A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping t...
详细信息
A quantum secret sharing (QSS) protocol between multiparty and multiparty is proposed, based on Greenberger-Horne- Zeilinger (GHZ) state. The protocol utilizes quantum Fourier transform and entanglement swapping to achieve a high intrinsic efficiency and source capacity. Then, the security of this protocol against some possible eavesdropping strategies has been analyzed. Furthermore, the presented protocol is generalized to the d-level case.
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener...
详细信息
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can generate the proxy signature on behalf of the original signer and any t-1 or fewer ones cannot do that. When the proxy signature needs to be verified,any t or more of n persons belonging to the verification group can verify the message and any t-1 or fewer ones cannot verify the validity of the proxy signature.
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran...
详细信息
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with random message by using the fact that the block cipher has same output with the same input using a key. Its security is proved by quantifying the advantage of distinguishing message authentication code from the random function in terms of the quality of the block cipher as a pseudo-random permutation.
The fast control capability of the VSC-HVDC and the process of area mode oscillations are analyzed. An auxiliary fuzzy logic controller designed in Matlab for the voltage source converter based HVDC transmission syste...
详细信息
The fast control capability of the VSC-HVDC and the process of area mode oscillations are analyzed. An auxiliary fuzzy logic controller designed in Matlab for the voltage source converter based HVDC transmission system, VSC-HVDC, to improve the stability of the AC/DC system is designed to enhance stability by increasing the deceleration energy of oscillation. Simulation results on the IEEE 4-generator AC/DC power systems have shown that the controller can enhance the dynamic stability of interconnected power systems effectively and is robust to the variation of system operating conditions and oscillation modes.
This paper builds the dynamic mathematic model of the three-level Neutral Point Diode Clamped (NPC) converter, discusses the fundamental principles of the active and reactive power control for three-level Voltage Sour...
详细信息
This paper builds the dynamic mathematic model of the three-level Neutral Point Diode Clamped (NPC) converter, discusses the fundamental principles of the active and reactive power control for three-level Voltage Source Converter based HVDC (VSC-HVDC) system. To fully utilize the controllability of VSC-HVDC, multi-target controller is developed to control AC and DC system respectively. Improved sine wave PWM (ISPWM) technique is designed to raise the DC voltage utility rate. Real time digital simulation (RTDS) is done to verify the validity of the proposed control strategy and controllers and demonstrate the good performance of VSC-HVDC.
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism...
详细信息
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism: multi-signcryption to routing protocol for ad hoc networks. SL multi-signcryption scheme efficiently provides message flexibility, order flexibility, message verifiability, order verifiability, message confidentiality, message unforgeability, non-repudiation and robustness. It is suitable for protecting messages and multi-signers from malicious attacks in networks. For this reason, using SL multi-signcryption, we propose a new secure AODV (Ad hoc on-demand distance vecter) routing protocol: SCRP (Signcryption based routing protocol). SCRP indeed enhances the security of AODV routing protocol and provides confidentiality, integrity, authentication, and non-repudiation to the routing message. Moreover, compared with other secure AODV, SCRP provides some other advantages such as lower computational cost and communicational overhead, flexibility of route message, and partially anonymous route.
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-ba...
详细信息
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-based channel access (EDCA), and contention-free channel access (HCCA). Although IEEE 802.11e has provided differentiated channel access mechanism, when call demand rises for important festivals such as New Year's Day or large scale natural disasters such as earthquakes, the delay of voice will increase and the QoS of voice nodes will drop down rapidly. Through our simulation study, in order to guarantee the QoS of emergency voice calls in congested situation, a higher priority for these calls will be required.
It is a trend to construct unattended substation in power system *** paper systematically analyses the superiority and limitation of MATLAB and Visual C++ and illustrates how to compile m-files to cpp-files by MATLAB ...
详细信息
Load modeling is very important for power system dynamic analysis and control. The composite load model widely applied recently in the power system operation centre consists of the static load and the equivalent motor...
详细信息
暂无评论