首页 > 最新文献

Journal of King Saud University-Computer and Information Sciences最新文献

英文 中文
TortoiseBFT: An asynchronous consensus algorithm for IoT system TortoiseBFT:物联网系统的异步共识算法
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102104
Yang Liu , Jianhao Fu , Miaomiao Zhang , Shidong Shi , Jingwen Chen , Song Peng , Yaoqi Wang

Traditional partial synchronous Byzantine fault tolerant (BFT) protocols are confronted with new challenges when applied to large-scale networks like IoT systems, which bring about rigorous demand for the liveness and consensus efficiency of BFT protocols in asynchronous network environments. HoneyBadgerBFT is the first practical asynchronous BFT protocol, which employs a reliable broadcast protocol (RBC) to broadcast transactions and an asynchronous binary agreement protocol (ABA) to determine whether transactions should be committed. DumboBFT is a follow-up proposal that requires fewer instances of ABA and achieves higher throughput than HoneyBadgerBFT, but it does not optimize the communication overhead of HoneyBadgerBFT.

In this paper, we propose TortoiseBFT, a high-performance asynchronous BFT protocol with three stages. We can significantly reduce communication overhead by determining the order of transactions first and requesting missing transactions after. Our two-phase transaction recovery mechanism enables nodes to recover missing transactions by seeking help from 2f+1 nodes. To improve the overall throughput of the system, we lower the verification overhead of threshold signatures in HoneyBadgerBFT, DumboBFT, and DispersedLedger from On3 to On2. We develop a node reputation model that selects producers with stable network conditions, which helps to reduce the number of random lotteries. Experimental results show that TortoiseBFT improves system throughput, reduces transaction delays, and minimizes communication overhead compared to HoneyBadgerBFT, DumboBFT, and DispersedLedger.

传统的部分同步拜占庭容错(BFT)协议在应用于物联网系统等大规模网络时面临新的挑战,这对异步网络环境中BFT协议的有效性和共识效率提出了严格要求。HoneyBadgerBFT 是首个实用的异步 BFT 协议,它采用可靠广播协议(RBC)来广播事务,并采用异步二进制协议(ABA)来确定事务是否应提交。DumboBFT 是一个后续提案,它需要的 ABA 实例更少,吞吐量也比 HoneyBadgerBFT 高,但它没有优化 HoneyBadgerBFT 的通信开销。我们先确定事务的顺序,然后再请求丢失的事务,从而大大减少了通信开销。我们的两阶段事务恢复机制使节点能够通过向 2f+1 个节点寻求帮助来恢复丢失的事务。为了提高系统的整体吞吐量,我们将 HoneyBadgerBFT、DumboBFT 和 DispersedLedger 中阈值签名的验证开销从 On3 降低到 On2。我们开发了一种节点信誉模型,用于选择网络条件稳定的生产者,这有助于减少随机抽签的次数。实验结果表明,与 HoneyBadgerBFT、DumboBFT 和 DispersedLedger 相比,TortoiseBFT 提高了系统吞吐量,减少了交易延迟,并最大限度地降低了通信开销。
{"title":"TortoiseBFT: An asynchronous consensus algorithm for IoT system","authors":"Yang Liu ,&nbsp;Jianhao Fu ,&nbsp;Miaomiao Zhang ,&nbsp;Shidong Shi ,&nbsp;Jingwen Chen ,&nbsp;Song Peng ,&nbsp;Yaoqi Wang","doi":"10.1016/j.jksuci.2024.102104","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102104","url":null,"abstract":"<div><p>Traditional partial synchronous Byzantine fault tolerant (BFT) protocols are confronted with new challenges when applied to large-scale networks like IoT systems, which bring about rigorous demand for the liveness and consensus efficiency of BFT protocols in asynchronous network environments. HoneyBadgerBFT is the first practical asynchronous BFT protocol, which employs a reliable broadcast protocol (RBC) to broadcast transactions and an asynchronous binary agreement protocol (ABA) to determine whether transactions should be committed. DumboBFT is a follow-up proposal that requires fewer instances of ABA and achieves higher throughput than HoneyBadgerBFT, but it does not optimize the communication overhead of HoneyBadgerBFT.</p><p>In this paper, we propose TortoiseBFT, a high-performance asynchronous BFT protocol with three stages. We can significantly reduce communication overhead by determining the order of transactions first and requesting missing transactions after. Our two-phase transaction recovery mechanism enables nodes to recover missing transactions by seeking help from <span><math><mrow><mn>2</mn><mi>f</mi><mo>+</mo><mn>1</mn></mrow></math></span> nodes. To improve the overall throughput of the system, we lower the verification overhead of threshold signatures in HoneyBadgerBFT, DumboBFT, and DispersedLedger from <span><math><mrow><mi>O</mi><mfenced><mrow><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup></mrow></mfenced></mrow></math></span> to <span><math><mrow><mi>O</mi><mfenced><mrow><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></mfenced></mrow></math></span>. We develop a node reputation model that selects producers with stable network conditions, which helps to reduce the number of random lotteries. Experimental results show that TortoiseBFT improves system throughput, reduces transaction delays, and minimizes communication overhead compared to HoneyBadgerBFT, DumboBFT, and DispersedLedger.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102104"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001939/pdfft?md5=b62b8656b909e9140f73f1274436f4cf&pid=1-s2.0-S1319157824001939-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients CoD-DSSE:实用高效的动态可搜索对称加密与轻量级客户端
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102106
Ze Zhu, Wanshan Xu, Junfeng Xu

Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but also dynamically update encrypted data stored on semi-trusted cloud server, effectively protecting user’s privacy. However, the majority of existing DSSE schemes exhibit inefficiencies in practical applications because of their complex structure. In addition, to store the status of keywords, the storage requirements of the client increase proportionally with the number of keyword/document pairs. Therefore, the client storage will be overwhelmed when confronted with a substantial increase in the volume of keyword/document pairs. To solve these issues, we propose a practical efficient dynamic searchable symmetric encryption scheme with lightweight clients—CoD-DSSE. A novel index structure similar to a chest of drawers is proposed in CoD-DSSE, which allows users to efficiently search all document indexes through XOR operations and keeps the keyword status on the server to lightweight clients. Furthermore, we use a random number generator to construct new search tokens for forward security and achieve backward security by using a Bloom filter to store the deleted document index, which can significantly reduce communication costs. The experimental and security analyses show that CoD-DSSE is efficient and secure in practice.

动态可搜索对称加密(DSSE)将动态更新与可搜索加密相结合,用户不仅可以实现关键字检索,还可以动态更新存储在半信任云服务器上的加密数据,有效保护用户隐私。然而,现有的大多数 DSSE 方案由于结构复杂,在实际应用中效率低下。此外,为了存储关键字的状态,客户端的存储需求与关键字/文档对的数量成正比增加。因此,当关键字/文档对的数量大幅增加时,客户端的存储空间将不堪重负。为了解决这些问题,我们提出了一种具有轻量级客户端的实用高效动态可搜索对称加密方案--CoD-DSSE。CoD-DSSE 中提出了一种类似于抽屉的新型索引结构,它允许用户通过 XOR 运算高效地搜索所有文档索引,并将服务器上的关键字状态保留给轻量级客户端。此外,我们使用随机数发生器来构建新的搜索令牌,以实现前向安全性,并通过使用布鲁姆过滤器来存储已删除的文档索引,以实现后向安全性,从而大大降低通信成本。实验和安全分析表明,CoD-DSSE 在实践中是高效和安全的。
{"title":"CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients","authors":"Ze Zhu,&nbsp;Wanshan Xu,&nbsp;Junfeng Xu","doi":"10.1016/j.jksuci.2024.102106","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102106","url":null,"abstract":"<div><p>Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but also dynamically update encrypted data stored on semi-trusted cloud server, effectively protecting user’s privacy. However, the majority of existing DSSE schemes exhibit inefficiencies in practical applications because of their complex structure. In addition, to store the status of keywords, the storage requirements of the client increase proportionally with the number of keyword/document pairs. Therefore, the client storage will be overwhelmed when confronted with a substantial increase in the volume of keyword/document pairs. To solve these issues, we propose a practical efficient dynamic searchable symmetric encryption scheme with lightweight clients—CoD-DSSE. A novel index structure similar to a chest of drawers is proposed in CoD-DSSE, which allows users to efficiently search all document indexes through XOR operations and keeps the keyword status on the server to lightweight clients. Furthermore, we use a random number generator to construct new search tokens for forward security and achieve backward security by using a Bloom filter to store the deleted document index, which can significantly reduce communication costs. The experimental and security analyses show that CoD-DSSE is efficient and secure in practice.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102106"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001952/pdfft?md5=6ad7ea6cdc4037881ef06012ec4ce876&pid=1-s2.0-S1319157824001952-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An accurate transformer-based model for transition-based dependency parsing of free word order languages 基于转换器的自由词序语言转换依赖解析模型
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102107
Fatima Tuz Zuhra , Khalid Saleem , Surayya Naz

Transformer models are the state-of-the-art in Natural Language Processing (NLP) and the core of the Large Language Models (LLMs). We propose a transformer-based model for transition-based dependency parsing of free word order languages. We have performed experiments on five treebanks from the Universal Dependencies (UD) dataset version 2.12. Our experiments show that a transformer model, trained with the dynamic word embeddings performs better than a multilayer perceptron trained on the state-of-the-art static word embeddings even if the dynamic word embeddings have a vocabulary size ten times smaller than the static word embeddings. The results show that the transformer trained on dynamic word embeddings achieves an unlabeled attachment score (UAS) of 84.17% for Urdu language which is 3.6% and 1.9% higher than the UAS scores of 80.56857% and 82.26859% achieved by the multilayer perceptron (MLP) using two static state-of-the-art word embeddings. The proposed approach is investigated for Arabic, Persian and Uyghur languages, in addition to Urdu, for UAS scores and the results suggest that the proposed solution outperform the MLP-based approaches.

