首页 > 最新文献

2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing最新文献

英文 中文
Multitemporal Images Change Detection Using Nonsubsampled Contourlet Transform and Kernel Fuzzy C-Means Clustering 基于非下采样Contourlet变换和核模糊c均值聚类的多时相图像变化检测
Chao Wu, Yiquan Wu
In this paper, an unsupervised change detection method for multitemporal remote sensing images is proposed. Firstly, the difference image is obtained from two multitemporal images acquired on the same geographical area but at different time instances. Then the difference image is decomposed by nonsubsampled contour let transform (NSCT). For each pixel in the difference image, a feature vector is extracted using the NSCT coefficients and the difference image itself which are in the same position. The final change map is achieved by clustering the feature vectors using kernel fuzzy c-means (KFCM) clustering algorithm into two classes: changed and unchanged. The change detection results are compared with those of several state-of-the-art methods. And the experimental results demonstrate that the proposed method yields superior performance.
提出了一种多时相遥感图像的无监督变化检测方法。首先,对同一地理区域不同时间点的两幅多时相图像进行差分处理;然后利用非下采样轮廓let变换(NSCT)对差分图像进行分解。对于差分图像中的每个像素,使用NSCT系数和差分图像本身处于相同位置的特征向量进行提取。利用核模糊c均值(KFCM)聚类算法将特征向量聚类为变化和不变两类,得到最终的变化图。将变化检测结果与几种最先进的方法进行了比较。实验结果表明,该方法具有良好的性能。
{"title":"Multitemporal Images Change Detection Using Nonsubsampled Contourlet Transform and Kernel Fuzzy C-Means Clustering","authors":"Chao Wu, Yiquan Wu","doi":"10.1109/IPTC.2011.31","DOIUrl":"https://doi.org/10.1109/IPTC.2011.31","url":null,"abstract":"In this paper, an unsupervised change detection method for multitemporal remote sensing images is proposed. Firstly, the difference image is obtained from two multitemporal images acquired on the same geographical area but at different time instances. Then the difference image is decomposed by nonsubsampled contour let transform (NSCT). For each pixel in the difference image, a feature vector is extracted using the NSCT coefficients and the difference image itself which are in the same position. The final change map is achieved by clustering the feature vectors using kernel fuzzy c-means (KFCM) clustering algorithm into two classes: changed and unchanged. The change detection results are compared with those of several state-of-the-art methods. And the experimental results demonstrate that the proposed method yields superior performance.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124158624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Feature-Based Robust Digital Image Watermarking Scheme Using Image Normalization and Quantization 一种基于图像归一化和量化的特征鲁棒数字图像水印方案
Jia Xu, Liu-Ping Feng
This paper presents a feature point based image watermarking scheme to achieve binary digital image's imbedded and blind extraction. Firstly, the stable image feature points are extracted from the host image by using image normalization and the scale-invariant feature transform, which can resist toward desynchronization attacks. Then Discrete Wavelet Transform (DWT) is used to the local feature regions(LFR). Finally, each LFR is embeds watermark. Experimental results show that the proposed image watermarking can resist both traditional signal processing attacks and geometric attacks.
提出了一种基于特征点的图像水印方案,实现了二值数字图像的嵌入和盲提取。首先,通过图像归一化和尺度不变特征变换,从宿主图像中提取稳定的图像特征点,从而抵抗去同步攻击;然后将离散小波变换(DWT)用于局部特征区域(LFR)。最后,在每个LFR中嵌入水印。实验结果表明,所提出的图像水印既能抵抗传统的信号处理攻击,也能抵抗几何攻击。
{"title":"A Feature-Based Robust Digital Image Watermarking Scheme Using Image Normalization and Quantization","authors":"Jia Xu, Liu-Ping Feng","doi":"10.1109/IPTC.2011.24","DOIUrl":"https://doi.org/10.1109/IPTC.2011.24","url":null,"abstract":"This paper presents a feature point based image watermarking scheme to achieve binary digital image's imbedded and blind extraction. Firstly, the stable image feature points are extracted from the host image by using image normalization and the scale-invariant feature transform, which can resist toward desynchronization attacks. Then Discrete Wavelet Transform (DWT) is used to the local feature regions(LFR). Finally, each LFR is embeds watermark. Experimental results show that the proposed image watermarking can resist both traditional signal processing attacks and geometric attacks.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130880317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimization of Masking Expansion Algorithm in Psychoacoustic Models 心理声学模型掩蔽展开算法的优化
Liu Hong-fu, Zhang Cong, Li Rui-fan
MPEG-4 AAC audio coding is the most widely used audio coding at present, but the MPEG-4 AAC audio coding standard has high complexity, long time delay and huge computation, what's more, it is not beneficial for real-time applications. Psychoacoustic model is the core part of the audio encoder, so huge computation also exists. Through researching the masking expansion feature of psychoacoustic, the computation process of the spread function is improved, the psychoacoustic computation decreased, the coding time is reduced, and the experimental results are given, which has important practical meaning to the research of real-time audio coding.
