. In this paper, we propose a Reputation-based Global Trust Establishment scheme (RGTEs). The scheme introduces a solution to share the trust information in VANET safely by applying statistical laws, which makes it more efficient and accurate to establish trust in rapidly changing environment. Moreover, we detect a bad node by dynamic threshold according to real-time reputation status of the network. Analysis shows that RGTEs is more effective in confidence-building, security assurance and adaptability.
近年来,信任管理已成为保证车载自组网安全的主要方法。然而,现有的大多数信任建立方法都不能很好地应对VANET快速变化的环境。本文提出了一种基于声誉的全球信任建立方案(rgte)。该方案引入了一种利用统计规律在VANET中安全共享信任信息的解决方案,使得在快速变化的环境中建立信任更加高效和准确。此外,根据网络的实时信誉状态,采用动态阈值检测坏节点。分析表明,rgte在建立信任、安全保障和适应性方面更有效。
{"title":"RGTE: A Reputation-Based Global Trust Establishment in VANETs","authors":"Xiaoqing Li, Jicheng Liu, Xuejun Li, Wei-dong Sun","doi":"10.1109/INCoS.2013.91","DOIUrl":"https://doi.org/10.1109/INCoS.2013.91","url":null,"abstract":"In recent years Trust Management has become a main method to ensure the security of vehicular ad-hoc networks (VANETs). However, most of the existing trust establishment approaches cannot handle the rapidly changing environment of VANET appropriately. In this paper, we propose a Reputation-based Global Trust Establishment scheme (RGTEs). The scheme introduces a solution to share the trust information in VANET safely by applying statistical laws, which makes it more efficient and accurate to establish trust in rapidly changing environment. Moreover, we detect a bad node by dynamic threshold according to real-time reputation status of the network. Analysis shows that RGTEs is more effective in confidence-building, security assurance and adaptability.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Leakage-Resilient Proxy Signatures 防泄漏代理签名
Fei Tang, Hongda Li, Qihua Niu, Bei Liang
We design a proxy signature in the setting of leakage-resilient cryptography for the first time. Our motivation is that the proxy signatures are often used in scenarios where the signing is done in an insecure environment, e.g., the proxy key is stored in a device which is not secure enough example of IC card. In such setting, an adversary who can launch side-channel attacks may detect some leakage information about the proxy key. The traditional security models of the proxy signatures cannot provide such security. Hence we extend them to the leakage-resilient setting, and also give a concrete construction which conforms to the extended security model.
我们首次设计了一种防泄漏加密设置下的代理签名。我们的动机是代理签名通常用于在不安全的环境中进行签名的场景,例如,代理密钥存储在不够安全的设备中,例如IC卡。在这种情况下,可以发起侧信道攻击的攻击者可能会检测到有关代理密钥的一些泄漏信息。传统的代理签名安全模型无法提供这种安全性。因此,我们将其推广到弹性泄漏环境,并给出了符合扩展安全模型的具体结构。
{"title":"Leakage-Resilient Proxy Signatures","authors":"Fei Tang, Hongda Li, Qihua Niu, Bei Liang","doi":"10.1109/INCoS.2013.94","DOIUrl":"https://doi.org/10.1109/INCoS.2013.94","url":null,"abstract":"We design a proxy signature in the setting of leakage-resilient cryptography for the first time. Our motivation is that the proxy signatures are often used in scenarios where the signing is done in an insecure environment, e.g., the proxy key is stored in a device which is not secure enough example of IC card. In such setting, an adversary who can launch side-channel attacks may detect some leakage information about the proxy key. The traditional security models of the proxy signatures cannot provide such security. Hence we extend them to the leakage-resilient setting, and also give a concrete construction which conforms to the extended security model.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121386367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fair Computation with Tit-for-Tat Strategy 以牙还牙策略的公平计算
Yilei Wang, Qiuliang Xu, Zhe Liu
Complete fairness means that either all parties learn the output of the function or none of them does. It was deemed as an impossible task in general in secure two party computation by Cleve (STOC 1986). However, a seminal result of complete fairness between two parties was achieved by Gordorn et al. (STOC 2008). Recently Groce and Katz (Euro crypt 2012) corrected the insufficient assumptions and gave some positive results of fairness. Here we revisit this problem and introduce the Tit-for-Tat (TFT) strategy into rational two-party computation. To the best of our knowledge, it is the first secure two-party computation protocol with constant rounds that allows both parties to know the terminal round.