转换器模型是自然语言处理(NLP)领域的最新技术,也是大型语言模型(LLM)的核心。我们提出了一种基于转换器的模型,用于对自由词序语言进行基于转换的依赖关系解析。我们在通用依存关系(UD)数据集 2.12 版中的五个树库上进行了实验。实验结果表明,使用动态词嵌入训练的转换器模型比使用最先进的静态词嵌入训练的多层感知器效果更好,即使动态词嵌入的词汇量比静态词嵌入小十倍。结果表明,在动态词嵌入上训练的变换器在乌尔都语中实现了 84.17% 的无标注附着得分(UAS),比使用两个最新静态词嵌入的多层感知器(MLP)实现的 80.56857% 和 82.26859% 的 UAS 得分分别高出≈3.6%和≈1.9%。除乌尔都语外,还对阿拉伯语、波斯语和维吾尔语的 UAS 分数进行了研究,结果表明所提出的解决方案优于基于 MLP 的方法。
{"title":"An accurate transformer-based model for transition-based dependency parsing of free word order languages","authors":"Fatima Tuz Zuhra ,&nbsp;Khalid Saleem ,&nbsp;Surayya Naz","doi":"10.1016/j.jksuci.2024.102107","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102107","url":null,"abstract":"<div><p>Transformer models are the state-of-the-art in Natural Language Processing (NLP) and the core of the Large Language Models (LLMs). We propose a transformer-based model for transition-based dependency parsing of free word order languages. We have performed experiments on five treebanks from the Universal Dependencies (UD) dataset version 2.12. Our experiments show that a transformer model, trained with the dynamic word embeddings performs better than a multilayer perceptron trained on the state-of-the-art static word embeddings even if the dynamic word embeddings have a vocabulary size ten times smaller than the static word embeddings. The results show that the transformer trained on dynamic word embeddings achieves an unlabeled attachment score (UAS) of 84.17% for Urdu language which is <span><math><mrow><mo>≈</mo><mn>3</mn><mo>.</mo><mn>6</mn><mtext>%</mtext></mrow></math></span> and <span><math><mrow><mo>≈</mo><mn>1</mn><mo>.</mo><mn>9</mn><mtext>%</mtext></mrow></math></span> higher than the UAS scores of 80.56857% and 82.26859% achieved by the multilayer perceptron (MLP) using two static state-of-the-art word embeddings. The proposed approach is investigated for Arabic, Persian and Uyghur languages, in addition to Urdu, for UAS scores and the results suggest that the proposed solution outperform the MLP-based approaches.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102107"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001964/pdfft?md5=9f26f8ea4918de323a897e760f616273&pid=1-s2.0-S1319157824001964-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards explainability in artificial intelligence frameworks for heartcare: A comprehensive survey 实现心脏护理人工智能框架的可解释性:全面调查
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102096
Sreeja M.U. , Abin Oommen Philip , Supriya M.H.

Artificial Intelligence is extensively applied in heartcare to analyze patient data, detect anomalies, and provide personalized treatment recommendations, ultimately improving diagnosis and patient outcomes. In a field where accountability is indispensable, the prime reason why medical practitioners are still reluctant to utilize AI models, is the reliability of these models. However, explainable AI (XAI) was a game changing discovery where the so-called back boxes can be interpreted using Explainability algorithms. The proposed conceptual model reviews the existing recent researches for AI in heartcare that have found success in the past few years. The various techniques explored range from clinical history analysis, medical imaging to the nonlinear dynamic theory of chaos to metabolomics with specific focus on machine learning, deep learning and Explainability. The model also comprehensively surveys the different modalities of datasets used in heart disease prediction focusing on how results differ based on the different datasets along with the publicly available datasets for experimentation. The review will be an eye opener for medical researchers to quickly identify the current progress and to identify the most reliable data and AI algorithm that is appropriate for a particular technology for heartcare along with the Explainability algorithm suitable for the specific task.

人工智能被广泛应用于心脏护理领域,以分析患者数据、检测异常情况并提供个性化治疗建议,最终改善诊断和患者预后。在这个问责制不可或缺的领域,医疗从业者仍不愿意使用人工智能模型的主要原因是这些模型的可靠性。然而,可解释的人工智能(XAI)是一个改变游戏规则的发现,所谓的 "背箱 "可以用可解释算法来解释。所提出的概念模型回顾了最近几年在心脏护理领域取得成功的人工智能研究。所探讨的各种技术包括临床病史分析、医学成像、混沌非线性动态理论以及代谢组学,并特别关注机器学习、深度学习和可解释性。该模型还全面调查了心脏病预测中使用的不同模式的数据集,重点关注不同数据集的结果有何不同,以及可用于实验的公开数据集。这篇综述将让医学研究人员大开眼界,快速识别当前的进展,并找出最可靠的数据和适合心脏护理特定技术的人工智能算法,以及适合特定任务的可解释性算法。
{"title":"Towards explainability in artificial intelligence frameworks for heartcare: A comprehensive survey","authors":"Sreeja M.U. ,&nbsp;Abin Oommen Philip ,&nbsp;Supriya M.H.","doi":"10.1016/j.jksuci.2024.102096","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102096","url":null,"abstract":"<div><p>Artificial Intelligence is extensively applied in heartcare to analyze patient data, detect anomalies, and provide personalized treatment recommendations, ultimately improving diagnosis and patient outcomes. In a field where accountability is indispensable, the prime reason why medical practitioners are still reluctant to utilize AI models, is the reliability of these models. However, explainable AI (XAI) was a game changing discovery where the so-called back boxes can be interpreted using Explainability algorithms. The proposed conceptual model reviews the existing recent researches for AI in heartcare that have found success in the past few years. The various techniques explored range from clinical history analysis, medical imaging to the nonlinear dynamic theory of chaos to metabolomics with specific focus on machine learning, deep learning and Explainability. The model also comprehensively surveys the different modalities of datasets used in heart disease prediction focusing on how results differ based on the different datasets along with the publicly available datasets for experimentation. The review will be an eye opener for medical researchers to quickly identify the current progress and to identify the most reliable data and AI algorithm that is appropriate for a particular technology for heartcare along with the Explainability algorithm suitable for the specific task.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102096"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S131915782400185X/pdfft?md5=389a533241a27435252f80bcbd075d37&pid=1-s2.0-S131915782400185X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ORD-WM: A two-stage loop closure detection algorithm for dense scenes ORD-WM:高密度场景的两阶段闭环检测算法
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102115
Chengze Wang , Wei Zhou , Gang Wang

