An improved safety analysis based on the causality diagram for the complex system of micro aero-engines is presented.The study is examined by using the causality diagram in analytical failure cases due to rupture or p...An improved safety analysis based on the causality diagram for the complex system of micro aero-engines is presented.The study is examined by using the causality diagram in analytical failure cases due to rupture or pentration in the receiver of micro turbojet engine casing,and the comparisons are also made with the results from the traditional fault tree analysis.Experimental results show two main advantages:(1)Quantitative analysis which is more reliable for the failure analysis in jet engines can be produced by the causality diagram analysis;(2)Graphical representation of causality diagram is easier to apply in real test cases and more effective for the safety assessment.展开更多
In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analys...In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analysis, a new driving behavior shaping model is proposed, which could be used to assess the degree of effect of driving error upon road traffic safety. Driver behavior shaping model based on driving reliability and safety analysis could be used to identify the road traffic accident causation, to supply data for driver's behavior training, to evaluate driving procedures, to human factor design of road traffic system.展开更多
An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming a...An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming an important topic that the oil and gas industry must pay increasing attention to. While removing sections from a decommissioned jacket platform, the stability of the remaining parts is critical The jacket danger indices D ~ and Ds defined in this paper are very useful for analyzing the safety of any procedure planned for disassembling a jacket platform. The safest piles cutting sequence can be determined easily by comparing every column of Do and Ds or simply analyzing the figures of every row ofD o and D,.展开更多
Presents a series of new concepts and design ideas about the fuze safety system, establishing thereby a proposed theory and relevant mathematical descriptions. The basic the- ory indicates that any fuze safety system ...Presents a series of new concepts and design ideas about the fuze safety system, establishing thereby a proposed theory and relevant mathematical descriptions. The basic the- ory indicates that any fuze safety system is a physical system comprising finite safety ele- ments each of which can independently affect the system's states, and the arming process is a dynamic one in which the extent of safety of the system changes only gradually. The theory and method can be used to analyse the arming process and to guide the development of fuze safety systems.展开更多
Coal mine safety is a complex system, which is controlled by a number of interrelated factors and is difficult to estimate. This paper proposes an index system of safety assessment based on correlated factors involved...Coal mine safety is a complex system, which is controlled by a number of interrelated factors and is difficult to estimate. This paper proposes an index system of safety assessment based on correlated factors involved in coal mining and a comprehensive evaluation model that combines the advantages of the AHP and a grey clustering method to guarantee the accuracy and objectivity of weight coefficients. First, we confirmed the weight of every index using the AHP, then did a general safety assessment by means of a grey clustering method. This model analyses the status of mining safety both qualitatively and quantitatively. It keeps management and technical groups informed of the situation of the coal production line in real time, which aids in making correct decisions based on practical safety issues. A case study in the application of the model is presented. The results show that the method is applicable and realistic with regard to the core of a coal mine's safety management. Consequently, the safe production of a mine and the awareness of advanced safe production management is accelerated.展开更多
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro...In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process...A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.展开更多
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con...Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme.展开更多
AIM: To evaluate the safety and feasibility of bone marrow cell (BMC) transplantation in patients with chronic liver disease on the waiting list for liver transplantation. METHODS: Ten patients (eight males) wit...AIM: To evaluate the safety and feasibility of bone marrow cell (BMC) transplantation in patients with chronic liver disease on the waiting list for liver transplantation. METHODS: Ten patients (eight males) with chronic liver disease were enrolled to receive infusion of autologous bone marrow-derived cells. Seven patients were classified as Child-Pugh B and three as Child-Pugh C. Baseline assessment included complete clinical and laboratory evaluation and abdominal MRI. Approximately 50 mL of bone marrow aspirate was prepared by centrifugation in a ficoll-hypaque gradient. At least of 100 millions of mononuclear-enriched BMCs were infused into the hepatic artery using the routine technique for arterial chemoembolization for liver tumors. Patients were followed up for adverse events up to 4 mo. RESULTS: The median age of the patients was 52 years (range 24-70 years). All patients were discharged 48 h after BMC infusion. Two patients complained ofmild pain at the bone marrow needle puncture site. No other complications or specific side effects related to the procedure were observed. Bilirubin levels were lower at 1 (2.19 ± 0.9) and 4 mo (2.10 ± 1.0) after cell transplantation that baseline levels (238 ± 1.2). Albumin levels 4 mo after BMC infusion (3.73 ± 0.5) were higher than baseline levels (3.47 ± 0.5). International normalized ratio (INR) decreased from 1.48 (SD = 0.23) to 1.43 (SD = 0.23) one month after cell transplantation. CONCLUSION: BMC infusion into hepatic artery of patients with advanced chronic liver disease is safe and feasible. In addition, a decrease in mean serum bilirubin and INR levels and an increase in albumin levels are observed. Our data warrant further studies in order to evaluate the effect of BMC transplantation in patients with advanced chronic liver disease.展开更多
