Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are const...Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are constructed from bilinear pairings, a powerful but computationally expensive primitive. Hence, ID-based ring signature without pairing is of great interest in the field of cryptography. In this paper, the authors firstly propose an ID-based ring signature scheme based on quadratic residues. The proposed scheme is proved to be existentially unforgeable against adaptive chosen message-and-identity attack under the random oracle model, assuming the hardness of factoring. The proposed scheme is more efficient than those which are constructed from bilinear pairings.展开更多
Identity-based (ID-based) cryptography has drawn great concerns in recent years, and most of ID-based schemes are constructed from bilinear parings. Therefore, ID-based scheme without pairing is of great interest in...Identity-based (ID-based) cryptography has drawn great concerns in recent years, and most of ID-based schemes are constructed from bilinear parings. Therefore, ID-based scheme without pairing is of great interest in the field of cryptography. Up to now, there still remains a challenge to construct ID-based signature scheme from quadratic residues. Thus, we aim to meet this challenge by proposing a concrete scheme. In this paper, we first introduce the technique of how to calculate a 2^lth root of a quadratic residue, and then give a concrete ID-based signature scheme using such technique. We also prove that our scheme is chosen message and ID secure in the random oracle model, assuming the hardness of factoring.展开更多
Variable-weight optical orthogonal code (OOC) was introduced by G. C. Yang [IEEE Trans. Commun., 1996, 44: 47-55] for multimedia optical CDMA systems with multiple quality of service (QoS) requirements. In this p...Variable-weight optical orthogonal code (OOC) was introduced by G. C. Yang [IEEE Trans. Commun., 1996, 44: 47-55] for multimedia optical CDMA systems with multiple quality of service (QoS) requirements. In this paper, seven new infinite classes of optimal (v, {3,4,6}, 1, Q)-OOCs are constructed.展开更多
Acoustic structure study always is the academic research interest. Diffusion ab?sorbing structure(DiflFsorber) has good research value because it has both diflFusion property and sound absorption property. Quadrati...Acoustic structure study always is the academic research interest. Diffusion ab?sorbing structure(DiflFsorber) has good research value because it has both diflFusion property and sound absorption property. Quadratic residue diffusers(QRD) structure which had good diffusion property was combined with the perforated panel which had good sound absorption property in this study. According to standard AES-4id-2001, the diffusion experiments were carried out to study QRD structure and ones composited with perforated-panels which had1 mm-thickness and perforated percentage of 3%, 5%, 8% respectively. The polar coordinate diagrams of different structure were analyzed to derive the diffusion coefficients. Results showed that the composite structure still had good diffusion performance in the frequency range from100 Hz to 800 Hz. The reflection sound energy of composite structure reduced obviously in the perforated panel resonance frequency range where there was about 2 dB reduction averagely.The study result can provide the reference for the design and development of diifsorber.展开更多
In this paper, we prove a quantitative version of the statement that every nonempty finite subset of N+ is a set of quadratic residues for infinitely many primes of the form [nc] with 1 〈 c 〈 243/205. Corresponding...In this paper, we prove a quantitative version of the statement that every nonempty finite subset of N+ is a set of quadratic residues for infinitely many primes of the form [nc] with 1 〈 c 〈 243/205. Correspondingly, we can obtain a similar result for the case of quadratic non-residues under reasonable assumptions. These results generalize the previous ones obtained by Wright in certain aspects.展开更多
In this paper,we propose a doping approach to lower the error floor of Low-Density Parity-Check(LDPC)codes.The doping component is a short block code in which the information bits are selected from the coded bits of t...In this paper,we propose a doping approach to lower the error floor of Low-Density Parity-Check(LDPC)codes.The doping component is a short block code in which the information bits are selected from the coded bits of the dominant trapping sets of the LDPC code.Accordingly,an algorithm for selecting the information bits of the short code is proposed,and a specific two-stage decoding algorithm is presented.Simulation results demonstrate that the proposed doped LDPC code achieves up to 2.0 dB gain compared with the original LDPC code at a frame error rate of 10^(-6)Furthermore,the proposed design can lower the error floor of original LDPC Codes.展开更多
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However...The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.展开更多