Loop closure detection is a crucial technique supporting localization and navigation in autonomous vehicles. Existing research focuses on feature extraction in global scenes while neglecting considerations for local dense environments. In such local scenes, there are a large number of buildings, vehicles, and traffic signs, characterized by abundant objects, dense distribution, and interlaced near and far. The current methods only employ a single strategy for constructing descriptors, which fails to provide a detailed representation of the feature distribution in dense scenes, leading to inadequate discrimination of descriptors. Therefore, this paper proposes a multi-information point cloud descriptor to address the aforementioned issues. This descriptor integrates three types of environmental features: object density, region density, and distance, enhancing the recognition capability in local dense scenes. Additionally, we incorporated wavelet transforms and invariant moments from the image domain, designing wavelet invariant moments with rotation and translation invariance. This approach resolves the issue of point cloud mismatch caused by LiDAR viewpoint variations. In the experimental part, We collected data from dense scenes and conducted targeted experiments, demonstrating that our method achieves excellent loop closure detection performance in these scenes. Finally, the method is applied to a complete SLAM system, achieving accurate mapping.

环路闭合检测是支持自动驾驶汽车定位和导航的一项重要技术。现有研究侧重于全局场景的特征提取,而忽略了对局部密集环境的考虑。在这种局部场景中,存在大量建筑物、车辆和交通标志,具有物体丰富、分布密集、远近交错等特点。目前的方法仅采用单一策略构建描述符,无法详细呈现密集场景中的特征分布,导致描述符的判别能力不足。因此,本文提出了一种多信息点云描述符来解决上述问题。该描述符整合了三类环境特征:物体密度、区域密度和距离,增强了局部密集场景的识别能力。此外,我们还将小波变换和图像域的不变矩结合起来,设计出了具有旋转和平移不变性的小波不变矩。这种方法解决了激光雷达视角变化造成的点云不匹配问题。在实验部分,我们收集了高密度场景的数据,并进行了有针对性的实验,证明我们的方法在这些场景中实现了出色的闭环检测性能。最后,我们将该方法应用于一个完整的 SLAM 系统,实现了精确制图。
{"title":"ORD-WM: A two-stage loop closure detection algorithm for dense scenes","authors":"Chengze Wang ,&nbsp;Wei Zhou ,&nbsp;Gang Wang","doi":"10.1016/j.jksuci.2024.102115","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102115","url":null,"abstract":"<div><p>Loop closure detection is a crucial technique supporting localization and navigation in autonomous vehicles. Existing research focuses on feature extraction in global scenes while neglecting considerations for local dense environments. In such local scenes, there are a large number of buildings, vehicles, and traffic signs, characterized by abundant objects, dense distribution, and interlaced near and far. The current methods only employ a single strategy for constructing descriptors, which fails to provide a detailed representation of the feature distribution in dense scenes, leading to inadequate discrimination of descriptors. Therefore, this paper proposes a multi-information point cloud descriptor to address the aforementioned issues. This descriptor integrates three types of environmental features: object density, region density, and distance, enhancing the recognition capability in local dense scenes. Additionally, we incorporated wavelet transforms and invariant moments from the image domain, designing wavelet invariant moments with rotation and translation invariance. This approach resolves the issue of point cloud mismatch caused by LiDAR viewpoint variations. In the experimental part, We collected data from dense scenes and conducted targeted experiments, demonstrating that our method achieves excellent loop closure detection performance in these scenes. Finally, the method is applied to a complete SLAM system, achieving accurate mapping.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102115"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002040/pdfft?md5=46360415eb85c7c1fd6d73aa79f22586&pid=1-s2.0-S1319157824002040-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141595577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary metaheuristic algorithms for 0–1 knapsack problems: Performance analysis, hybrid variants, and real-world application 0-1knapsack问题的二元元启发式算法:性能分析、混合变体和实际应用
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102093
Mohamed Abdel-Basset , Reda Mohamed , Safaa Saber , Ibrahim M. Hezam , Karam M. Sallam , Ibrahim A. Hameed

