Effective development and utilization of wood resources is critical.Wood modification research has become an integral dimension of wood science research,however,the similarities between modified wood and original wood...Effective development and utilization of wood resources is critical.Wood modification research has become an integral dimension of wood science research,however,the similarities between modified wood and original wood render it challenging for accurate identification and classification using conventional image classification techniques.So,the development of efficient and accurate wood classification techniques is inevitable.This paper presents a one-dimensional,convolutional neural network(i.e.,BACNN)that combines near-infrared spectroscopy and deep learning techniques to classify poplar,tung,and balsa woods,and PVA,nano-silica-sol and PVA-nano silica sol modified woods of poplar.The results show that BACNN achieves an accuracy of 99.3%on the test set,higher than the 52.9%of the BP neural network and 98.7%of Support Vector Machine compared with traditional machine learning methods and deep learning based methods;it is also higher than the 97.6%of LeNet,98.7%of AlexNet and 99.1%of VGGNet-11.Therefore,the classification method proposed offers potential applications in wood classification,especially with homogeneous modified wood,and it also provides a basis for subsequent wood properties studies.展开更多
Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based...Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based on these bilinear equations, some exact solutions to the three modified equations are derived.展开更多
We study dark localized waves within a nonlinear system based on the Boussinesq approximation,describing the dynamics of shallow water waves.Employing symbolic calculus,we apply the Hirota bilinear method to transform...We study dark localized waves within a nonlinear system based on the Boussinesq approximation,describing the dynamics of shallow water waves.Employing symbolic calculus,we apply the Hirota bilinear method to transform an extended Boussinesq system into a bilinear form,and then use the multiple rogue wave method to obtain its dark rational solutions.Exploring the first-and second-order dark solutions,we examine the conditions under which these localized solutions exist and their spatiotemporal distributions.Through the selection of various parameters and by utilizing different visualization techniques(intensity distributions and contour plots),we explore the dynamical properties of dark solutions found:in particular,the first-and second-order dark rogue waves.We also explore the methods of their control.The findings presented here not only deepen the understanding of physical phenomena described by the(1+1)-dimensional Boussinesq equation,but also expand avenues for further research.Our method can be extended to other nonlinear systems,to conceivably obtain higher-order dark rogue waves.展开更多
The estimation of residual displacements in a structure due to an anticipated earthquake event has increasingly become an important component of performance-based earthquake engineering because controlling these displ...The estimation of residual displacements in a structure due to an anticipated earthquake event has increasingly become an important component of performance-based earthquake engineering because controlling these displacements plays an important role in ensuring cost-feasible or cost-effective repairs in a damaged structure after the event.An attempt is made in this study to obtain statistical estimates of constant-ductility residual displacement spectra for bilinear and pinching oscillators with 5%initial damping,directly in terms of easily available seismological,site,and model parameters.None of the available models for the bilinear and pinching oscillators are useful when design spectra for a seismic hazard at a site are not available.The statistical estimates of a residual displacement spectrum are proposed in terms of earthquake magnitude,epicentral distance,site geology parameter,and three model parameters for a given set of ductility demand and a hysteretic energy capacity coefficient in the case of bilinear and pinching models,as well as for a given set of pinching parameters for displacement and strength at the breakpoint in the case of pinching model alone.The proposed scaling model is applicable to horizontal ground motions in the western U.S.for earthquake magnitudes less than 7 or epicentral distances greater than 20 km.展开更多
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov...Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads.展开更多
Based on the Hirota bilinear method,this study derived N-soliton solutions,breather solutions,lump solutions and interaction solutions for the(2+1)-dimensional extended Boiti-Leon-Manna-Pempinelli equation.The dynamic...Based on the Hirota bilinear method,this study derived N-soliton solutions,breather solutions,lump solutions and interaction solutions for the(2+1)-dimensional extended Boiti-Leon-Manna-Pempinelli equation.The dynamical characteristics of these solutions were displayed through graphical,particularly revealing fusion and ssion phenomena in the interaction of lump and the one-stripe soliton.展开更多
