期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Colluding attacks on a group signature scheme 被引量:1
1
作者 郭兴阳 唐朝京 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第10期1011-1014,共4页
Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two... Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure. We show that some parameters should be carefully selected in the scheme to resist our attacks. 展开更多
关键词 Group signature colluding attack Factoring problem
下载PDF
Secure resource allocation against colluding eavesdropping in a user-centric cell-free massive multiple-input multiple-output system
2
作者 Na LI Yuanyuan GAO +4 位作者 Kui XU Xiaochen XIA Huazhi HU Yang LI Yueyue ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第4期500-512,共13页
We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of li... We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of limited pilot resources,a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation.Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers,based on the local partial zero-forcing precoding scheme,a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency.Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security. 展开更多
关键词 CELL-FREE colluding eavesdropping Limited pilot resources Access point selection Security rate
原文传递
Statistical Analysis of a Class of Secure Relay Assisted Cognitive Radio Networks 被引量:1
3
作者 Mona Shokair Waleed Saad Shady M.Ibraheem 《China Communications》 SCIE CSCD 2018年第12期174-189,共16页
In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward r... In this paper, the problem of communication security in an underlay wiretap cognitive radio network is addressed and statistically investigated. We rely on a simple dual-hop communication model of decode and forward relay assisted network. Regarding the interference from primary users, interference power and maximum transmit power constraints; this network is subjected to multiple eavesdropping attacks which employ a specific interception strategy. To confound this eavesdropping, proposed selection schemes are exploited that aim at maximizing the minimum of the dual secrecy rates in order to strengthen the physical layer security. Moreover, exact and asymptotic closed form expressions are derived for specific performance metrics over independent and identically distributed Rayleigh fading channels. At high signal to interference noise ratio(SINR), tangential system bounds are also derived and discussed. Monte Carlo simulation results emphasize our assumption. It is found out that at the full diversity of the system, any additional node that enters the cooperative eavesdropping system becomes significantly of no effect. 展开更多
关键词 RELAY selection non-colluding or colluding eavesdroppers OUTAGE PROBABILITY SECRECY rate power constraints.
下载PDF
A Group-Based Fingerprinting Scheme for Digital Wholesale and Retail 被引量:1
4
作者 ZHAO Yong ZHANG Aixin LU Songnian 《China Communications》 SCIE CSCD 2014年第10期126-135,共10页
Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially ... Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially against group colluding attack. The group tracing is neglected in previous works. In this paper, we propose a novel multimedia group fingerprint to trace malicious middlemen along with customers. We explore the quality of the non degenerate linear shift register sequence (NDLSRS) which is convenient in group initialization and management. The theoretic analysis and simulation experiment results show that NDLSRS has good resistance against attacks from colluding groups/ members even after its volume expanded. 展开更多
关键词 Group fingerprint non-degeneratelinear shift register sequence wholesale andretail group colluding attack
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部