This paper examines the performance of three binary metaheuristic algorithms when applied to two distinct knapsack problems (0–1 knapsack problems (KP01) and multidimensional knapsack problems (MKP)). These binary algorithms are based on the classical mantis search algorithm (MSA), the classical quadratic interpolation optimization (QIO) method, and the well-known differential evolution (DE). Because these algorithms were designed for continuous optimization problems, they could not be used directly to solve binary knapsack problems. As a result, the V-shaped and S-shaped transfer functions are used to propose binary variants of these algorithms, such as binary differential evolution (BDE), binary quadratic interpolation optimization (BQIO), and binary mantis search algorithm (BMSA). These binary variants are evaluated using various high-dimensional KP01 examples and compared to several classical metaheuristic techniques to determine their efficacy. To enhance the performance of those binary algorithms, they are combined with repair operator 2 (RO2) to offer better hybrid variants, namely HMSA, HQIO, and HDE. Those hybrid algorithms are evaluated using several medium- and large-scale KP01 and MKP instances, as well as compared to other hybrid algorithms, to demonstrate their effectiveness. This comparison is conducted using three performance metrics: average fitness value, Friedman mean rank, and computational cost. The experimental findings demonstrate that HQIO is a strong alternative for solving KP01 and MKP. In addition, the proposed algorithms are applied to the Merkle-Hellman Knapsack Cryptosystem and the resource allocation problem in adaptive multimedia systems (AMS) to illustrate their effectiveness when applied to optimize those real applications. The experimental findings illustrate that the proposed HQIO is a strong alternative for handling various knapsack-based applications.

本文研究了三种二元元启发式算法在应用于两个不同的knapsack问题(0-1 knapsack问题(KP01)和多维knapsack问题(MKP))时的性能。这些二元算法基于经典的螳螂搜索算法(MSA)、经典的二次插值优化法(QIO)和著名的微分演化法(DE)。由于这些算法都是针对连续优化问题设计的,因此无法直接用于解决二元组合包问题。因此,我们利用 V 型和 S 型传递函数提出了这些算法的二进制变体,如二进制微分进化算法(BDE)、二进制二次插值优化算法(BQIO)和二进制螳螂搜索算法(BMSA)。我们使用各种高维 KP01 示例对这些二进制变体进行了评估,并将其与几种经典的元启发式技术进行了比较,以确定其功效。为了提高这些二进制算法的性能,我们将它们与修复算子 2(RO2)相结合,以提供更好的混合变体,即 HMSA、HQIO 和 HDE。这些混合算法通过几个中型和大型 KP01 和 MKP 实例进行评估,并与其他混合算法进行比较,以证明其有效性。比较使用了三个性能指标:平均适合度值、弗里德曼平均等级和计算成本。实验结果表明,HQIO 是解决 KP01 和 MKP 的有力替代方案。此外,我们还将所提出的算法应用于 Merkle-Hellman Knapsack 密码系统和自适应多媒体系统(AMS)中的资源分配问题,以说明这些算法在应用于优化这些实际应用时的有效性。实验结果表明,所提出的 HQIO 是处理各种基于 Knapsack 的应用的有力替代方案。
{"title":"Binary metaheuristic algorithms for 0–1 knapsack problems: Performance analysis, hybrid variants, and real-world application","authors":"Mohamed Abdel-Basset ,&nbsp;Reda Mohamed ,&nbsp;Safaa Saber ,&nbsp;Ibrahim M. Hezam ,&nbsp;Karam M. Sallam ,&nbsp;Ibrahim A. Hameed","doi":"10.1016/j.jksuci.2024.102093","DOIUrl":"10.1016/j.jksuci.2024.102093","url":null,"abstract":"<div><p>This paper examines the performance of three binary metaheuristic algorithms when applied to two distinct knapsack problems (0–1 knapsack problems (KP01) and multidimensional knapsack problems (MKP)). These binary algorithms are based on the classical mantis search algorithm (MSA), the classical quadratic interpolation optimization (QIO) method, and the well-known differential evolution (DE). Because these algorithms were designed for continuous optimization problems, they could not be used directly to solve binary knapsack problems. As a result, the V-shaped and S-shaped transfer functions are used to propose binary variants of these algorithms, such as binary differential evolution (BDE), binary quadratic interpolation optimization (BQIO), and binary mantis search algorithm (BMSA). These binary variants are evaluated using various high-dimensional KP01 examples and compared to several classical metaheuristic techniques to determine their efficacy. To enhance the performance of those binary algorithms, they are combined with repair operator 2 (RO2) to offer better hybrid variants, namely HMSA, HQIO, and HDE. Those hybrid algorithms are evaluated using several medium- and large-scale KP01 and MKP instances, as well as compared to other hybrid algorithms, to demonstrate their effectiveness. This comparison is conducted using three performance metrics: average fitness value, Friedman mean rank, and computational cost. The experimental findings demonstrate that HQIO is a strong alternative for solving KP01 and MKP. In addition, the proposed algorithms are applied to the Merkle-Hellman Knapsack Cryptosystem and the resource allocation problem in adaptive multimedia systems (AMS) to illustrate their effectiveness when applied to optimize those real applications. The experimental findings illustrate that the proposed HQIO is a strong alternative for handling various knapsack-based applications.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102093"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001824/pdfft?md5=eecc477cb95abd1cca413bd63da31783&pid=1-s2.0-S1319157824001824-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141403813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A reference architecture for quantum computing as a service 量子计算即服务的参考架构
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102094
Aakash Ahmad , Ahmed B. Altamimi , Jamal Aqib