MPEG-4 AAC音频编码是目前应用最广泛的音频编码方式,但MPEG-4 AAC音频编码标准复杂度高、时延长、计算量大,不利于实时应用。心理声学模型是音频编码器的核心部分,因此也存在巨大的计算量。通过对心理声学掩蔽扩展特性的研究,改进了传播函数的计算过程,减少了心理声学的计算量,缩短了编码时间,并给出了实验结果,对实时音频编码的研究具有重要的实际意义。
{"title":"Optimization of Masking Expansion Algorithm in Psychoacoustic Models","authors":"Liu Hong-fu, Zhang Cong, Li Rui-fan","doi":"10.1109/IPTC.2011.48","DOIUrl":"https://doi.org/10.1109/IPTC.2011.48","url":null,"abstract":"MPEG-4 AAC audio coding is the most widely used audio coding at present, but the MPEG-4 AAC audio coding standard has high complexity, long time delay and huge computation, what's more, it is not beneficial for real-time applications. Psychoacoustic model is the core part of the audio encoder, so huge computation also exists. Through researching the masking expansion feature of psychoacoustic, the computation process of the spread function is improved, the psychoacoustic computation decreased, the coding time is reduced, and the experimental results are given, which has important practical meaning to the research of real-time audio coding.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research on Anisotropic Parameter Estimation for Vertical Transerse Isotropy: Based on 3D VSP, Walkaway VSP and Full Azimuth Seismic Data 垂直横向各向异性参数估计研究——基于三维VSP、Walkaway VSP和全方位地震资料
Xiang'e Sun, Y. Ling, Jun Gao
Based on three kinds of data, such as 3D Vertical Seismic Profile (VSP), multiple directional Walkaway VSP and full azimuth seismic data, the Vertical Transverse Isotropy (VTI) characteristics of plutonic igneous rock are studied, and an approach to calculate anisotropic parameter is presented. It is concluded that the target zone has apparent VTI characteristics. And then Addition of VTI anisotropic parameter can reduce the difference between forward move out and first break observation of reflection. It is also clearly that the anisotropic parameter estimated from multiple directional Walkaway VSP data is consistent with that from 3D VSP data.
基于三维垂直地震剖面(VSP)、多向走行式地震剖面(VSP)和全方位地震资料,研究了深部火成岩的垂直横向各向同性(VTI)特征,提出了各向异性参数的计算方法。结果表明,靶区具有明显的VTI特征。再加入VTI各向异性参数,可以减小反射波前移与初破观测的差异。多向Walkaway VSP数据估计的各向异性参数与三维VSP数据估计的各向异性参数一致。
{"title":"The Research on Anisotropic Parameter Estimation for Vertical Transerse Isotropy: Based on 3D VSP, Walkaway VSP and Full Azimuth Seismic Data","authors":"Xiang'e Sun, Y. Ling, Jun Gao","doi":"10.1109/IPTC.2011.41","DOIUrl":"https://doi.org/10.1109/IPTC.2011.41","url":null,"abstract":"Based on three kinds of data, such as 3D Vertical Seismic Profile (VSP), multiple directional Walkaway VSP and full azimuth seismic data, the Vertical Transverse Isotropy (VTI) characteristics of plutonic igneous rock are studied, and an approach to calculate anisotropic parameter is presented. It is concluded that the target zone has apparent VTI characteristics. And then Addition of VTI anisotropic parameter can reduce the difference between forward move out and first break observation of reflection. It is also clearly that the anisotropic parameter estimated from multiple directional Walkaway VSP data is consistent with that from 3D VSP data.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126305811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Multi-objective Population Migration Optimization Algorithm 一种改进的多目标人口迁移优化算法
Qian Zhao, Xueying Liu
The population migration algorithm is a very effective evolutionary algorithm to solve optimization problem, but there are little application in solving the multi-objective optimization problem. On the basis of vector evaluated method and Dynamic Weighted Aggregation combined those advantage, this paper presents a population migration algorithm based on vector evaluated method and Dynamic Weighted Aggregation for multi-objective optimization problems. At the same time, this paper population flow approach, which can more effective in local search. Experimental results show the algorithm is feasible.
