首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
University Network-Design Based on Cloud Computing 基于云计算的高校网络设计
He Xueni
Integration of colleges and universities continue to expand, how the network soft, hard resource deployment and configuration become a difficult problem. After analyzing the university network funding, regional differences, and the current life of the computer and use efficiency, In the cloud computing environment using virtualization technology, cost savings and improve the software and hardware efficiency in the use of network resources building programs have been proposed. Proven, cloud computing model in the university network construction costs, efficiency in the use, energy consumption, management and maintenance of superiority.
高校融合不断扩大,如何对网络软、硬资源进行部署和配置成为一个难题。在分析了高校网络经费、地区差异以及当前计算机寿命和使用效率的基础上,提出了在云计算环境下采用虚拟化技术,节约成本和提高软硬件使用效率的网络资源建设方案。实践证明,云计算模式在高校网络建设成本、使用效率、能耗、管理维护等方面具有优势。
{"title":"University Network-Design Based on Cloud Computing","authors":"He Xueni","doi":"10.1109/INCoS.2013.53","DOIUrl":"https://doi.org/10.1109/INCoS.2013.53","url":null,"abstract":"Integration of colleges and universities continue to expand, how the network soft, hard resource deployment and configuration become a difficult problem. After analyzing the university network funding, regional differences, and the current life of the computer and use efficiency, In the cloud computing environment using virtualization technology, cost savings and improve the software and hardware efficiency in the use of network resources building programs have been proposed. Proven, cloud computing model in the university network construction costs, efficiency in the use, energy consumption, management and maintenance of superiority.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130145026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Face Recognition Based on Shearlets Transform and Principle Component Analysis 基于Shearlets变换和主成分分析的人脸识别
Zhiyong Zeng, Jian-Qiang Hu
Multi-resolution analysis has been known to be effective for face recognition, however, most approaches only utilize scale and position information of different scales of decomposed image, only a few approaches utilize directional information. To investigate the potential of shear lets direction, this paper presents a new method for face description and recognition using shear lets transform and principle component analysis. Motivated by multi-resolution analysis, face images are performed by shear lets transform, and then directional information is exploited along with conventional scaling and translation parameters. Finally, face feature is extracted by principle component analysis. Experimental results on ORL and FERET face database show that the proposed method can get high face recognition rates.
多分辨率分析是人脸识别的有效方法,但大多数方法只利用了不同尺度分解图像的尺度和位置信息,只有少数方法利用了方向信息。为了研究剪切波方向的潜力,提出了一种基于剪切波变换和主成分分析的人脸描述与识别新方法。在多分辨率分析的驱动下,对人脸图像进行剪切变换,然后利用常规缩放和平移参数提取方向信息。最后,通过主成分分析提取人脸特征。在ORL和FERET人脸数据库上的实验结果表明,该方法可以获得较高的人脸识别率。
{"title":"Face Recognition Based on Shearlets Transform and Principle Component Analysis","authors":"Zhiyong Zeng, Jian-Qiang Hu","doi":"10.1109/INCoS.2013.134","DOIUrl":"https://doi.org/10.1109/INCoS.2013.134","url":null,"abstract":"Multi-resolution analysis has been known to be effective for face recognition, however, most approaches only utilize scale and position information of different scales of decomposed image, only a few approaches utilize directional information. To investigate the potential of shear lets direction, this paper presents a new method for face description and recognition using shear lets transform and principle component analysis. Motivated by multi-resolution analysis, face images are performed by shear lets transform, and then directional information is exploited along with conventional scaling and translation parameters. Finally, face feature is extracted by principle component analysis. Experimental results on ORL and FERET face database show that the proposed method can get high face recognition rates.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128994448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure Multi-party Confidential Protocol of Matrix Factorization 矩阵分解的安全多方保密协议
Haiyan Xiao, Xiaoyuan Yang
The confidential computation of matrix is a very important issue in secure multi-party computation. But there is no literature proposed truly multi-party confidential computation protocol on matrix factorization. In this paper, we use data perturbation assumptions and oblivious transfer protocol to construct a multi-party confidential computation protocol on matrix factorization which has high efficiency.