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.展开更多
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encode...A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.展开更多
To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- u...To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- ure network coding algorithms. Firstly, by means of the distance between the message and its sig- nature in a lattice, we propose a Distance-bas- ed Secure Network Coding (DSNC) algorithm and stipulate its security to a new hard problem Fixed Length Vector Problem (FLVP), which is harder than Shortest Vector Problem (SVP) on lattices. Secondly, considering the bound- ary on the distance between the message and its signature, we further propose an efficient Bo- undary-based Secure Network Coding (BSNC) algorithm to reduce the computing complexity induced by square calculation in DSNC. Sim- ulation results and security analysis show that the proposed signature schemes have stronger unforgeability due to the natural property of lattices than traditional Rivest-Shamir-Adleman (RSA)-based signature scheme. DSNC algo- rithm is more secure and BSNC algorithm greatly reduces the time cost on computation.展开更多
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies...Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.展开更多
The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different re...The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different requirements from the traditional security protocols.In order to solve this problem,first,we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle(MITM) attacks in some cases based on the extended SSM.Then,we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.展开更多
Additional displacement of the building foundations over old goaf are prone to happen under the addi- tional loads induced by new buildings, weakening-rock mass by mining and seismic actions, which will cause serious ...Additional displacement of the building foundations over old goaf are prone to happen under the addi- tional loads induced by new buildings, weakening-rock mass by mining and seismic actions, which will cause serious damage to the buildings. In order to analyze the safety of the building foundations safety over the old goaf. the structure characteristics of the strata over the old goaf was investigated and the instability conditions of overhanging rocks upon old goaf were also analyzed in this paper. The results indicate that the stability of overhanging rocks is remarkably decreased by the interactions of mining fractures, earthquake force and building load, in addition, the settlement of the foundations over old goal is increased by the instability of overhanging rocks. According to the location of a new power plant in Yima Mine and its ambient conditions, we defined the influence scope of old goal via resistivity tomography. Based on the seismic parameters of the construction site, a numerical FLAC3d model of the building foundation under the seismic actions and building load was developed. The numerical results are obtained as follows: the foundation of the main power house meets the requirement of 6° seismic fortification intensity: however, under 7° seismic fortification intensity, the maximum differential settlement of foundation between the neighboring pillars is close to the maximum allowable value, while the seismic fortification intensity reaches 8°, but the safety requirements will not be satisfied.展开更多
Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptio...Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptions were employed during the derivation: 1) principal strains by M-C model and D-P model are equal, and 2) the material is under plane strain condition. Based on the analysis of the surface on rt plane, it is found that the proposed D-P type criterion is better than the D-P criterion with M-C circumscribed circle or M-C inscribed circle, and is applicable for stress Lode angle less than zero. By comparing the predicted results with the test data of sand under plane strain condition and other D-P criteria, the proposed criterion is verified and agrees well with the test data, which is further proved to be better than other D--P type criteria in certain range of Lode angle. The criterion was compiled into a finite difference package FLAC3D by user-subroutine, and was used to analyze the stability of a slope by strength reduction method. The predicted slope safety factor from the proposed criterion agrees well with that by Spencer method, and it is more accurate than that from classic D-P criteria.展开更多
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o...There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement.展开更多
A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing a...A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing attack. In this paper, the author demonstrate that Yoon's scheme is vulnerable to the off-line password guessing attack by using a stolen smart card and the DoS attack by computational load at the re, note system. An improvement of Yoon's scheme to resist the above attacks is also proposed.展开更多
文摘An improved safety analysis based on the causality diagram for the complex system of micro aero-engines is presented.The study is examined by using the causality diagram in analytical failure cases due to rupture or pentration in the receiver of micro turbojet engine casing,and the comparisons are also made with the results from the traditional fault tree analysis.Experimental results show two main advantages:(1)Quantitative analysis which is more reliable for the failure analysis in jet engines can be produced by the causality diagram analysis;(2)Graphical representation of causality diagram is easier to apply in real test cases and more effective for the safety assessment.
