首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
Precise zero-knowledge was introduced by Micali and Pass in STOC'06.This notion captures the idea that the view of any verifier in interaction can be reconstructed in almost time.Pass also obtained a sequential composition lemma for precise zero-knowledge protocols.However,this lemma doesn't provide tight precisions for composed protocols.In this paper we further obtain a sequential composition lemma for a subclass of precise zero-knowledge protocols,which all satisfy a property:their simulators use the cod...  相似文献   

2.
In this paper, a numerical simulation of flow-induced noise by the low Mach number turbulent flow with a sinusoidal wavy wall was presented based on the unsteady incompressible Navier-Stokes equations and Lighthill’s acoustic analogy. Large eddy simulation (LES) was used to investigate the space-time flow field and the Smagorinsky sub-grid scale (SGS) model was introduced for turbulence model. Using Lighthill’s acoustics analogy, the flow field simulated by LES was taken as near-field sound sources and radiated sound from turbulent flow was computed by the Curle’s integral formulation under the low Mach number approximation. Both spanwise wavy wall and streamwise wavy wall with various wall wave amplitudes were discussed to investigate their effects on reducing the drag and flow noise. The relationship between flow noise and drag on the wavy wall is also studied.  相似文献   

3.
Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security.  相似文献   

4.
High performance computer is often required by model predictive control (MPC) systems due to the heavy online computation burden. To extend MPC to more application cases with low-cost computation facilities, the implementation of MPC controller on field programmable gate array (FPGA) system is studied. For the dynamic matrix control (DMC) algorithm, the main design idea and the implemental strategy of DMC controller are introduced based on a FPGA’s embedded system. The performance tests show that both the computation efficiency and the accuracy of the proposed controller can be satisfied due to the parallel computing capability of FPGA.  相似文献   

5.
Classification, using the decision tree algorithm, is a widely studied problem in data streams. The challenge is when to split a decision node into multiple leaves. Concentration inequalities, that exploit variance information such as Bernstein’s and Bennett’s inequalities, are often substantially strict as compared with Hoeffding’s bound which disregards variance. Many machine learning algorithms for stream classification such as very fast decision tree (VFDT) learner, AdaBoost and support vector machines (SVMs), use the Hoeffding’s bound as a performance guarantee. In this paper, we propose a new algorithm based on the recently proposed empirical Bernstein’s bound to achieve a better probabilistic bound on the accuracy of the decision tree. Experimental results on four synthetic and two real world data sets demonstrate the performance gain of our proposed technique.  相似文献   

6.
A directed signature is a type of signature with restricted verification ability. Directed signatures allow only a designated verifier to check the validity of the signature issued to him, and at the time of trouble or if necessary, any third party can verify the signature with the help of the signer or the designated verifier. Directed signature schemes are widely used in situations where the receiver’s privacy should be protected. Proxy signatures allow an entity to delegate its signing capability to another entity in such a way that the latter can sign message on behalf of the former when the former is not available. Proxy signature schemes have found numerous practical applications such as distributed systems and mobile agent applications. In this paper, we firstly define the notion of the directed proxy signature by combining the proxy signature and directed signature. Then, we formalize its security model and present a concrete scheme in the standard model. Finally, we use the techniques from provable security to show that the proposed scheme is unforgeable under the gap Diffie-Hellman assumption, and invisible under the decisional Diffie-Hellman assumption.  相似文献   

7.
The optical rays that form the image of an object and propagate a supersonic flow over a vehicle are refracted by the density variations. A numerical analysis of the aero-optical characteristics of supersonic flow over blunt wedge with a cavity window is carried out. A hybrid method of Reynold averaged Navier-Stokes and direct simulation Monte Carlo (RANS/DSMC) is employed to simulate the flowfield. Refraction factor is introduced to evaluate the flowfield’s aero-optical characteristic. The results show that mean flow’s aero-optical effects are mainly caused by the shock wave, the expansion wave and the turbulent boundary layer. Fluctuation flow’s aero-optical effects are mainly caused by the turbulent boundary layer and the shock wave induced by the cavity window. The aero-optical effects at the leading side of window are caused by the mean density variations, while the effects at the trailing side are caused by the density fluctuations. Different draft angles of the cavity window are investigated. The airborne optical devices of supersonic vehicle should be mounted in the middle of the cavity window with a large draft angle.  相似文献   

8.
In 3G networks upgraded with high speed packet access (HSPA) technology, the high access bandwidth and advanced mobile devices make it applicable to share large files among mobile users by peer-to-peer applications. To receive files as quickly as possible is essential for mobile users in file sharing applications, since they are subject to unstable signal strength and battery failures. While many researches present peer-to-peer file sharing architectures in mobile environments, few works focus on decreasing the time spent in disseminating files among users. In this paper, we present an efficient peer-to-peer file sharing design for HSPA networks called efficient file sharing (EFS) for 3G networks. EFS can decrease the dissemination time by efficiently utilizing the upstream-bandwidth of mobile nodes. It uses an adaptive rearrangement of a node’s concurrent uploading transfers, which causes the count of the node’s concurrent uploading transfers to lower while ensuring that the node’s upstream-bandwidth can be efficiently utilized. Our simulations show that, EFS achieves much less dissemination time than other protocols including Bullet Prime and a direct implementation of BitTorrent for mobile environments.  相似文献   