人口迁移算法是求解优化问题的一种非常有效的进化算法,但在求解多目标优化问题方面应用较少。在矢量评价法和动态加权聚集法的基础上,结合两者的优点,提出了一种基于矢量评价法和动态加权聚集法的多目标优化问题的种群迁移算法。同时,本文采用人口流动方法,可以更有效地进行局部搜索。实验结果表明,该算法是可行的。
{"title":"An Improved Multi-objective Population Migration Optimization Algorithm","authors":"Qian Zhao, Xueying Liu","doi":"10.1109/IPTC.2011.43","DOIUrl":"https://doi.org/10.1109/IPTC.2011.43","url":null,"abstract":"The population migration algorithm is a very effective evolutionary algorithm to solve optimization problem, but there are little application in solving the multi-objective optimization problem. On the basis of vector evaluated method and Dynamic Weighted Aggregation combined those advantage, this paper presents a population migration algorithm based on vector evaluated method and Dynamic Weighted Aggregation for multi-objective optimization problems. At the same time, this paper population flow approach, which can more effective in local search. Experimental results show the algorithm is feasible.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114645263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Color Components' Exchanging on Different Color Spaces and the Using for Image Segmentation 色彩成分在不同色彩空间上的交换及其在图像分割中的应用
Xi Li, Hang Dai
The image segmentation is an important using in the computer image processing. This paper proposed a new method: the color components' exchanging on the different color spaces. Based the method and combine with other traditional image segmentation methods, try to use in the image segmentation, and get some results.
图像分割是计算机图像处理中的一项重要应用。本文提出了一种新的方法:在不同的色彩空间上进行色彩成分的交换。基于该方法并结合其他传统的图像分割方法,尝试将其应用于图像分割中,并取得了一定的效果。
{"title":"The Color Components' Exchanging on Different Color Spaces and the Using for Image Segmentation","authors":"Xi Li, Hang Dai","doi":"10.1109/IPTC.2011.38","DOIUrl":"https://doi.org/10.1109/IPTC.2011.38","url":null,"abstract":"The image segmentation is an important using in the computer image processing. This paper proposed a new method: the color components' exchanging on the different color spaces. Based the method and combine with other traditional image segmentation methods, try to use in the image segmentation, and get some results.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114541781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Relay Method and Performance for Wireless Networks 无线网络的协同中继方法及其性能
Yun Li, Shufang Song, M. Daneshmand, Weina Duan
In cooperative relay system, relay nodes forward traffic will cause an increase of network loads, which will affect the system throughput. However, most existing cooperative schemes do not consider the impact of the network loads. In this paper, we propose a novel cooperative relay method called Cooperative communication based on offered load (CCBOL) for wireless networks, in which the relay method is the IEEE 802.11 DCF (Distribution Coordination Function) scheme. In CCBOL, we introduce the offered load to analyze the throughput performance for the proposed cooperative relay system. We utilize throughput performance as a metric to decide whether cooperation is adopted. The analysis and simulation results show that CCBOL can significantly improve the throughput comparing with the existing direct communication under some offered load networks.
在协同中继系统中,中继节点转发的流量会造成网络负载的增加,从而影响系统的吞吐量。然而,现有的协作方案大多没有考虑网络负载的影响。本文提出了一种新的基于提供负载的无线网络协同通信(CCBOL)中继方法,该中继方法采用IEEE 802.11 DCF (Distribution Coordination Function,分配协调函数)方案。在CCBOL中,我们引入提供的负载来分析所提出的协作中继系统的吞吐量性能。我们利用吞吐量性能作为度量来决定是否采用合作。分析和仿真结果表明,在给定的负载网络下,CCBOL与现有的直接通信相比,可以显著提高吞吐量。
{"title":"A Cooperative Relay Method and Performance for Wireless Networks","authors":"Yun Li, Shufang Song, M. Daneshmand, Weina Duan","doi":"10.1109/IPTC.2011.15","DOIUrl":"https://doi.org/10.1109/IPTC.2011.15","url":null,"abstract":"In cooperative relay system, relay nodes forward traffic will cause an increase of network loads, which will affect the system throughput. However, most existing cooperative schemes do not consider the impact of the network loads. In this paper, we propose a novel cooperative relay method called Cooperative communication based on offered load (CCBOL) for wireless networks, in which the relay method is the IEEE 802.11 DCF (Distribution Coordination Function) scheme. In CCBOL, we introduce the offered load to analyze the throughput performance for the proposed cooperative relay system. We utilize throughput performance as a metric to decide whether cooperation is adopted. The analysis and simulation results show that CCBOL can significantly improve the throughput comparing with the existing direct communication under some offered load networks.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121430988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Active Data Leakage Prevention Model for Insider Threat 针对内部威胁的主动数据泄漏预防模型
Jiangjiang Wu, Jie Zhou, Jun Ma, Songzhu Mei, Jiangchun Ren
Insider threat has become the main vector of data leakage. Existing research on it mainly focuses on sensing and detection without defense capabilities. Meanwhile, traditional technologies for data leakage prevention rely on the terminal or boundary control which is difficult for data leakage in distributed environment. This paper presents an active data leakage prevention model for insider threat that combines trusted storage with virtual isolation technologies and expresses the protection requirements from the aspect of data object. We also show an implementation framework and give formal description as well as security properties proof. Finally, we give implementation strategies of dynamic isolation mechanisms.