Quantum computers (QCs) aim to disrupt the status-quo of computing – replacing traditional systems and platforms that are driven by digital circuits and modular software – with hardware and software that operate on the principle of quantum mechanics. QCs that rely on quantum mechanics can exploit quantum circuits (i.e., quantum bits for manipulating quantum gates) to achieve ‘quantum computational supremacy’ over traditional, i.e., digital computing systems. Currently, the issues that impede mass-scale adoption of quantum systems are rooted in the fact that building, maintaining, and/or programming QCs is a complex and radically distinct engineering paradigm when compared to the challenges of classical computing and software engineering. Quantum service orientation is seen as a solution that synergises the research on service computing and quantum software engineering (QSE) to allow developers and users to build and utilise quantum software services based on pay-per-shot utility computing model. The pay-per-shot model represents a single execution of instruction on quantum processing unit and it allows vendors (e.g., Amazon Braket) to offer their QC platforms, simulators, and software services to end-users. This research contributes by (i) developing a reference architecture for enabling Quantum Computing as a Service (QCaaS), (ii) implementing microservices with the quantum-classic split pattern as an architectural use-case, and (iii) evaluating the architecture based on practitioners’ feedback. The proposed reference architecture follows a layered software pattern to support the three phases of service lifecycle namely development, deployment, and split of quantum software services. In the QSE context, the research focuses on unifying architectural methods and service-orientation patterns to promote reuse knowledge and best practices to tackle emerging and futuristic challenges of architecting QCaaS.

量子计算机(QCs)旨在打破计算现状--用基于量子力学原理运行的硬件和软件取代由数字电路和模块化软件驱动的传统系统和平台。依靠量子力学原理的量子计算机可以利用量子电路(即用于操纵量子门的量子比特)实现对传统数字计算系统的 "量子计算优势"。目前,阻碍量子系统大规模应用的问题在于,与经典计算和软件工程的挑战相比,量子计算的构建、维护和/或编程是一个复杂且截然不同的工程范式。量子服务导向被视为一种解决方案,它将服务计算和量子软件工程(QSE)的研究协同起来,允许开发人员和用户基于按次付费的实用计算模型构建和使用量子软件服务。按次付费模式代表在量子处理单元上执行一次指令,它允许供应商(如亚马逊Braket)向最终用户提供他们的量子计算平台、模拟器和软件服务。本研究的贡献在于:(i)为实现量子计算即服务(QCaaS)开发参考架构;(ii)以量子经典拆分模式作为架构用例实施微服务;以及(iii)根据从业人员的反馈评估该架构。建议的参考架构采用分层软件模式,以支持服务生命周期的三个阶段,即量子软件服务的开发、部署和拆分。在 QSE 范畴内,研究重点是统一架构方法和面向服务的模式,以促进知识和最佳实践的重复使用,从而应对架构 QCaaS 的新兴和未来挑战。
{"title":"A reference architecture for quantum computing as a service","authors":"Aakash Ahmad ,&nbsp;Ahmed B. Altamimi ,&nbsp;Jamal Aqib","doi":"10.1016/j.jksuci.2024.102094","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102094","url":null,"abstract":"<div><p>Quantum computers (QCs) aim to disrupt the status-quo of computing – replacing traditional systems and platforms that are driven by digital circuits and modular software – with hardware and software that operate on the principle of quantum mechanics. QCs that rely on quantum mechanics can exploit quantum circuits (i.e., quantum bits for manipulating quantum gates) to achieve ‘quantum computational supremacy’ over traditional, i.e., digital computing systems. Currently, the issues that impede mass-scale adoption of quantum systems are rooted in the fact that building, maintaining, and/or programming QCs is a complex and radically distinct engineering paradigm when compared to the challenges of classical computing and software engineering. Quantum service orientation is seen as a solution that synergises the research on service computing and quantum software engineering (QSE) to allow developers and users to build and utilise quantum software services based on pay-per-shot utility computing model. The pay-per-shot model represents a single execution of instruction on quantum processing unit and it allows vendors (e.g., Amazon Braket) to offer their QC platforms, simulators, and software services to end-users. This research contributes by (i) developing a reference architecture for enabling Quantum Computing as a Service (QCaaS), (ii) implementing microservices with the quantum-classic split pattern as an architectural use-case, and (iii) evaluating the architecture based on practitioners’ feedback. The proposed reference architecture follows a layered software pattern to support the three phases of service lifecycle namely <em>development</em>, <em>deployment</em>, and <em>split</em> of quantum software services. In the QSE context, the research focuses on unifying architectural methods and service-orientation patterns to promote reuse knowledge and best practices to tackle emerging and futuristic challenges of architecting QCaaS.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102094"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001836/pdfft?md5=c91ee63f1f40c76da5b6c5eb51b9b263&pid=1-s2.0-S1319157824001836-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel query execution time prediction approach based on operator iterate-aware of the execution plan on the graph database 基于操作员迭代感知图数据库执行计划的新型查询执行时间预测方法
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102125
Zhenzhen He , Jiong Yu , Tiquan Gu

Query execution time prediction is essential for database query optimization tasks, such as query scheduling, progress monitoring, and resource allocation. In the query execution time prediction tasks, the query plan is often used as the modeling object of a prediction model. Although the learning-based prediction models have been proposed to capture plan features, there are two limitations need to be considered more. First, the parent–child dependencies between plan operators can be captured, but the operator’s branch independence cannot be distinguished. Second, each operator’s output row is its following operator input, but the data iterate transfer operations between operators are ignored. In this study, we propose a graph query execution time prediction model containing a plan module, a query module, a plan-query module, and a prediction module to improve prediction effectiveness. Specifically, the plan module is used to capture the data iterate transfer operations and distinguish independent of branch operators; the query module is used to learn features of query terms that have an influence on the composition of operators; the plan-query interaction module is used to learn the logical correlations of plan and query. The experiment on datasets proves the effectiveness of the operator iterate-aware and query-plan interaction method in our proposed graph query execution prediction model.