矩阵的保密计算是安全多方计算中的一个重要问题。但目前还没有文献提出真正的基于矩阵分解的多方保密计算协议。本文利用数据摄动假设和不经意传输协议,构造了一个高效的多方保密矩阵分解计算协议。
{"title":"Secure Multi-party Confidential Protocol of Matrix Factorization","authors":"Haiyan Xiao, Xiaoyuan Yang","doi":"10.1109/INCoS.2013.89","DOIUrl":"https://doi.org/10.1109/INCoS.2013.89","url":null,"abstract":"The confidential computation of matrix is a very important issue in secure multi-party computation. But there is no literature proposed truly multi-party confidential computation protocol on matrix factorization. In this paper, we use data perturbation assumptions and oblivious transfer protocol to construct a multi-party confidential computation protocol on matrix factorization which has high efficiency.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124462831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Social Semantic Repository for Special Needs Education 特殊需要教育的社会语义库
V. Benigno, N. Capuano, G. Mangione, S. Salerno
The main problem that characterises the context of Special Education is the availability of a large amount of available information and its real, pertinent usability. The use of software systems for the semantic annotation and retrieval of teaching resources for this field appears to be still little explored, also due to the lack of specific semantic models for information description. This paper introduces the Knowledge Hub, a semantic repository of educational and information resources for Special Education, which is able to assist practitioners and teachers in finding the most interesting and useful digital resources for each special need by combining recommendation techniques with Semantic and Social Web models and tools. The paper also describes the encouraging results of a system experimentation with real users.
特殊教育背景的主要问题是大量可用信息的可用性及其真实、相关的可用性。由于缺乏用于信息描述的特定语义模型,使用软件系统对这一领域的教学资源进行语义注释和检索的探索似乎仍然很少。本文介绍了Knowledge Hub,这是一个特殊教育教育和信息资源的语义存储库,它能够通过将推荐技术与语义和社交网络模型和工具相结合,帮助从业者和教师找到最有趣和有用的数字资源,以满足每种特殊需求。本文还描述了在真实用户中进行系统实验的令人鼓舞的结果。
{"title":"A Social Semantic Repository for Special Needs Education","authors":"V. Benigno, N. Capuano, G. Mangione, S. Salerno","doi":"10.1109/INCoS.2013.48","DOIUrl":"https://doi.org/10.1109/INCoS.2013.48","url":null,"abstract":"The main problem that characterises the context of Special Education is the availability of a large amount of available information and its real, pertinent usability. The use of software systems for the semantic annotation and retrieval of teaching resources for this field appears to be still little explored, also due to the lack of specific semantic models for information description. This paper introduces the Knowledge Hub, a semantic repository of educational and information resources for Special Education, which is able to assist practitioners and teachers in finding the most interesting and useful digital resources for each special need by combining recommendation techniques with Semantic and Social Web models and tools. The paper also describes the encouraging results of a system experimentation with real users.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121232233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control 基于密文-策略加权属性的细粒度访问控制加密
Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma
In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted with an access structure defined by the data provider. In the most proposed schemes, the characteristics of attributes are treated in the identical level. In the real circumstance, the importance of each attributes is always different. In this paper, we propose a scheme called cipher text-policy weighted attribute based encryption (CP-WABE) while the attributes have different weights according to their importance. The CP-WABE scheme is proved to be security under the decision l-Expanded bilinear Diffie-Hellman exponent (l-Expanded BDHE) assumption, which can be considered as the generalization of traditional CP-ABE scheme when all attributes have equal weight.
在基于密文-策略属性的加密方案中,用户持有的私钥与一组属性相关联,而数据则使用数据提供程序定义的访问结构进行加密。在大多数提出的方案中,属性的特征都是在同一层次上处理的。在实际环境中,每个属性的重要性总是不同的。本文提出了一种基于密文策略加权属性的加密方案(CP-WABE),其中属性根据其重要程度具有不同的权重。在决策-扩展双线性Diffie-Hellman指数(l-Expanded BDHE)假设下证明了CP-WABE方案是安全的,这可以看作是传统CP-ABE方案在所有属性权等情况下的推广。
{"title":"Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control","authors":"Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma","doi":"10.1109/INCoS.2013.18","DOIUrl":"https://doi.org/10.1109/INCoS.2013.18","url":null,"abstract":"In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted with an access structure defined by the data provider. In the most proposed schemes, the characteristics of attributes are treated in the identical level. In the real circumstance, the importance of each attributes is always different. In this paper, we propose a scheme called cipher text-policy weighted attribute based encryption (CP-WABE) while the attributes have different weights according to their importance. The CP-WABE scheme is proved to be security under the decision l-Expanded bilinear Diffie-Hellman exponent (l-Expanded BDHE) assumption, which can be considered as the generalization of traditional CP-ABE scheme when all attributes have equal weight.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"403 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116508506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010 修正发送方模糊加密方案在Eurocrypt 2010
Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen
There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The second approach was proposed in Eurocrypt 2010 by Fehr et al., who proved that sender equivocability under chosen-cipher text attacks (NC-CCA security) implies SO-CCA security. They also proposed a new primitive called ``cross-authentication code'', and used it to construct a public-key encryption (PKE) scheme (the FHKW scheme) achieving NC-CCA security. However, recently in PKC 2013, Huang et al. pointed out that the properties of cross-authentication code cannot guarantee the NC-CCA security of the FHKW scheme, i.e., the security proof of the FHKW scheme is flawed. In this paper, we propose the notion of ``strong cross-authentication code'', which helps to fix the security proof of the FHKW scheme. This strong notion captures the ability of a cross-authentication code to efficiently generate a new key, based on all the other keys and the cross-authentication tag, such that the new key is statistically indistinguishable from the original key. With this code as a building block, we construct a new version of the FHKW scheme, and prove it to be NC-CCA secure for multi-bit plaintexts. Our work makes possible the instantiation of simulation-based SO-CCA secure PKE with a multi-bit message space from NC-CCA secure PKEs.
