Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer p...
详细信息
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer parameter selections and performance analysis in detail. In this paper an improved scheme is proposed by sharing a ring' polynomial vector that makes public key as small as 1/m of the original scheme in multi-user environments. In additions, we introduce a parameter r to control both the private key space size and decryption errors probability, which greatly enhances the flexibly and practicality. The correctness, security and efficiency are analyzed in detail and choice of parameters is studied, at last concrete parameters are recommended for the new scheme.
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shi...
详细信息
ISBN:
(纸本)9781424492220
The phenomenon of cloud computing has been driven largely these days. Personal Cloud, as the cloud computing for personal usage, has come to the forefront. Compare with traditional operating system, personal cloud shifts individual computing "from being device-centric to information-centric", which create a bridge between operating system-based computing and the more service-oriented approach to IT. Also, the mobile thin-client has brought mobility to cloud computing. In this paper, we provide a reference base for the development of methodologies tailored for personal cloud computing. Besides, we also provide a security architecture for personal cloud based on the security requirement analysis.
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail...
详细信息
ISBN:
(纸本)9781457702495
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail. This paper proposes a Webmail XSS fuzzer called L-WMxD (Lexical based Webmail XSS Discoverer). L-WMxD , which works on a lexical based mutation engine, is an active defense system to discover XSS before the Webmail application is online for service. The engine is initialized by normal JavaScript code called seed. Then, rules are applied to the sensitive strings in the seed which are picked out through a lexical parser. After that, the mutation engine issues multiple test cases. Newly-generated test cases are used for XSS test. Two prototype tools are realized by us to send the newly-generated test cases to various Webmail servers to discover XSS vulnerability. Experimental results of L-WMxD are quite encouraging. We have run L-WMxD over 26 real-world Webmail applications and found vulnerabilities in 21 Webmail services, including some of the most widely used Yahoo!Mail, Mirapoint Webmail and ORACLE' Collaboration Suite Mail.
This paper compares the efficiency of on-off Keying (OOK) modulation formats non-return-to-zero (NRZ) and return-to-zero (RZ) in both electrical and optical chromatic dispersion compensation. While In electrical compe...
详细信息
This paper compares the efficiency of on-off Keying (OOK) modulation formats non-return-to-zero (NRZ) and return-to-zero (RZ) in both electrical and optical chromatic dispersion compensation. While In electrical compensator feed forward-decision feedback equalizer (FFE-DFE) method was applied, Dispersion Compensation Fiber (DCF) was chosen to evaluate the effect of modulation format on them. Transmission distance, subsequently are varied in both systems with mentioned compensation systems to evaluate the Bit Error Rate (BER) regarding to mentioned modulation techniques.
To improve the deduplication performance while keep a reasonable metadata cost and time cost at the same time, a state deduplication method based on variable-size sliding window and a universal model of performance-an...
详细信息
To improve the deduplication performance while keep a reasonable metadata cost and time cost at the same time, a state deduplication method based on variable-size sliding window and a universal model of performance-analyzing for the deduplication methods are proposed. According to this method, the data object is divided into non-overlapped mini chunks based on its content firstly, and then a variable-size sliding window, which uses the mini chunks as its basic unit of movement, is used to identify the duplicate data blocks. Further more, different chunking strategies are used on the data changing regions and the non-changing regions respectively. The theoretical analyzing indicates that this method can achieve satisfying deduplication performance even with a relatively larger expected chunk size, because it can reduce the metadata cost effectively and identify smaller duplicate data blocks. The experimental results on real data show that the average compression ratio of the method can be increased 13.02% than SWC, which has the optimal deduplication performance among the current deduplication methods. Moreover, the average time cost of this method is reduced 97.45% than SWC. This method is suitable for the applications of mass data backup in network environment, which have more rigorous requirements on the deduplication performance and the time cost.
A Finite State Machine (FSM)-based Intellectual Property (IP) watermark algorithm at behavioral level is presented for the protection of IP reuse techniques in Very Large Scale Integration (VLSI). The proposed algorit...
详细信息
Electronic sealed-bid auctions are a method to establish the price of goods through the internet while keeping the bids secret during the bidding phase. In this paper, our concern is incoercibility of an auction proto...
详细信息
Traditional channel quantization based methods for encryption key generation usually suffer from the quantization error which may decrease the key agreement ratio between authorized users. In this paper, we make use o...
详细信息
Traditional channel quantization based methods for encryption key generation usually suffer from the quantization error which may decrease the key agreement ratio between authorized users. In this paper, we make use of the reciprocity of the wireless channel in time-division duplex (TDD) mode, and adopt a closed-form robust Chinese remainder theorem (CRT) to extract the encryption key from the noisy channel estimations. The channel coefficients are regarded as the remainders in robust CRT, and the key is generated from the quotient output of the robust CRT. In addition, a remainder selection procedure is proposed to further improve its performance. Simulations demonstrate the effectiveness of the proposed method.
The reactive computational model is pervasively used as a proper abstraction of web-based applications which receive inputs and generate outputs throughout execution. The present static enforcements of information flo...
详细信息
The reactive computational model is pervasively used as a proper abstraction of web-based applications which receive inputs and generate outputs throughout execution. The present static enforcements of information flow security on reactive program are either based on type system or abstract interpretation. In this work we first propose an approach using automated verification to check conformance with information flow policy for reactive program. This approach utilizes our previous idea to incorporate self-composition with reach ability analysis. In order to reduce the state space of model, we propose the Store-Match Self-Composition (SMSC) to avoid duplicating the low channels. The result of preliminary experiments shows that our approach is more precise and efficient than existing work and also more efficient than our previous reach ability analysis.
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions (binary code) is measured ...
详细信息
暂无评论