The Diophantine equation X( X + 1 ) ( X + 2 ) ( X + 3 ) = 14Y( Y + 1 ) ( Y + 2 ) ( Y + 3 ) still remains open. Using recurrence sequence, Maple software, Pell equation and quadraric residue, this pap...The Diophantine equation X( X + 1 ) ( X + 2 ) ( X + 3 ) = 14Y( Y + 1 ) ( Y + 2 ) ( Y + 3 ) still remains open. Using recurrence sequence, Maple software, Pell equation and quadraric residue, this paper proved it has only two positive integer solutions, i. e., (X,Y) = (5,2) ,(7,3).展开更多
Let m ≥ 2 be any natural number and let be a finite non-chain ring, where and q is a prime power congruent to 1 modulo (m-1). In this paper we study duadic codes over the ring and their extensions. A Gray map from to...Let m ≥ 2 be any natural number and let be a finite non-chain ring, where and q is a prime power congruent to 1 modulo (m-1). In this paper we study duadic codes over the ring and their extensions. A Gray map from to is defined which preserves self duality of linear codes. As a consequence self-dual, formally self-dual and self-orthogonal codes over are constructed. Some examples are also given to illustrate this.展开更多
Let△(n)denote the smallest positive integer m such that a^(3)+a(1≤a≤n)are pairwise distinct modulo m.The purpose of this paper is to determine△(n)for all positive integers n.
Median noise barriers, like parallel noise barriers, can be employed to reduce the impact of traffic on roadside communities via the direct propagation path. The performance of different shapes of median barriers was ...Median noise barriers, like parallel noise barriers, can be employed to reduce the impact of traffic on roadside communities via the direct propagation path. The performance of different shapes of median barriers was compared using reactive and passive surfaces and a 2D boundary element method (BEM). In the case of reactive surfaces, quadratic residue diffusers (QRDs) and primitive root diffusers (PRDs) were used on the top and stem surfaces of median barriers. To introduce passive barriers, two different absorbent materials including fibrous material and a grass surface with flow resistivity of 20 000 and 2500 kg/(s·m2), respectively, were similarly applied. The effect of thin absorptive barriers was similar at lower frequencies and better at mid and high frequencies to that of their equivalent rigid barriers. More improvement was achieved by covering the top surface of thick barriers with grass rather than with fibrous material. The performance of QRD and PRD barriers where the diffuser was located on the top surface was more frequency dependent than that of barriers coated with fibrous material. A comparison of the average A-weighted insertion loss in the thick barriers showed that the greatest improvement (2.59 dB (A)) was achieved using a barrier of 30-cm thickness covered with grass.展开更多
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions.In addition,they have been deployed in civilian critical infrastructure monitoring.In this environm...Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions.In addition,they have been deployed in civilian critical infrastructure monitoring.In this environment,real-time and massive data is exchanged between the aerial vehicles and the ground control stations.Depending on the mission of these aerial vehicles,some of the collected and transmitted data is sensitive and private.Therefore,many security protocols have been presented to offer privacy and security protection.However,majority of these schemes fail to consider attack vectors such as side-channeling,de-synchronization and known secret session temporary information leakages.This last attack can be launched upon adversarial physical capture of these drones.In addition,some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high overheads.In this paper,an authentication protocol based on lightweight quadratic residues and hash functions is developed.Its formal security analysis is executed using the widely deployed random oracle model.In addition,informal security analysis is carried out to show its robustness under the Dolev–Yao(DY)and Canetti–Krawczyk(CK)threat models.In terms of operational efficiency,it is shown to have relatively lower execution time,communication costs,and incurs the least storage costs among other related protocols.Specifically,the proposed protocol provides a 25%improvement in supported security and privacy features and a 6.52%reduction in storage costs.In overall,the proposed methodology offers strong security and privacy protection at lower execution time,storage and communication overheads.展开更多
基金Supported by the National High Technology Research and Development Program of China (No. 2006AA01Z428)the National Natural Science Foundation of China ( No. 60673075)
文摘Identity-based (ID-based) ring signature has drawn great concerns in recent years and many ID-based ring signature schemes have been proposed until now. Unfortunately, all of these ID-based ring signatures are constructed from bilinear pairings, a powerful but computationally expensive primitive. Hence, ID-based ring signature without pairing is of great interest in the field of cryptography. In this paper, the authors firstly propose an ID-based ring signature scheme based on quadratic residues. The proposed scheme is proved to be existentially unforgeable against adaptive chosen message-and-identity attack under the random oracle model, assuming the hardness of factoring. The proposed scheme is more efficient than those which are constructed from bilinear pairings.