内部威胁已成为数据泄露的主要载体。现有的研究主要集中在感知和检测上,缺乏防御能力。同时,传统的数据泄漏预防技术依赖于终端或边界控制,难以防止分布式环境下的数据泄漏。本文将可信存储技术与虚拟隔离技术相结合,提出了一种针对内部威胁的主动数据泄漏防护模型,并从数据对象的角度表达了防护需求。我们还给出了一个实现框架,并给出了形式化描述和安全属性证明。最后给出了动态隔离机制的实现策略。
{"title":"An Active Data Leakage Prevention Model for Insider Threat","authors":"Jiangjiang Wu, Jie Zhou, Jun Ma, Songzhu Mei, Jiangchun Ren","doi":"10.1109/IPTC.2011.17","DOIUrl":"https://doi.org/10.1109/IPTC.2011.17","url":null,"abstract":"Insider threat has become the main vector of data leakage. Existing research on it mainly focuses on sensing and detection without defense capabilities. Meanwhile, traditional technologies for data leakage prevention rely on the terminal or boundary control which is difficult for data leakage in distributed environment. This paper presents an active data leakage prevention model for insider threat that combines trusted storage with virtual isolation technologies and expresses the protection requirements from the aspect of data object. We also show an implementation framework and give formal description as well as security properties proof. Finally, we give implementation strategies of dynamic isolation mechanisms.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127637089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Numerical Simulation and Analysis of Cavitation Characteristics of Ship Propeller 船舶螺旋桨空化特性的数值模拟与分析
Xun Pan, Jing-yuan Zhang, Cheng-jiang Liu
Researching on cavitation of propeller which is an important part of ship bubble wake has important signification for studying ship bubble wake. The three viscous flow field of a five-blade high-skew propeller was simulated with numerical method. Based on RANS method, SST turbulent model and Single full cavitation model were used to simulate and analyze the cavitation characteristics of the propeller in open water condition and behind ship wake, and the influence of wake on the propeller's characteristics. The results showed that the method and numerical model were feasible for the good accordance between numerical results and test data. At the same advanced velocity, the coefficients of torque and thrust in wake were all bigger than those in open water, and at the same cavitation number, the area of cavitation on propeller in wake was broader than that in open water.