查询执行时间预测对于查询调度、进度监控和资源分配等数据库查询优化任务至关重要。在查询执行时间预测任务中,查询计划通常被用作预测模型的建模对象。虽然基于学习的预测模型已被提出来捕捉计划特征,但有两个局限性需要更多考虑。首先,计划运算符之间的父子依赖关系可以捕获,但运算符分支的独立性无法区分。其次,每个操作符的输出行都是其后续操作符的输入,但忽略了操作符之间的数据迭代传输操作。在本研究中,我们提出了一种包含计划模块、查询模块、计划-查询模块和预测模块的图查询执行时间预测模型,以提高预测效果。具体来说,计划模块用于捕捉数据迭代转移操作并区分独立于分支算子的算子;查询模块用于学习对算子组成有影响的查询词特征;计划-查询交互模块用于学习计划和查询的逻辑关联。数据集实验证明了在我们提出的图查询执行预测模型中运算符迭代感知和查询计划交互方法的有效性。
{"title":"A novel query execution time prediction approach based on operator iterate-aware of the execution plan on the graph database","authors":"Zhenzhen He ,&nbsp;Jiong Yu ,&nbsp;Tiquan Gu","doi":"10.1016/j.jksuci.2024.102125","DOIUrl":"10.1016/j.jksuci.2024.102125","url":null,"abstract":"<div><p>Query execution time prediction is essential for database query optimization tasks, such as query scheduling, progress monitoring, and resource allocation. In the query execution time prediction tasks, the query plan is often used as the modeling object of a prediction model. Although the learning-based prediction models have been proposed to capture plan features, there are two limitations need to be considered more. First, the parent–child dependencies between plan operators can be captured, but the operator’s branch independence cannot be distinguished. Second, each operator’s output row is its following operator input, but the data iterate transfer operations between operators are ignored. In this study, we propose a graph query execution time prediction model containing a plan module, a query module, a plan-query module, and a prediction module to improve prediction effectiveness. Specifically, the plan module is used to capture the data iterate transfer operations and distinguish independent of branch operators; the query module is used to learn features of query terms that have an influence on the composition of operators; the plan-query interaction module is used to learn the logical correlations of plan and query. The experiment on datasets proves the effectiveness of the operator iterate-aware and query-plan interaction method in our proposed graph query execution prediction model.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102125"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002143/pdfft?md5=ad7d539faf5eff6c98349863ba86037c&pid=1-s2.0-S1319157824002143-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141639172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced enterprise-student matching with meta-path based graph neural network 利用基于元路径的图神经网络增强企业与学生的匹配度
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102116
Fu Li , Guangsheng Ma , Feier Chen , Qiuyun Lyu , Zhen Wang , Jian Zhang

Job-seeking is always an inescapable challenge for graduates. It may take a lot of time to find satisfying jobs due to the information gap between students who need satisfying offers and enterprises which ask for proper candidates. Although campus recruiting and job advertisements on the Internet could provide partial information, it is still not enough to help students and enterprises know each other and effectively match a graduate with a job. To narrow the information gap, we propose to recommend jobs for graduates based on historical employment data. Specifically, we construct a heterogeneous information network to characterize the relations between students, enterprises and industries. And then, we propose a meta-path based graph neural network, namely GraphRecruit, to further learn both latent student and enterprise portrait representations. The designed meta-paths connect students with their preferred enterprises and industries from different aspects. Also, we apply genetic algorithm optimization for meta-path selection according to application scenarios to enhance recommendation suitability and accuracy. To show the effectiveness of GraphRecruit, we collect five-year employment data and conduct extensive experiments comparing GraphRecruit with 4 classical baselines. The results demonstrate the superior performance of the proposed method.

