Smart speakers and voice-based virtual assistants are core building blocks of modern smart homes. For instance, they are used to retrieve information, interact with other devices, and command a variety of Internet of ...
详细信息
Along with the expansion of machine learning (ML) applications, the amount of data required to create predictions increases. Big-data ML has always been limited by off-chip memory capacity and computational speed. Con...
详细信息
Distributed storage can store data in multiple devices or servers to improve data ***,in today’s explosive growth of network data,traditional distributed storage scheme is faced with some severe challenges such as in...
详细信息
Distributed storage can store data in multiple devices or servers to improve data ***,in today’s explosive growth of network data,traditional distributed storage scheme is faced with some severe challenges such as insufficient performance,data tampering,and data lose.A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed *** this scheme,the following improvements have been made in this *** paper first analyzes the problems faced by distributed *** proposed to build a new distributed storage blockchain scheme with sharding *** proposed scheme realizes the partitioning of the network and nodes by means of blockchain sharding technology,which can improve the efficiency of data verification between *** addition,this paper uses polynomial commitment to construct a new verifiable secret share scheme called *** new scheme is one of the foundations for building our improved distributed storage blockchain *** with the previous scheme,our new scheme does not require a trusted third party and has some new features such as homomorphic and batch *** security of VSS can be further *** comparisons show that the proposed scheme significantly reduces storage and communication costs.
Video streaming constitutes the vast majority of Internet traffic and the DASH protocol has become the de-facto standard in the industry of multimedia delivery. The multicast method for information distribution has th...
详细信息
After Industry 4.0 was proposed, cyber-physical systems (CPS) were also introduced into the industrial environment called the industrial CPS. Internet-of-Things (IoT) services in the industry make intelligent decision...
详细信息
Dear editor,A polynomial f(x)∈Fq[x] is called a permutation polynomial (PP) over the finite field Fq if the associated mapping f:c (?) f(c) from Fq to itself is bijective.A PP f is called a complete permutati...
详细信息
Dear editor,A polynomial f(x)∈Fq[x] is called a permutation polynomial (PP) over the finite field Fq if the associated mapping f:c (?) f(c) from Fq to itself is bijective.A PP f is called a complete permutation polynomial if f(x)+x is a *** over finite fields of even characteristic have wide applications,including cryptography,coding theory,and communication *** many block ciphers with substitution-permutation network structure,the substitution box is usually a PP over F_(22k)for some positive integer *** resist the differential attacks,the differential uniformity of this
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to ...
详细信息
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to reduce computational and storage costs. In this work, two practical certificateless aggregate signature schemes are proposed from bilinear maps. The first scheme CAS-X reduces the costs of communication and signer-side computation but trades off the storage, while CAS-2 minimizes the storage but sacrifices the communication costs. One can choose either of the schemes by consideration of the application requirement. Compare with ID-based schemes, our schemes do not entail public key certificates as well and achieve the trust Level 3, which imply the frauds of the authority are detectable. Both of the schemes are proven secure in the random oracle model by assuming the intractability of the computational Diffie-Hellman problem over the groups with bilinear maps, where the forking lemma technique is avoided.
Partially blind signature is a variant of blind signature. It allows a signer to explicitly include common information in a blind signature under some agreement with a receiver. It provides anonymity of users in appli...
详细信息
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attac...
详细信息
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attack to small private CRT-exponents is analyzed. It is indicated that this attack makes nice use of lattice in RSA analysis, but some argument does not hold in general. Several counterexamples are constructed. Refinements and more precise statements of the attack are given.
暂无评论