有两种主要的方法来实现选择性打开选择密文安全(SO-CCA安全):有损加密(包括几乎所有的有损陷门函数)和发送方模糊加密。第二种方法由Fehr等人在Eurocrypt 2010中提出,他们证明了选择密文攻击(NC-CCA安全)下的发送方模棱两可性意味着SO-CCA安全。他们还提出了一种名为“交叉认证码”的新原语,并用它构建了一个实现NC-CCA安全性的公钥加密(PKE)方案(FHKW方案)。然而,最近在PKC 2013中,Huang等人指出,交叉认证码的属性并不能保证FHKW方案的NC-CCA安全性,即FHKW方案的安全性证明是有缺陷的。在本文中,我们提出了“强交叉认证码”的概念,这有助于修正FHKW方案的安全性证明。这个强大的概念捕获了交叉身份验证代码基于所有其他密钥和交叉身份验证标记有效生成新密钥的能力,从而使新密钥在统计上与原始密钥无法区分。以该代码为构建块,构造了一个新版本的FHKW方案,并证明了该方案对多位明文具有NC-CCA安全性。我们的工作使基于仿真的SO-CCA安全PKE的实例化成为可能,该实例具有来自NC-CCA安全PKE的多比特消息空间。
{"title":"Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010","authors":"Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen","doi":"10.1109/INCoS.2013.69","DOIUrl":"https://doi.org/10.1109/INCoS.2013.69","url":null,"abstract":"There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The second approach was proposed in Eurocrypt 2010 by Fehr et al., who proved that sender equivocability under chosen-cipher text attacks (NC-CCA security) implies SO-CCA security. They also proposed a new primitive called ``cross-authentication code'', and used it to construct a public-key encryption (PKE) scheme (the FHKW scheme) achieving NC-CCA security. However, recently in PKC 2013, Huang et al. pointed out that the properties of cross-authentication code cannot guarantee the NC-CCA security of the FHKW scheme, i.e., the security proof of the FHKW scheme is flawed. In this paper, we propose the notion of ``strong cross-authentication code'', which helps to fix the security proof of the FHKW scheme. This strong notion captures the ability of a cross-authentication code to efficiently generate a new key, based on all the other keys and the cross-authentication tag, such that the new key is statistically indistinguishable from the original key. With this code as a building block, we construct a new version of the FHKW scheme, and prove it to be NC-CCA secure for multi-bit plaintexts. Our work makes possible the instantiation of simulation-based SO-CCA secure PKE with a multi-bit message space from NC-CCA secure PKEs.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126139809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Network Layout Visualization Based on Sammon's Projection 基于Sammon投影的网络布局可视化
M. Radvanský, M. Kudelka, Z. Horak, V. Snás̃el
Visualization is an important part of Network Analysis. It helps to find features of the network that are not easily identifiable. In this paper we present our approach to the visualization of weighted networks based on Sammon's projection. The network may be seen as a set of data points in the space induced by the incidence relation or as a symmetric matrix of vertex distances. We propose several methods for construction of the input for the Sammon's projection and discuss the effect of the particular methods on the final layout. Results are illustrated using several networks in the 2D layout. Presented experiments use the well-known Karate club network and weighted co-authors network based on the DBLP database.