This paper explores model order reduction(MOR)methods for discrete linear and discrete bilinear systems via discrete pulse orthogonal functions(DPOFs).Firstly,the discrete linear systems and the discrete bilinear syst...This paper explores model order reduction(MOR)methods for discrete linear and discrete bilinear systems via discrete pulse orthogonal functions(DPOFs).Firstly,the discrete linear systems and the discrete bilinear systems are expanded in the space spanned by DPOFs,and two recurrence formulas for the expansion coefficients of the system’s state variables are obtained.Then,a modified Arnoldi process is applied to both recurrence formulas to construct the orthogonal projection matrices,by which the reduced-order systems are obtained.Theoretical analysis shows that the output variables of the reducedorder systems can match a certain number of the expansion coefficients of the original system’s output variables.Finally,two numerical examples illustrate the feasibility and effectiveness of the proposed methods.展开更多
In this paper, some exact solutions of the (3 + 1)-dimensional variable-coefficient Yu-Toda-Sasa-Fukuyama equation are investigated. By using Hirota’s direct method and symbolic computation, we obtained N-soliton sol...In this paper, some exact solutions of the (3 + 1)-dimensional variable-coefficient Yu-Toda-Sasa-Fukuyama equation are investigated. By using Hirota’s direct method and symbolic computation, we obtained N-soliton solution. By using the long wave limit method, the N-order rational solution can be obtained from N-order soliton solution. Then, through the paired complexification of parameters, the lump solution is obtained from N-order rational solution. Meanwhile, we obtained a hybrid solution between 1-lump solution and N-soliton (N=1,2) by using the long wave limit method and parameter complex. Furthermore, four different sets of three-dimensional graphs of solitons, lump solutions and hybrid solutions are drawn by selecting four different sets of coefficient functions which include one set of constant coefficient function and three sets of variable coefficient functions.展开更多
In this paper, the evolutionary behavior of N-solitons for a (2 + 1)-dimensional Konopelchenko-Dubrovsky equations is studied by using the Hirota bilinear method and the long wave limit method. Based on the N-soliton ...In this paper, the evolutionary behavior of N-solitons for a (2 + 1)-dimensional Konopelchenko-Dubrovsky equations is studied by using the Hirota bilinear method and the long wave limit method. Based on the N-soliton solution, we first study the evolution from N-soliton to T-order (T=1,2) breather wave solutions via the paired-complexification of parameters, and then we get the N-order rational solutions, M-order (M=1,2) lump solutions, and the hybrid behavior between a variety of different types of solitons combined with the parameter limit technique and the paired-complexification of parameters. Meanwhile, we also provide a large number of three-dimensional figures in order to better show the degeneration of the N-soliton and the interaction behavior between different N-solitons.展开更多
Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear ...Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational.展开更多
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o...To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.展开更多
Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite ...Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite field Ze, Algehawi and Samsudin presented recently an Identity Based Encryption (IBE) scheme. In this paper, we showed their proposal is not as secure as they chimed. More specifically, we presented a concrete attack on the scheme of Algehawi and Samsudin, which indicated the scheme cannot be consolidated as a real altemative of IBE schemes since one can exploit the semi group property (bilinearity) of extended Chebyshev polynomials over Zp to implement the attack without any difficulty.展开更多
In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/ser...In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols.展开更多
A (2+1)-dimensional KdV equation is obtained by use of Hirota method, which possesses N-soliton solution, specially its exact two-soliton solution is presented. By employing a proper algebraic transformation and th...A (2+1)-dimensional KdV equation is obtained by use of Hirota method, which possesses N-soliton solution, specially its exact two-soliton solution is presented. By employing a proper algebraic transformation and the Riccati equation, a type of hell-shape soliton solutions are produced via regarding the variable in the Riccati equation as the independent variable. Finally, we extend the above (2+1)-dimensional KdV equation into (3+1)-dimensional equation, the two-soliton solutions are given.展开更多
To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggre...To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing ê computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation.展开更多
Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or p...Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or public clouds. Mu tual authentication protocol among entities in the IntraCloud and InterCloud is proposed. Blind signature and bilinear mapping of automorphism groups are adopted to achieve the InterCloud Alli anceAuthentication, which overcome the complexi ty of certificate transmission and the problem of communication bottlenecks that happen in tradi tional certificatebased scheme. Blind key, instead of private key, is adopted for register, which avoids展开更多
Ring signcryption enables a user to send a message confidentially and authentically to a specific receiver in an anonymous way.One of the main reasons for the slow adoption of identity-based cryptography is the inhere...Ring signcryption enables a user to send a message confidentially and authentically to a specific receiver in an anonymous way.One of the main reasons for the slow adoption of identity-based cryptography is the inherent key escrow problem.In this paper a new certificateless ring signcryption scheme from pairings is presented.It is escrow free in that no KGC is able to decrypt ciphertexts itself.We then formally prove the security of the new scheme in the random oracle model IND-CCA2 and EUF-CMA.展开更多
In this paper,the sliding-mode control of a bilinear system is studied. It improves the dynamicresponse of the closedweloop system around the original point and is rather robust to the bounded disturbance. At last,the...In this paper,the sliding-mode control of a bilinear system is studied. It improves the dynamicresponse of the closedweloop system around the original point and is rather robust to the bounded disturbance. At last,the model of an ammonia synthesis reactor is adopted to illustrate the phenomenon described.展开更多
基金This study was supported by the Fundamental Research Funds for the Central Universities(No.2572023DJ02).
文摘Effective development and utilization of wood resources is critical.Wood modification research has become an integral dimension of wood science research,however,the similarities between modified wood and original wood render it challenging for accurate identification and classification using conventional image classification techniques.So,the development of efficient and accurate wood classification techniques is inevitable.This paper presents a one-dimensional,convolutional neural network(i.e.,BACNN)that combines near-infrared spectroscopy and deep learning techniques to classify poplar,tung,and balsa woods,and PVA,nano-silica-sol and PVA-nano silica sol modified woods of poplar.The results show that BACNN achieves an accuracy of 99.3%on the test set,higher than the 52.9%of the BP neural network and 98.7%of Support Vector Machine compared with traditional machine learning methods and deep learning based methods;it is also higher than the 97.6%of LeNet,98.7%of AlexNet and 99.1%of VGGNet-11.Therefore,the classification method proposed offers potential applications in wood classification,especially with homogeneous modified wood,and it also provides a basis for subsequent wood properties studies.
基金supported by the National Natural Science Foundation of China (Grant Nos. 11931017 and 12071447)。
文摘Three modified sine-Hilbert(sH)-type equations, i.e., the modified sH equation, the modified damped sH equation, and the modified nonlinear dissipative system, are proposed, and their bilinear forms are provided.Based on these bilinear equations, some exact solutions to the three modified equations are derived.
基金supported by the National Natural Science Foundation of China(Grant No.62275176)the Natural Science Foundation of Guangdong Province,China(Grant No.2022A1515010084)+1 种基金Key projects of basic research and applied basic research in universities of Guangdong province,China(Grant Nos.2021ZDZX1118 and 2022ZDZX1079)supported by the NPRP 13S-0121-200126 project with the Qatar National Research Fund(a member of Qatar Foundation)。
文摘We study dark localized waves within a nonlinear system based on the Boussinesq approximation,describing the dynamics of shallow water waves.Employing symbolic calculus,we apply the Hirota bilinear method to transform an extended Boussinesq system into a bilinear form,and then use the multiple rogue wave method to obtain its dark rational solutions.Exploring the first-and second-order dark solutions,we examine the conditions under which these localized solutions exist and their spatiotemporal distributions.Through the selection of various parameters and by utilizing different visualization techniques(intensity distributions and contour plots),we explore the dynamical properties of dark solutions found:in particular,the first-and second-order dark rogue waves.We also explore the methods of their control.The findings presented here not only deepen the understanding of physical phenomena described by the(1+1)-dimensional Boussinesq equation,but also expand avenues for further research.Our method can be extended to other nonlinear systems,to conceivably obtain higher-order dark rogue waves.