完全公平意味着,要么所有参与方都知道函数的输出,要么没有参与方知道。Cleve (STOC 1986)认为这是安全双方计算中一般不可能完成的任务。然而,Gordorn等人(STOC 2008)取得了双方完全公平的开创性成果。最近Groce和Katz (Euro crypt 2012)纠正了不充分的假设,并给出了一些积极的公平结果。在这里,我们重新审视这个问题,并将针锋相对(TFT)策略引入到理性的双方计算中。据我们所知,它是第一个安全的两方计算协议,具有恒定的轮数,允许双方都知道终端轮数。
{"title":"Fair Computation with Tit-for-Tat Strategy","authors":"Yilei Wang, Qiuliang Xu, Zhe Liu","doi":"10.1109/INCoS.2013.55","DOIUrl":"https://doi.org/10.1109/INCoS.2013.55","url":null,"abstract":"Complete fairness means that either all parties learn the output of the function or none of them does. It was deemed as an impossible task in general in secure two party computation by Cleve (STOC 1986). However, a seminal result of complete fairness between two parties was achieved by Gordorn et al. (STOC 2008). Recently Groce and Katz (Euro crypt 2012) corrected the insufficient assumptions and gave some positive results of fairness. Here we revisit this problem and introduce the Tit-for-Tat (TFT) strategy into rational two-party computation. To the best of our knowledge, it is the first secure two-party computation protocol with constant rounds that allows both parties to know the terminal round.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"50 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134111791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree RangeTree:一种C4.5决策树的特征选择算法
Hui Zhu, Siyu Chen, L. Zhu, Hui Li, Xiaofeng Chen
In order to conduct fine-grained network management in mobile network, Traffic Classification or Detection is widely used to divide network traffic into different classes, according to their source applications. Many techniques are exploited in Traffic Classification. Among them, machine learning has grown considerably attention because of its accuracy. Feature selection chooses feature combinations for machine learning algorithms, and has significant influence on the accuracy and efficiency. To discover optimal features, all possible combinations need to be evaluated by testing real classifiers. With numerous features, feature selection can cost an abundance of time and computational resources. This paper proposes a feature selection algorithm for C4.5 Decision Tree. This algorithm utilizes structural characteristics of C4.5 algorithm to exclude some of the combinations without actually testing the classifiers. The simulation results demonstrate that the algorithm can reduce the number of tests in seeking the optimal feature combination.
为了在移动网络中进行细粒度的网络管理,流量分类或检测被广泛用于将网络流量根据其来源应用划分为不同的类别。在流量分类中应用了许多技术。其中,机器学习因其准确性而备受关注。特征选择为机器学习算法选择特征组合,对机器学习算法的准确率和效率有重要影响。为了发现最优特征,需要通过测试真实分类器来评估所有可能的组合。由于特征众多,特征选择可能会花费大量的时间和计算资源。本文提出了一种C4.5决策树的特征选择算法。该算法利用C4.5算法的结构特征,在不实际测试分类器的情况下,排除了部分组合。仿真结果表明,该算法可以减少寻找最优特征组合的测试次数。
{"title":"RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree","authors":"Hui Zhu, Siyu Chen, L. Zhu, Hui Li, Xiaofeng Chen","doi":"10.1109/INCoS.2013.13","DOIUrl":"https://doi.org/10.1109/INCoS.2013.13","url":null,"abstract":"In order to conduct fine-grained network management in mobile network, Traffic Classification or Detection is widely used to divide network traffic into different classes, according to their source applications. Many techniques are exploited in Traffic Classification. Among them, machine learning has grown considerably attention because of its accuracy. Feature selection chooses feature combinations for machine learning algorithms, and has significant influence on the accuracy and efficiency. To discover optimal features, all possible combinations need to be evaluated by testing real classifiers. With numerous features, feature selection can cost an abundance of time and computational resources. This paper proposes a feature selection algorithm for C4.5 Decision Tree. This algorithm utilizes structural characteristics of C4.5 algorithm to exclude some of the combinations without actually testing the classifiers. The simulation results demonstrate that the algorithm can reduce the number of tests in seeking the optimal feature combination.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131507511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1