可视化是网络分析的重要组成部分。它有助于发现网络中不易识别的特征。本文提出了一种基于Sammon投影的加权网络可视化方法。网络可以看作是由关联关系引起的空间中的一组数据点,也可以看作是顶点距离的对称矩阵。我们提出了几种构建Sammon投影输入的方法,并讨论了特定方法对最终布局的影响。结果用二维布局中的几个网络来说明。本实验采用了著名的空手道俱乐部网络和基于DBLP数据库的加权合著者网络。
{"title":"Network Layout Visualization Based on Sammon's Projection","authors":"M. Radvanský, M. Kudelka, Z. Horak, V. Snás̃el","doi":"10.1109/INCOS.2013.43","DOIUrl":"https://doi.org/10.1109/INCOS.2013.43","url":null,"abstract":"Visualization is an important part of Network Analysis. It helps to find features of the network that are not easily identifiable. In this paper we present our approach to the visualization of weighted networks based on Sammon's projection. The network may be seen as a set of data points in the space induced by the incidence relation or as a symmetric matrix of vertex distances. We propose several methods for construction of the input for the Sammon's projection and discuss the effect of the particular methods on the final layout. Results are illustrated using several networks in the 2D layout. Presented experiments use the well-known Karate club network and weighted co-authors network based on the DBLP database.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126103980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Constructing Connected Dominating Set Based on Crossed Cube in WSN 基于交叉立方体的WSN连通支配集构造
Jing Zhang, Li Xu, Shuming Zhou, Wei Wu
A Connected Dominating Set (CDS) working as a virtual backbone is an effective way to optimize the network's topology, constructing a CDS for WSNs is a largely growing field, and a smaller CDS incurs less maintenance overhead. Research on finding smaller CDS is quite active. In this paper, a novel algorithm based on the Induced Tree of Crossed Cube is presented. It generates a CDS with a lower approximation radio. Our simulation shows that the algorithm provides the smallest CDS size comparing with some other traditional algorithms.
利用连接支配集(CDS)作为虚拟骨干网是优化网络拓扑结构的一种有效方法,为wsn构建一个连接支配集是一个正在蓬勃发展的领域,而且越小的连接支配集所带来的维护开销越小。寻找更小的CDS的研究相当活跃。本文提出了一种基于交叉立方体诱导树的新算法。它产生一个具有较低近似无线电的CDS。仿真结果表明,与传统算法相比,该算法具有最小的CDS大小。
{"title":"Constructing Connected Dominating Set Based on Crossed Cube in WSN","authors":"Jing Zhang, Li Xu, Shuming Zhou, Wei Wu","doi":"10.1109/INCoS.2013.83","DOIUrl":"https://doi.org/10.1109/INCoS.2013.83","url":null,"abstract":"A Connected Dominating Set (CDS) working as a virtual backbone is an effective way to optimize the network's topology, constructing a CDS for WSNs is a largely growing field, and a smaller CDS incurs less maintenance overhead. Research on finding smaller CDS is quite active. In this paper, a novel algorithm based on the Induced Tree of Crossed Cube is presented. It generates a CDS with a lower approximation radio. Our simulation shows that the algorithm provides the smallest CDS size comparing with some other traditional algorithms.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127144075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New Construction of PVPKE Scheme Based on Signed Quadratic Residues 基于有符号二次残数的PVPKE方案的新构造
Jindan Zhang, Xu An Wang
In SCN12, Nieto et al. [7] discussed an interesting property of public key encryption with chosen cipher text security, that is, cipher texts with publicly verifiability. Independently, we introduced a new cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in proxy re-encryption (PRE) and threshold public key encryption (TPKE)[10]. In Crypto'09, Hofheiz and Kiltz [6] introduced the group of signed quadratic residues and discussed its application, the most interesting feature of this group is its "gap" property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we show that, if basing some of Nieto et al's schemes on signed quadratic residues, the resulting schemes can meet the requirements of PVPKE. Based on this observation, we give new constructions of PVPKE scheme based on signed quadratic residues and analysis its security.