文摘The estimation of residual displacements in a structure due to an anticipated earthquake event has increasingly become an important component of performance-based earthquake engineering because controlling these displacements plays an important role in ensuring cost-feasible or cost-effective repairs in a damaged structure after the event.An attempt is made in this study to obtain statistical estimates of constant-ductility residual displacement spectra for bilinear and pinching oscillators with 5%initial damping,directly in terms of easily available seismological,site,and model parameters.None of the available models for the bilinear and pinching oscillators are useful when design spectra for a seismic hazard at a site are not available.The statistical estimates of a residual displacement spectrum are proposed in terms of earthquake magnitude,epicentral distance,site geology parameter,and three model parameters for a given set of ductility demand and a hysteretic energy capacity coefficient in the case of bilinear and pinching models,as well as for a given set of pinching parameters for displacement and strength at the breakpoint in the case of pinching model alone.The proposed scaling model is applicable to horizontal ground motions in the western U.S.for earthquake magnitudes less than 7 or epicentral distances greater than 20 km.
基金supported by Teaching Reform Project of Shenzhen University of Technology under Grant No.20231016.
文摘Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads.
基金Supported by the National Natural Science Foundation of China(12275172)。
文摘Based on the Hirota bilinear method,this study derived N-soliton solutions,breather solutions,lump solutions and interaction solutions for the(2+1)-dimensional extended Boiti-Leon-Manna-Pempinelli equation.The dynamical characteristics of these solutions were displayed through graphical,particularly revealing fusion and ssion phenomena in the interaction of lump and the one-stripe soliton.
基金supported by Natural Science Foundation of Xinjiang Uygur Autonomous Region of China“Research on model order reduction methods based on the discrete orthogonal polynomials”(2023D01C163)The Tianchi Talent Introduction Plan Project of Xinjiang Uygur Autonomous Region of China“Research on orthogonal decomposition model order reduction methods for discrete control systems”.
文摘This paper explores model order reduction(MOR)methods for discrete linear and discrete bilinear systems via discrete pulse orthogonal functions(DPOFs).Firstly,the discrete linear systems and the discrete bilinear systems are expanded in the space spanned by DPOFs,and two recurrence formulas for the expansion coefficients of the system’s state variables are obtained.Then,a modified Arnoldi process is applied to both recurrence formulas to construct the orthogonal projection matrices,by which the reduced-order systems are obtained.Theoretical analysis shows that the output variables of the reducedorder systems can match a certain number of the expansion coefficients of the original system’s output variables.Finally,two numerical examples illustrate the feasibility and effectiveness of the proposed methods.
文摘In this paper, some exact solutions of the (3 + 1)-dimensional variable-coefficient Yu-Toda-Sasa-Fukuyama equation are investigated. By using Hirota’s direct method and symbolic computation, we obtained N-soliton solution. By using the long wave limit method, the N-order rational solution can be obtained from N-order soliton solution. Then, through the paired complexification of parameters, the lump solution is obtained from N-order rational solution. Meanwhile, we obtained a hybrid solution between 1-lump solution and N-soliton (N=1,2) by using the long wave limit method and parameter complex. Furthermore, four different sets of three-dimensional graphs of solitons, lump solutions and hybrid solutions are drawn by selecting four different sets of coefficient functions which include one set of constant coefficient function and three sets of variable coefficient functions.
文摘In this paper, the evolutionary behavior of N-solitons for a (2 + 1)-dimensional Konopelchenko-Dubrovsky equations is studied by using the Hirota bilinear method and the long wave limit method. Based on the N-soliton solution, we first study the evolution from N-soliton to T-order (T=1,2) breather wave solutions via the paired-complexification of parameters, and then we get the N-order rational solutions, M-order (M=1,2) lump solutions, and the hybrid behavior between a variety of different types of solitons combined with the parameter limit technique and the paired-complexification of parameters. Meanwhile, we also provide a large number of three-dimensional figures in order to better show the degeneration of the N-soliton and the interaction behavior between different N-solitons.