求职始终是毕业生无法回避的挑战。学生需要满意的工作,企业需要合适的人选,由于信息不对等,学生可能需要花费大量时间才能找到满意的工作。虽然校园招聘和互联网上的招聘广告可以提供部分信息,但仍不足以帮助学生和企业相互了解并有效地为毕业生匹配工作。为了缩小信息差距,我们建议根据历史就业数据为毕业生推荐工作。具体来说,我们构建了一个异构信息网络来描述学生、企业和行业之间的关系。然后,我们提出了一种基于元路径的图神经网络,即 GraphRecruit,以进一步学习潜在的学生和企业肖像表征。所设计的元路径从不同方面将学生与他们喜欢的企业和行业联系起来。此外,我们还根据应用场景应用遗传算法优化元路径选择,以提高推荐的适宜性和准确性。为了证明 GraphRecruit 的有效性,我们收集了五年的就业数据,并进行了大量实验,将 GraphRecruit 与 4 个经典基线进行比较。实验结果证明了所提出方法的卓越性能。
{"title":"Enhanced enterprise-student matching with meta-path based graph neural network","authors":"Fu Li ,&nbsp;Guangsheng Ma ,&nbsp;Feier Chen ,&nbsp;Qiuyun Lyu ,&nbsp;Zhen Wang ,&nbsp;Jian Zhang","doi":"10.1016/j.jksuci.2024.102116","DOIUrl":"10.1016/j.jksuci.2024.102116","url":null,"abstract":"<div><p>Job-seeking is always an inescapable challenge for graduates. It may take a lot of time to find satisfying jobs due to the information gap between students who need satisfying offers and enterprises which ask for proper candidates. Although campus recruiting and job advertisements on the Internet could provide partial information, it is still not enough to help students and enterprises know each other and effectively match a graduate with a job. To narrow the information gap, we propose to recommend jobs for graduates based on historical employment data. Specifically, we construct a heterogeneous information network to characterize the relations between <em>students</em>, <em>enterprises</em> and <em>industries</em>. And then, we propose a meta-path based graph neural network, namely GraphRecruit, to further learn both latent student and enterprise portrait representations. The designed meta-paths connect students with their preferred enterprises and industries from different aspects. Also, we apply genetic algorithm optimization for meta-path selection according to application scenarios to enhance recommendation suitability and accuracy. To show the effectiveness of GraphRecruit, we collect five-year employment data and conduct extensive experiments comparing GraphRecruit with 4 classical baselines. The results demonstrate the superior performance of the proposed method.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102116"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002052/pdfft?md5=b92e9095dd2f3d188041171d9ee66fb2&pid=1-s2.0-S1319157824002052-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141639173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing 基于密钥策略的属性线性同态签名方案,适用于移动人群感应
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102114
Yuan Tian , Tanping Zhou , Xuan Zhou, Weidong Zhong, Xiaoyuan Yang

Compared with traditional wireless sensor networks, mobile crowdsensing networks have advantages of low cost, easy maintenance, and high scalability, which will play a role in city-level data sensing scenarios in the future. So far, linear homomorphic signatures based on Public Key Instruction,identity, as well as certificateless, have been proposed in wireless sensor networks to resist the data contamination. However, these signature schemes cannot perform finer-grained signature verification, and these signature schemes do not realize the separation of users’ sensitive information from their data. To solve the above problems, we design an attribute-based linear homomorphic signature scheme for large-scale wireless network built with mobile smart devices. First, we give the definition of the attribute-based linear homomorphic signature scheme based on key policy (KP-ABLHS). Second, we construct KP-ABLHS by incorporating attribute-based signature and linear homomorphic coding signature scheme. Finally, we prove our protocol is secure in random oracle model (ROM) and use Python pairing-based cryptography library (pypbc) to implement the scheme. The experimental results show that our scheme is as efficient as Li et al.’s scheme and has the advantage of signing the set of attributes, while the efficiency of our scheme is significantly better than that of scheme Boneh et al.’s scheme.

与传统的无线传感器网络相比,移动群感网络具有成本低、易维护、可扩展性强等优点,未来将在城市级数据感知场景中发挥作用。迄今为止,在无线传感器网络中已经提出了基于公钥指令、身份以及无证书的线性同态签名,以抵御数据污染。然而,这些签名方案无法进行更细粒度的签名验证,而且这些签名方案无法实现用户敏感信息与数据的分离。为了解决上述问题,我们设计了一种基于属性的线性同态签名方案,适用于由移动智能设备构建的大规模无线网络。首先,我们给出了基于密钥策略的属性线性同态签名方案(KP-ABLHS)的定义。其次,我们结合基于属性的签名和线性同态编码签名方案构建了 KP-ABLHS。最后,我们证明了我们的协议在随机甲骨文模型(ROM)中是安全的,并使用基于配对的 Python 密码学库(pypbc)实现了该方案。实验结果表明,我们的方案与 Li 等人的方案一样高效,并且具有签署属性集的优势,同时我们方案的效率明显优于 Boneh 等人的方案。
{"title":"Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing","authors":"Yuan Tian ,&nbsp;Tanping Zhou ,&nbsp;Xuan Zhou,&nbsp;Weidong Zhong,&nbsp;Xiaoyuan Yang","doi":"10.1016/j.jksuci.2024.102114","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102114","url":null,"abstract":"<div><p>Compared with traditional wireless sensor networks, mobile crowdsensing networks have advantages of low cost, easy maintenance, and high scalability, which will play a role in city-level data sensing scenarios in the future. So far, linear homomorphic signatures based on Public Key Instruction,identity, as well as certificateless, have been proposed in wireless sensor networks to resist the data contamination. However, these signature schemes cannot perform finer-grained signature verification, and these signature schemes do not realize the separation of users’ sensitive information from their data. To solve the above problems, we design an attribute-based linear homomorphic signature scheme for large-scale wireless network built with mobile smart devices. First, we give the definition of the attribute-based linear homomorphic signature scheme based on key policy (KP-ABLHS). Second, we construct KP-ABLHS by incorporating attribute-based signature and linear homomorphic coding signature scheme. Finally, we prove our protocol is secure in random oracle model (ROM) and use Python pairing-based cryptography library (pypbc) to implement the scheme. The experimental results show that our scheme is as efficient as Li et al.’s scheme and has the advantage of signing the set of attributes, while the efficiency of our scheme is significantly better than that of scheme Boneh et al.’s scheme.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102114"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002039/pdfft?md5=5422bf34152eb0c9ba54efd3a750f137&pid=1-s2.0-S1319157824002039-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of King Saud University-Computer and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1