在SCN12中,Nieto等人[7]讨论了具有选择密文安全性的公钥加密的一个有趣性质,即具有公开可验证性的密文。另外,我们引入了一种新的加密原语:CCA Secure Public verifiable Public Key Encryption Without pairs In the Standard Model (PVPKE),并讨论了其在代理重加密(PRE)和阈值公钥加密(TPKE)中的应用[10]。在Crypto'09中,Hofheiz和Kiltz[6]引入了有符号二次残数群并讨论了它的应用,这个群最有趣的特征是它的“间隙”性质,而计算问题和因式分解一样难,对应的决策问题很容易。在本文中,我们证明了如果将Nieto等人的一些方案建立在有符号二次残基上,所得到的方案能够满足PVPKE的要求。在此基础上,给出了基于有符号二次残数的PVPKE方案的新构造,并分析了其安全性。
{"title":"New Construction of PVPKE Scheme Based on Signed Quadratic Residues","authors":"Jindan Zhang, Xu An Wang","doi":"10.1109/INCoS.2013.81","DOIUrl":"https://doi.org/10.1109/INCoS.2013.81","url":null,"abstract":"In SCN12, Nieto et al. [7] discussed an interesting property of public key encryption with chosen cipher text security, that is, cipher texts with publicly verifiability. Independently, we introduced a new cryptographic primitive: CCA Secure Publicly verifiable Public Key Encryption Without Pairings In the Standard Model (PVPKE) and discussed its application in proxy re-encryption (PRE) and threshold public key encryption (TPKE)[10]. In Crypto'09, Hofheiz and Kiltz [6] introduced the group of signed quadratic residues and discussed its application, the most interesting feature of this group is its \"gap\" property, while the computational problem is as hard as factoring, and the corresponding decisional problem is easy. In this paper, we show that, if basing some of Nieto et al's schemes on signed quadratic residues, the resulting schemes can meet the requirements of PVPKE. Based on this observation, we give new constructions of PVPKE scheme based on signed quadratic residues and analysis its security.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130592220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Empirical Analysis and Evolution Modeling of Network Topological Structure in Microblog 微博网络拓扑结构的实证分析与演化建模
Weiguo Yuan, Yun Liu
The wide use of Microblog leads to an instant online community, and the research on the Microblog networks topological structure is meaningful for understanding the information dissemination mechanism. We studied the distributions and correlation of the users' followers, friends, and bidirectional friend numbers and the correlation among them. In order to study the topological structure features of Microblog, we collected data from Sina Weibo and made a real bidirectional connection network. Using complex network theory, we analyze the statistical properties of this network, demonstrate that it processes small world and scale-free features. Moreover, we analyze some topological structure metrics, such as degree distributions, node degree correlation, and clustering coefficient distributions. Through inspecting the statistical properties, we find that it is disassortative and has hierarchy structure. In addition, we find that the users' age distribution can be divided into two sections and that there will emerge a large degree node in various stages of network evolution, but user average degree with user age has a gradual upward trend. We propose a fitness-based model with node accelerated growth, and the simulation results show that our model can be better consistent with the real network.
微博的广泛使用导致了即时网络社区的形成,对微博网络拓扑结构的研究对于理解微博网络的信息传播机制具有重要意义。我们研究了用户的关注者、好友和双向好友数量的分布和相关性,以及它们之间的相关性。为了研究微博的拓扑结构特征,我们收集了新浪微博的数据,并制作了一个真实的双向连接网络。利用复杂网络理论,分析了该网络的统计性质,证明了该网络处理小世界和无标度特征。此外,我们还分析了一些拓扑结构指标,如度分布、节点度相关和聚类系数分布。通过对统计性质的检验,我们发现它是不协调的,具有层次结构。此外,我们发现用户的年龄分布可以分为两个部分,在网络演进的各个阶段都会出现较大的度节点,但用户平均度随用户年龄有逐渐上升的趋势。我们提出了一种基于适应度的节点加速增长模型,仿真结果表明,我们的模型能够更好地与真实网络保持一致。
{"title":"Empirical Analysis and Evolution Modeling of Network Topological Structure in Microblog","authors":"Weiguo Yuan, Yun Liu","doi":"10.1109/INCoS.2013.125","DOIUrl":"https://doi.org/10.1109/INCoS.2013.125","url":null,"abstract":"The wide use of Microblog leads to an instant online community, and the research on the Microblog networks topological structure is meaningful for understanding the information dissemination mechanism. We studied the distributions and correlation of the users' followers, friends, and bidirectional friend numbers and the correlation among them. In order to study the topological structure features of Microblog, we collected data from Sina Weibo and made a real bidirectional connection network. Using complex network theory, we analyze the statistical properties of this network, demonstrate that it processes small world and scale-free features. Moreover, we analyze some topological structure metrics, such as degree distributions, node degree correlation, and clustering coefficient distributions. Through inspecting the statistical properties, we find that it is disassortative and has hierarchy structure. In addition, we find that the users' age distribution can be divided into two sections and that there will emerge a large degree node in various stages of network evolution, but user average degree with user age has a gradual upward trend. We propose a fitness-based model with node accelerated growth, and the simulation results show that our model can be better consistent with the real network.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134039097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1