Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword...
详细信息
Public key encryption with keyword search enables users to retrieve keywords from encrypted data, which can protect data confidentiality without losing the search operability. However, it is also vulnerable to keyword guessing attacks. In this paper, we propose a conjunctive keywords searchable encryption with designated tester (dPECK) to prevent the keyword guessing attacks. It can support multiple-keywords query at one time, i.e. conjunctive keywords search. We formulate the security notions for the conjunctive keyword search with the designated tester and present an efficient scheme which is proven secure in the standard model. Moreover, we extend the dPECK to proxy re-encryption dPECK (Re-dPECK) in order to enable the search proxy function. At last, the comparison and efficiency simulation demonstrates that this scheme has the lower computation and storage overhead.
Tone injection (TI) mitigates the high peak-to-average power ratio problem without incurring data rate loss or extra side information. However, optimal TI requires an exhaustive search over all possible constellations...
详细信息
Tone injection (TI) mitigates the high peak-to-average power ratio problem without incurring data rate loss or extra side information. However, optimal TI requires an exhaustive search over all possible constellations, which is a hard optimization problem. In this paper, a novel TI scheme that uses the clipping noise to find the optimal equivalent constellations is proposed. By minimizing the mean error of the clipping noise and possible constellation points, the proposed scheme easily determines the size and position of the optimal equivalent constellations. The proposed scheme achieves significant PAPR reduction while maintaining low complexity.
Developing, testing, debugging, and evaluating communication protocols for low-power wireless networks is a long and cumbersome task. Simulators can be helpful in the early stages of development, but their models of h...
详细信息
Exploiting the idea of cooperative communications is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. In this paper, we propose a hybrid coop...
详细信息
Exploiting the idea of cooperative communications is an efficient way to improve the physical-layer security of a wireless transmission in the presence of passive eavesdroppers. In this paper, we propose a hybrid cooperative relaying and jamming scheme to enhance the security of a two-way relay network, where some intermediate nodes help to relay the signal to the legitimate terminals via distributed beamforming and the others jam the eavesdropper simultaneously. In such a way, both two cooperative phases of the data transmission are protected. Subjected to the more practical per-node power constraint of each node and without the channel state information (CSI) of the eavesdropper, we propose a scheme to enhance the secrecy of the two terminals. It is shown that the problem can be transformed into a semidefinite programming (SDP) problem with an additional rank-1 constraint. We then develop a penalty function method and an iterative algorithm to solve such a problem efficiently, instead of the popular semi-definite relaxation (SDR) and randomization techniques proposed in the previous literatures. Simulations show that the proposed hybrid scheme greatly improves the security of the two-way relay networks.
Aimed at answering important questions about the energy demand of current telecom infrastructure and the design of sustainable and energy-efficient future networks, the research of a number of European partners is bro...
详细信息
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base...
详细信息
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m...
详细信息
For the first time, bidirectional multi-band multi-gigabit wireless-over-fiber transmission at 60-GHz mm-wave band has been accomplished with centrally supplied LO service. It does not require mm-wave LO devices in ea...
详细信息
ISBN:
(纸本)9781557529626
For the first time, bidirectional multi-band multi-gigabit wireless-over-fiber transmission at 60-GHz mm-wave band has been accomplished with centrally supplied LO service. It does not require mm-wave LO devices in each base stations and mobile terminals.
Control of collective behavior is an active topic in biology, social, and computer science. In this work we investigate how a minority of informed agents can influence and control the whole society through local inter...
详细信息
暂无评论