The defect of existing fidelity definition is discussed, by using this definition, it is found that two obviously different image can be determined to be approximate or the same. According to the defect, an improved f...
详细信息
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ...
详细信息
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ...
详细信息
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop...
详细信息
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt...
详细信息
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us...
详细信息
With an ever-increasing interests and demands in Near-Space, more and more researchers have put their attentions on this field, leading to an emerging needs for modeling the 20-100km altitude space especially for broa...
详细信息
With an ever-increasing interests and demands in Near-Space, more and more researchers have put their attentions on this field, leading to an emerging needs for modeling the 20-100km altitude space especially for broadband communications. Among the lots of works, Media Access Control (MAC) undoubtedly has chief importance and urgency with which communicating objects or nodes can effectively access to Near-Space. However, previous MAC designs mainly focus their attentions on service differentiation by application purposes without considering nodal mobility. In fact, access control for nodes with different mobility levels has significantly influences to MAC performance and is complex and difficult to be implemented together with present MAC protocols. In this paper, we first presented a location method for Near-Space vehicles such as airships and unmanned planes and then modeled the mobile networks infrastructure with mobility considered. For determining the vehicles joining/leaving events locally, we quantify the communication range with Received Signal Strength Indicator (RSSI) aid. Then, for better managing the nodes access to the Near-Space with aforementioned works, we designed a TDMA based reservation MAC protocol to guarantee the servicedelay and networks coverage with best efforts. Simulation results showed that our proposed model better fit for Near-Space mobile communication environments and presented a lower delay and higher coverage regarding to different mobility levels.
暂无评论