基金Supported by the National Science Foundation for Young Scholars of China(61001091)~~
文摘Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational.
基金The National Natural Science Foundation of China(No.60473028)the Natural Science Foundation of Zhengzhou University of Light Industry(No.2006XXJ18)the Doctor Foundation of Zhengzhou University of Light Industry(No.20080014)
文摘To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.
基金Acknowledgements The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work was partically supported by National Natural Science Foundation of China under Crants No. 61172085, No. 61103221, No. 61133014, No. 11061130539 and No. 61021004.
文摘Chebyshev polynomials are used as a reservoir for generating intricate classes of symmetrical and chaotic pattems, and have been used in a vast anaount of applications. Using extended Chebyshev polynomial over finite field Ze, Algehawi and Samsudin presented recently an Identity Based Encryption (IBE) scheme. In this paper, we showed their proposal is not as secure as they chimed. More specifically, we presented a concrete attack on the scheme of Algehawi and Samsudin, which indicated the scheme cannot be consolidated as a real altemative of IBE schemes since one can exploit the semi group property (bilinearity) of extended Chebyshev polynomials over Zp to implement the attack without any difficulty.
基金Supported bythe National Natural Science Foundationof China (60225007 ,60572155) the Science and Technology ResearchProject of Shanghai (04DZ07067)
文摘In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols.
基金*The project supported by National Natural Science Foundation of China under Grant No. 10471139 and Hong Kong Research Grant Council under Grant No. HKBU/2016/03P
文摘A (2+1)-dimensional KdV equation is obtained by use of Hirota method, which possesses N-soliton solution, specially its exact two-soliton solution is presented. By employing a proper algebraic transformation and the Riccati equation, a type of hell-shape soliton solutions are produced via regarding the variable in the Riccati equation as the independent variable. Finally, we extend the above (2+1)-dimensional KdV equation into (3+1)-dimensional equation, the two-soliton solutions are given.
基金supported by the National Grand Fundamental Research 973 Program of China under Grant No.2011CB302903 the National Natural Science Foundation of China under Grants No.61073188,No.61073115+1 种基金 the Key University Science Research Project of Jiangsu Province under Grant No.11KJA520002 the Priority Academic Program Development of Jiangsu Higher Education Institutions under Grant No.yx002001
文摘To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing ê computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation.
基金the National Natural Science Foundation of China,the Innovation Group Project of Beijing Institute of Technology
文摘Security has been regarded as one of the hardest problems in the development of cloud computing. This paper proposes an AllianceAuthentication protocol among Hybrid Clouds that include multiple private clouds and/or public clouds. Mu tual authentication protocol among entities in the IntraCloud and InterCloud is proposed. Blind signature and bilinear mapping of automorphism groups are adopted to achieve the InterCloud Alli anceAuthentication, which overcome the complexi ty of certificate transmission and the problem of communication bottlenecks that happen in tradi tional certificatebased scheme. Blind key, instead of private key, is adopted for register, which avoids
基金supported by National Key Basic Research Program of China(973 program) under Grant No. 2011CB302903National Natural Science Foundation of China under Grant No.60873231,No.61073188+1 种基金China Postdoctoral Science Foundation under Grant No.20100471355Natural Science Foundation of Jiangsu Province under Grant No. BK2009426
文摘Ring signcryption enables a user to send a message confidentially and authentically to a specific receiver in an anonymous way.One of the main reasons for the slow adoption of identity-based cryptography is the inherent key escrow problem.In this paper a new certificateless ring signcryption scheme from pairings is presented.It is escrow free in that no KGC is able to decrypt ciphertexts itself.We then formally prove the security of the new scheme in the random oracle model IND-CCA2 and EUF-CMA.
文摘In this paper,the sliding-mode control of a bilinear system is studied. It improves the dynamicresponse of the closedweloop system around the original point and is rather robust to the bounded disturbance. At last,the model of an ammonia synthesis reactor is adopted to illustrate the phenomenon described.