基金the National Natural Science Foundation of China(Grant Nos.60572155 and 60673079)the National High Technology DevelopmentProgram of China (Grant No.2006AA01Z424)the National Research Fund for the Doctoral Program of Higher Education of China(Grant No.20060248008)
文摘Identity-based (ID-based) cryptography has drawn great concerns in recent years, and most of ID-based schemes are constructed from bilinear parings. Therefore, ID-based scheme without pairing is of great interest in the field of cryptography. Up to now, there still remains a challenge to construct ID-based signature scheme from quadratic residues. Thus, we aim to meet this challenge by proposing a concrete scheme. In this paper, we first introduce the technique of how to calculate a 2^lth root of a quadratic residue, and then give a concrete ID-based signature scheme using such technique. We also prove that our scheme is chosen message and ID secure in the random oracle model, assuming the hardness of factoring.
基金The authors wish to thank the anonymous referees for their comments and suggestions that improved the quality of this paper. This work was supported in part by the National Natural Science Foundation of China (Crant No. 11271089), Guangxi Science Foundation (Crant No. 2012GXNSFAA053001), and the Foundation of Cuangxi Education Department (No. 201202ZD012).
文摘Variable-weight optical orthogonal code (OOC) was introduced by G. C. Yang [IEEE Trans. Commun., 1996, 44: 47-55] for multimedia optical CDMA systems with multiple quality of service (QoS) requirements. In this paper, seven new infinite classes of optimal (v, {3,4,6}, 1, Q)-OOCs are constructed.
基金supported by the National Natural Science Foundation of China(11004133)open project of China communication and transportation industry key laboratory of environmental technology
文摘Acoustic structure study always is the academic research interest. Diffusion ab?sorbing structure(DiflFsorber) has good research value because it has both diflFusion property and sound absorption property. Quadratic residue diffusers(QRD) structure which had good diffusion property was combined with the perforated panel which had good sound absorption property in this study. According to standard AES-4id-2001, the diffusion experiments were carried out to study QRD structure and ones composited with perforated-panels which had1 mm-thickness and perforated percentage of 3%, 5%, 8% respectively. The polar coordinate diagrams of different structure were analyzed to derive the diffusion coefficients. Results showed that the composite structure still had good diffusion performance in the frequency range from100 Hz to 800 Hz. The reflection sound energy of composite structure reduced obviously in the perforated panel resonance frequency range where there was about 2 dB reduction averagely.The study result can provide the reference for the design and development of diifsorber.
基金Supported by National Natural Science Foundation of China (Grant No. 11171265)the Fundamental Research Funds for the Central Universities
文摘In this paper, we prove a quantitative version of the statement that every nonempty finite subset of N+ is a set of quadratic residues for infinitely many primes of the form [nc] with 1 〈 c 〈 243/205. Correspondingly, we can obtain a similar result for the case of quadratic non-residues under reasonable assumptions. These results generalize the previous ones obtained by Wright in certain aspects.
基金supported in part by China NSF under Grants No.61771081 and 62072064the Fundamental Research Funds for the Central Universities(China)under Grant cstc2019jcyjmsxmX0110+2 种基金the Project of Chongqing Natural Science Foundation under Grant CSTB2022NSCQ-MSX0990Science and Technology Research Project of Chongqing Education Commission under Grant KJQN202000612the Venture and Innovation Support Program for Chongqing Overseas Returnees under Grant cx2020070.