文摘In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analysis, a new driving behavior shaping model is proposed, which could be used to assess the degree of effect of driving error upon road traffic safety. Driver behavior shaping model based on driving reliability and safety analysis could be used to identify the road traffic accident causation, to supply data for driver's behavior training, to evaluate driving procedures, to human factor design of road traffic system.
基金Supported by the Open Foundation of the State Key Lab for Ocean Engineering of Shanghai Jiao Tong University under Grant No.0602
文摘An inevitable consequence of the development of the offshore petroleum industry is the eventual obsolescence of large offshore structures. Proper methods for removal of decommissioned offshore platforms are becoming an important topic that the oil and gas industry must pay increasing attention to. While removing sections from a decommissioned jacket platform, the stability of the remaining parts is critical The jacket danger indices D ~ and Ds defined in this paper are very useful for analyzing the safety of any procedure planned for disassembling a jacket platform. The safest piles cutting sequence can be determined easily by comparing every column of Do and Ds or simply analyzing the figures of every row ofD o and D,.
文摘Presents a series of new concepts and design ideas about the fuze safety system, establishing thereby a proposed theory and relevant mathematical descriptions. The basic the- ory indicates that any fuze safety system is a physical system comprising finite safety ele- ments each of which can independently affect the system's states, and the arming process is a dynamic one in which the extent of safety of the system changes only gradually. The theory and method can be used to analyse the arming process and to guide the development of fuze safety systems.
文摘Coal mine safety is a complex system, which is controlled by a number of interrelated factors and is difficult to estimate. This paper proposes an index system of safety assessment based on correlated factors involved in coal mining and a comprehensive evaluation model that combines the advantages of the AHP and a grey clustering method to guarantee the accuracy and objectivity of weight coefficients. First, we confirmed the weight of every index using the AHP, then did a general safety assessment by means of a grey clustering method. This model analyses the status of mining safety both qualitatively and quantitatively. It keeps management and technical groups informed of the situation of the coal production line in real time, which aids in making correct decisions based on practical safety issues. A case study in the application of the model is presented. The results show that the method is applicable and realistic with regard to the core of a coal mine's safety management. Consequently, the safe production of a mine and the awareness of advanced safe production management is accelerated.
基金Acknowledgements The project was supported by the Specialized Research Found for the Doctoral Program of Higher Education of China under Grant No. 20060013007 the National Natural Science Foundation of Beijing under Caant No. 4092029 and the National Natural Science Foundation of China under Grant No. 61100205, No. 60873001.
文摘In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
基金Acknowledgements This work was supported by the National Natural Science Foundation of China under Grants No. 61073187 and No. 61161006 the Hunan Provincial Natural Science Foundation of China under Grant No. 10JJ6093 and the Hunan Provincial Science and Technology Program under Ccant No. 2010GK2003.