9.
To tackle the key-exposure problem in signature settings, this paper introduces a new cryptographic primitive named threshold key-insulated signature (TKIS) and proposes a concrete TKIS scheme. For a TKIS system, at least k out of n helpers are needed to update a user’s temporary private key. On the one hand, even if up to k−1 helpers are compromised in addition to the exposure of any of temporary private keys, security of the non-exposed periods is still assured. On the other hand, even if all the n helpers are compromised, we can still ensure the security of all periods as long as none of temporary private keys is exposed. Compared with traditional key-insulated signature (KIS) schemes, the proposed TKIS scheme not only greatly enhances the security of the system, but also provides flexibility and efficiency.  相似文献   

10.
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users’ connection, the connection managers will automatically research the last access point’s extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users’ access points, they can pass AL’s authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users’ account details, passwords, data and privacy.  相似文献   

11.
China National Stadium, also known as “Bird’s Nest”, is the main stadium of the 29th Olympic Games in Beijing in 2008, which has successfully held not only the Opening and the Closing ceremonies but also the track and field events. A new problem of rain preventing is brought out to improve the utilization of the Bird’s Nest after the Olympic Games. The scheme of installing an air inflated membrane at the opening of the steel structure is proposed in this paper to solve the rainproof problem of the Bird’s Nest. The form-finding and mechanical analyses of the air inflated membrane are carried out. Comparison between the mechanical performance and dynamical character before and after installing the air inflated membrane structure is given. To verify the analysis results, based on the practical structure of the Bird’s Nest, a test of a 1:20 model membrane is worked out.  相似文献   

12.
Commitment scheme is a basic component of many cryptographic protocols, such as coin-tossing, identification schemes, zero-knowledge and multi-party computation. In order to prevent man-in-middle attacks, non-malleability is taken into account. Many forming works focus on designing non-malleable commitments schemes based on number theory assumptions. In this paper we give a general framework to construct non- interactive and non-malleable commitment scheme with respect to opening based on more general assumptions called q-one way group homomorphisms (q-OWGH). Our scheme is more general since many existing commitment schemes can be deduced from our scheme.  相似文献   

13.
By studying the algorithms of single pattern matching, five factors that have effect on time complexity of the algorithm are analyzed. The five factors are: sorting the characters of pattern string in an increasing order of using frequency, utilizing already-matched pattern suffix information, utilizing already-matched pattern prefix information, utilizing the position factor which is absorbed from quick search algorithm, and utilizing the continue-skip idea which is originally proposed by this paper. Combining all the five factors, a new single pattern matching algorithm is implemented. It’s proven by the experiment that the efficiency of new algorithm is the best of all algorithms. Foundation item: the National Natural Science Foundation of China (Nos. 60502032 and 60672068)  相似文献   

14.
A method for estimating the critical temperature of thermal explosion for energetic materials using differential scanning calorimetry (DSC) measurement is derived from the Semenov’s thermal explosion theory and the non-isothermal kinetic equation based on Harcourt-Esson’s kinetic equation. The result obtained from this method coincides completely with that of the Hu-Yang-Liang-Wu method.  相似文献   

15.
The user interesting degree evaluation index is designed to fulfill the users’ real needs, which includes the user’ attention degree of commodity, hot commodity and preferential commodity. User interesting degree model (UIDM) is constructed to justify the value of user interesting degree; the personalization approach is presented; operations of add and delete nodes (branches) are covered in this paper. The improved e-catalog is more satisfied to users’ needs and wants than the former e-catalog which stands for enterprises, and the improved one can complete the recommendation of related products of enterprises.  相似文献   

16.
基于椭圆曲线离散对数问题(ECDLP)和平方剩余问题,本文提出了一种新的具备消息自动恢复特性的数字签名方案,同时对该方案进行了各种安全性分析,得出结论:该方案具有前向安全性,而且在第三方仲裁时无需泄露密钥(即具有零知识特性).  相似文献   

17.
高等级公路、双线铁路、城市地铁及城市轻轨隧道一般情况下均为左、右双线.近年来,为满足规划、平面线型要求,或受地形、地物、水文、地质等条件限制,或对原交通设施进行加宽扩容,或为提高土地利用率,小净距并行隧道呈迅速增加态势.由于各种施工方法围岩受力差别很大,笔者仅探讨采用矿山法或新奥法施工的暗埋隧道.笔者介绍了其相应的围岩稳定分析方法以及在重庆市轻轨二号线设计中的应用.  相似文献   

18.
交通需求管理和控制与时间因素密切相关,对出行时耗的研究是出行行为分析的重要内容. 本文提出了用于出行时间分析的持续时间模型,讨论了通勤者日出行时间投入随出行者及其家庭社会经济属性、活动和出行特征变化的连续分布规律. 模型用已投入出行时间约束下出行结束的条件概率更准确地描述了出行的动态过程,从对活动与出行之间派生和竞争关系的分析,部分地反映了通勤者的时间分配行为. 分析表明,出行时间最小化的行为假设对大多数通勤者成立. 本研究为出行时耗的定量研究提供了更准确有效的分析工具,对于准确把握通勤者时间分配行为有重要意义.  相似文献   

19.
The presence of wrinkles in the membrane is the main factor to induce the reflector surface inaccuracy of the space inflatable antenna. Based on the commercial finite element package ABAQUS, a numerical procedure for membrane wrinkle analysis was set up and used to analyze a space inflatable antenna which was under inner pressure to evaluate its wrinkle characteristics. First, the inner pressure effect on the reflector’s wrinkle pattern was studied thoroughly. As inner pressure increases, both the number and the amplitude of the wrinkles decrease, but the total deformation of the whole reflector surface increases much. Second, the influence of the interactions between antenna’s parts was investigated comprehensively. Any kind of unwanted interaction deteriorates reflector’s wrinkle characteristics. The works are valuable to the development and research of the space inflatable antenna.  相似文献   

20.
AbstractA buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo’s scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号