文摘In this paper,we propose a doping approach to lower the error floor of Low-Density Parity-Check(LDPC)codes.The doping component is a short block code in which the information bits are selected from the coded bits of the dominant trapping sets of the LDPC code.Accordingly,an algorithm for selecting the information bits of the short code is proposed,and a specific two-stage decoding algorithm is presented.Simulation results demonstrate that the proposed doped LDPC code achieves up to 2.0 dB gain compared with the original LDPC code at a frame error rate of 10^(-6)Furthermore,the proposed design can lower the error floor of original LDPC Codes.
基金Rising-Star Program of Shanghai 2023 Science and Technology Innovation Action Plan(Yangfan Special Project),China(No.23YF1401000)Fundamental Research Funds for the Central Universities,China(No.2232022D-25)。
文摘The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme.
基金The Natural Science Foundation of Chongqing University of Post and Telecommunications (No.A2008-40)
文摘The Diophantine equation X( X + 1 ) ( X + 2 ) ( X + 3 ) = 14Y( Y + 1 ) ( Y + 2 ) ( Y + 3 ) still remains open. Using recurrence sequence, Maple software, Pell equation and quadraric residue, this paper proved it has only two positive integer solutions, i. e., (X,Y) = (5,2) ,(7,3).
文摘Let m ≥ 2 be any natural number and let be a finite non-chain ring, where and q is a prime power congruent to 1 modulo (m-1). In this paper we study duadic codes over the ring and their extensions. A Gray map from to is defined which preserves self duality of linear codes. As a consequence self-dual, formally self-dual and self-orthogonal codes over are constructed. Some examples are also given to illustrate this.
文摘Let△(n)denote the smallest positive integer m such that a^(3)+a(1≤a≤n)are pairwise distinct modulo m.The purpose of this paper is to determine△(n)for all positive integers n.
基金Project (No.8707) supported by the Tehran University of Medical Sciences,Iran
文摘Median noise barriers, like parallel noise barriers, can be employed to reduce the impact of traffic on roadside communities via the direct propagation path. The performance of different shapes of median barriers was compared using reactive and passive surfaces and a 2D boundary element method (BEM). In the case of reactive surfaces, quadratic residue diffusers (QRDs) and primitive root diffusers (PRDs) were used on the top and stem surfaces of median barriers. To introduce passive barriers, two different absorbent materials including fibrous material and a grass surface with flow resistivity of 20 000 and 2500 kg/(s·m2), respectively, were similarly applied. The effect of thin absorptive barriers was similar at lower frequencies and better at mid and high frequencies to that of their equivalent rigid barriers. More improvement was achieved by covering the top surface of thick barriers with grass rather than with fibrous material. The performance of QRD and PRD barriers where the diffuser was located on the top surface was more frequency dependent than that of barriers coated with fibrous material. A comparison of the average A-weighted insertion loss in the thick barriers showed that the greatest improvement (2.59 dB (A)) was achieved using a barrier of 30-cm thickness covered with grass.
文摘Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions.In addition,they have been deployed in civilian critical infrastructure monitoring.In this environment,real-time and massive data is exchanged between the aerial vehicles and the ground control stations.Depending on the mission of these aerial vehicles,some of the collected and transmitted data is sensitive and private.Therefore,many security protocols have been presented to offer privacy and security protection.However,majority of these schemes fail to consider attack vectors such as side-channeling,de-synchronization and known secret session temporary information leakages.This last attack can be launched upon adversarial physical capture of these drones.In addition,some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high overheads.In this paper,an authentication protocol based on lightweight quadratic residues and hash functions is developed.Its formal security analysis is executed using the widely deployed random oracle model.In addition,informal security analysis is carried out to show its robustness under the Dolev–Yao(DY)and Canetti–Krawczyk(CK)threat models.In terms of operational efficiency,it is shown to have relatively lower execution time,communication costs,and incurs the least storage costs among other related protocols.Specifically,the proposed protocol provides a 25%improvement in supported security and privacy features and a 6.52%reduction in storage costs.In overall,the proposed methodology offers strong security and privacy protection at lower execution time,storage and communication overheads.