文摘A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.
基金This work was supported in part by the National Natural Science Foundation of China under Grant No.61170217,61272469,61303212,61332019,and Grant No.U1135004,and by the Fundamental Research Founds for National University,China University of Geosciences
文摘Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme.
基金Supported by IMBTMCT/CNPq and Monte Tabor/Hospital Sao Rafael
文摘AIM: To evaluate the safety and feasibility of bone marrow cell (BMC) transplantation in patients with chronic liver disease on the waiting list for liver transplantation. METHODS: Ten patients (eight males) with chronic liver disease were enrolled to receive infusion of autologous bone marrow-derived cells. Seven patients were classified as Child-Pugh B and three as Child-Pugh C. Baseline assessment included complete clinical and laboratory evaluation and abdominal MRI. Approximately 50 mL of bone marrow aspirate was prepared by centrifugation in a ficoll-hypaque gradient. At least of 100 millions of mononuclear-enriched BMCs were infused into the hepatic artery using the routine technique for arterial chemoembolization for liver tumors. Patients were followed up for adverse events up to 4 mo. RESULTS: The median age of the patients was 52 years (range 24-70 years). All patients were discharged 48 h after BMC infusion. Two patients complained ofmild pain at the bone marrow needle puncture site. No other complications or specific side effects related to the procedure were observed. Bilirubin levels were lower at 1 (2.19 ± 0.9) and 4 mo (2.10 ± 1.0) after cell transplantation that baseline levels (238 ± 1.2). Albumin levels 4 mo after BMC infusion (3.73 ± 0.5) were higher than baseline levels (3.47 ± 0.5). International normalized ratio (INR) decreased from 1.48 (SD = 0.23) to 1.43 (SD = 0.23) one month after cell transplantation. CONCLUSION: BMC infusion into hepatic artery of patients with advanced chronic liver disease is safe and feasible. In addition, a decrease in mean serum bilirubin and INR levels and an increase in albumin levels are observed. Our data warrant further studies in order to evaluate the effect of BMC transplantation in patients with advanced chronic liver disease.
基金Project(61100201) supported by National Natural Science Foundation of ChinaProject(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China+1 种基金Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,ChinaProject(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
文摘The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.
基金supported in part by National Natural Science Foundation of China under Grant Nos.60573127,60773012,and 60873082Natural Science Foundation of Hunan Province under Grant Nos.07JJ3128 and 2008RS4016+1 种基金Scientific Research Fund of Hunan Provincial Education Department under Grant No.08B011Postdoctoral Science Foundation of China under Grant Nos.20070420184 and 200801341
文摘A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.
基金ACKNOWLEDGEMENT This work was partially supported by the National Basic Research Program of China under Grant No. 2012CB315905 the National Natural Sci- ence Foundation of China under Grants No. 61272501, No. 61173154, No. 61370190 and the Beijing Natural Science Foundation under Grant No. 4132056.
文摘To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- ure network coding algorithms. Firstly, by means of the distance between the message and its sig- nature in a lattice, we propose a Distance-bas- ed Secure Network Coding (DSNC) algorithm and stipulate its security to a new hard problem Fixed Length Vector Problem (FLVP), which is harder than Shortest Vector Problem (SVP) on lattices. Secondly, considering the bound- ary on the distance between the message and its signature, we further propose an efficient Bo- undary-based Secure Network Coding (BSNC) algorithm to reduce the computing complexity induced by square calculation in DSNC. Sim- ulation results and security analysis show that the proposed signature schemes have stronger unforgeability due to the natural property of lattices than traditional Rivest-Shamir-Adleman (RSA)-based signature scheme. DSNC algo- rithm is more secure and BSNC algorithm greatly reduces the time cost on computation.