螺旋桨空化是船舶气泡尾流的重要组成部分,对其进行研究对研究船舶气泡尾流具有重要意义。用数值方法模拟了五叶高斜螺旋桨的三粘性流场。基于RANS方法,采用SST湍流模型和单次全空化模型,模拟分析了开放水域和船舶尾迹后螺旋桨的空化特性,以及尾迹对螺旋桨特性的影响。结果表明,该方法和数值模型是可行的,数值结果与试验数据吻合较好。相同前进速度下,尾流转矩和推力系数均大于开阔水域,相同空化数下,尾流螺旋桨空化面积大于开阔水域。
{"title":"Numerical Simulation and Analysis of Cavitation Characteristics of Ship Propeller","authors":"Xun Pan, Jing-yuan Zhang, Cheng-jiang Liu","doi":"10.1109/IPTC.2011.53","DOIUrl":"https://doi.org/10.1109/IPTC.2011.53","url":null,"abstract":"Researching on cavitation of propeller which is an important part of ship bubble wake has important signification for studying ship bubble wake. The three viscous flow field of a five-blade high-skew propeller was simulated with numerical method. Based on RANS method, SST turbulent model and Single full cavitation model were used to simulate and analyze the cavitation characteristics of the propeller in open water condition and behind ship wake, and the influence of wake on the propeller's characteristics. The results showed that the method and numerical model were feasible for the good accordance between numerical results and test data. At the same advanced velocity, the coefficients of torque and thrust in wake were all bigger than those in open water, and at the same cavitation number, the area of cavitation on propeller in wake was broader than that in open water.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121357870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model 异步模型中合理秘密共享的确定性协议
Yi Sun, Hongxiang Sun, Q. Wen, Hua Zhang
In the problem of rational secret sharing, each player, who prefers to be the only one to learn the secret, acts rationally rather than merely honestly or maliciously in the traditional cryptographic settings. The core issue of rational secret sharing is to construct a mechanism so that all rational participants have incentive to provide their shares in the reconstruction phase. However, lack of enough incentive and how to achieve fairness in asynchronous model are always the hot potatoes for obtaining a deterministic protocol in this field. In this paper, we devote our attention to solving the above two difficulties in asynchronous model and succeed in obtaining a satisfactory result, 1/p-rational secret sharing protocol, in 2-out-of-2 case. Firstly, we apply the repeated interaction method to provide motivation so as to attract the players to participant in the collaboration and make it possible for a deterministic protocol. Secondly, inspired by 1/p-security of partial fairness, we propose a new concept, 1/p-advantage, to reduce the unavoidable probability of unfairness in asynchronous model to a satisfactory level. Besides, in order to perfect our protocol, we bring in the augmented perfect coin-tossing to determine the sending-order at the start of every round. Compared with previous ones, our protocol is applicable to the asynchronous model as well as the traditional synchronous model, which makes our protocol more practical. Furthermore, the new concept, 1/p-advantage, gives us a new perspective on rational secret sharing and makes our solution fresh.
在理性秘密共享问题中,在传统的密码学设置中,每个玩家都希望自己是唯一知道秘密的人,他们的行为是理性的,而不仅仅是诚实或恶意。理性秘密共享的核心问题是构建一种机制,使所有理性参与者都有动力在重构阶段提供自己的秘密。然而,缺乏足够的激励以及如何在异步模型中实现公平性一直是该领域获得确定性协议的热点问题。本文致力于解决异步模型中的上述两个难题,并成功地得到了一个令人满意的结果,即2- of-2情况下的1/p-有理秘密共享协议。首先,我们采用重复交互的方法来提供动机,以吸引参与者参与到协作中,并使确定性协议成为可能。其次,受部分公平性的1/p安全性的启发,提出了1/p优势的新概念,将异步模型中不可避免的不公平性概率降低到令人满意的程度。此外,为了完善我们的协议,我们引入了增广完全抛硬币来确定每轮开始时的发送顺序。与以前的协议相比,我们的协议既适用于异步模型,也适用于传统的同步模型,这使我们的协议更具实用性。此外,1/p优势的新概念为我们提供了理性秘密共享的新视角,使我们的解决方案具有新鲜感。
{"title":"A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model","authors":"Yi Sun, Hongxiang Sun, Q. Wen, Hua Zhang","doi":"10.1109/IPTC.2011.9","DOIUrl":"https://doi.org/10.1109/IPTC.2011.9","url":null,"abstract":"In the problem of rational secret sharing, each player, who prefers to be the only one to learn the secret, acts rationally rather than merely honestly or maliciously in the traditional cryptographic settings. The core issue of rational secret sharing is to construct a mechanism so that all rational participants have incentive to provide their shares in the reconstruction phase. However, lack of enough incentive and how to achieve fairness in asynchronous model are always the hot potatoes for obtaining a deterministic protocol in this field. In this paper, we devote our attention to solving the above two difficulties in asynchronous model and succeed in obtaining a satisfactory result, 1/p-rational secret sharing protocol, in 2-out-of-2 case. Firstly, we apply the repeated interaction method to provide motivation so as to attract the players to participant in the collaboration and make it possible for a deterministic protocol. Secondly, inspired by 1/p-security of partial fairness, we propose a new concept, 1/p-advantage, to reduce the unavoidable probability of unfairness in asynchronous model to a satisfactory level. Besides, in order to perfect our protocol, we bring in the augmented perfect coin-tossing to determine the sending-order at the start of every round. Compared with previous ones, our protocol is applicable to the asynchronous model as well as the traditional synchronous model, which makes our protocol more practical. Furthermore, the new concept, 1/p-advantage, gives us a new perspective on rational secret sharing and makes our solution fresh.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133280147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1