基金supported by the NSFC(61173141,U1536206,61232016, U1405254,61373133,61502242,61572258)BK20150925+3 种基金Fund of Jiangsu Engineering Center of Network Monitoring(KJR1402)Fund of MOE Internet Innovation Platform(KJRP1403)CICAEETthe PAPD fund
文摘Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.
基金supported in part by the National Natural Science Foundation of China under Grants No.60473072,No.60803151the Joint Fund of Natural Science Foundation of China with the Guangdong Provincial Government under Grant No.U0632004
文摘The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different requirements from the traditional security protocols.In order to solve this problem,first,we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle(MITM) attacks in some cases based on the extended SSM.Then,we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.
基金the Funds of the State Key Development Program for Basic Research of China (Nos. 2013CB227900, 2010CB226800)the National Natural Science Foundation of China (Nos. 51108161, 51374201)+2 种基金the Open Laboratory Foundation for Deep Mine Construction of Henan Province of China (No. 2011KF-09)the Doctor Foundation in Henan Polytechnic University of China (No. Q2013-065)the Key Program for Science and Technology Research of Henan Province of China (Nos. 14A560002, 14B560021).
文摘Additional displacement of the building foundations over old goaf are prone to happen under the addi- tional loads induced by new buildings, weakening-rock mass by mining and seismic actions, which will cause serious damage to the buildings. In order to analyze the safety of the building foundations safety over the old goaf. the structure characteristics of the strata over the old goaf was investigated and the instability conditions of overhanging rocks upon old goaf were also analyzed in this paper. The results indicate that the stability of overhanging rocks is remarkably decreased by the interactions of mining fractures, earthquake force and building load, in addition, the settlement of the foundations over old goal is increased by the instability of overhanging rocks. According to the location of a new power plant in Yima Mine and its ambient conditions, we defined the influence scope of old goal via resistivity tomography. Based on the seismic parameters of the construction site, a numerical FLAC3d model of the building foundation under the seismic actions and building load was developed. The numerical results are obtained as follows: the foundation of the main power house meets the requirement of 6° seismic fortification intensity: however, under 7° seismic fortification intensity, the maximum differential settlement of foundation between the neighboring pillars is close to the maximum allowable value, while the seismic fortification intensity reaches 8°, but the safety requirements will not be satisfied.
基金Project(2010B14814) supported by the Fundamental Research Funds for the Central Universities of ChinaProject(200801133) supported by the Ministry of Water Resources of China for Public Welfare ProfessionProject(50809023) supported by the National Natural Science Foundation of China
文摘Based on Mohr-Coulomb (M-C) criterion, the parameters of Druker-Prager (D-P) criterion for geomaterial were determined under non-associated flow rule, and thus a new D-P type criterion was presented. Two assumptions were employed during the derivation: 1) principal strains by M-C model and D-P model are equal, and 2) the material is under plane strain condition. Based on the analysis of the surface on rt plane, it is found that the proposed D-P type criterion is better than the D-P criterion with M-C circumscribed circle or M-C inscribed circle, and is applicable for stress Lode angle less than zero. By comparing the predicted results with the test data of sand under plane strain condition and other D-P criteria, the proposed criterion is verified and agrees well with the test data, which is further proved to be better than other D--P type criteria in certain range of Lode angle. The criterion was compiled into a finite difference package FLAC3D by user-subroutine, and was used to analyze the stability of a slope by strength reduction method. The predicted slope safety factor from the proposed criterion agrees well with that by Spencer method, and it is more accurate than that from classic D-P criteria.
基金supported in part by National Natural Science Fundation of China under Grant No.61202458,61403109
文摘There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement.
文摘A new authentication scheme based on a one-way hash function and Diffie-Hellman key exchange using smart card was propused by Yoon et al. in 2005. They claimed that the proposed protocol is against password guessing attack. In this paper, the author demonstrate that Yoon's scheme is vulnerable to the off-line password guessing attack by using a stolen smart card and the DoS attack by computational load at the re, note system. An improvement of Yoon's scheme to resist the above attacks is also proposed.