The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a mess...The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient.展开更多
This paper describes the development of a T-year design tide hydrograph (DTH). A core innovation is that the proposed technique uses the design risk threshold and copula-based conditional risk probability to analyze...This paper describes the development of a T-year design tide hydrograph (DTH). A core innovation is that the proposed technique uses the design risk threshold and copula-based conditional risk probability to analyze the optimal combination of high waters and low waters of the DTH. A brief description of the method is presented. The in situ semi-diurnal tide data at the coast of Jiangsu Province in China are analyzed. Marginal distributions for high waters and low waters of tides are examined. Furthermore, the joint distributions, condition risk probabilities and risk thresholds of high waters and low waters are presented. Results of the DTH from the proposed method are compared with those from the traditional same-multiple enlarging design approach. It is demonstrated that the proposed method is preferable.展开更多
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient.
基金financially supported by the Ministry of Water Resources Special Funds for Scientific Research Projects of Public Welfare Industry(Grant No.201001070)Jiangsu Province Science and Technology(Grant Nos.BM2014397 and BM2016031)
文摘This paper describes the development of a T-year design tide hydrograph (DTH). A core innovation is that the proposed technique uses the design risk threshold and copula-based conditional risk probability to analyze the optimal combination of high waters and low waters of the DTH. A brief description of the method is presented. The in situ semi-diurnal tide data at the coast of Jiangsu Province in China are analyzed. Marginal distributions for high waters and low waters of tides are examined. Furthermore, the joint distributions, condition risk probabilities and risk thresholds of high waters and low waters are presented. Results of the DTH from the proposed method are compared with those from the traditional same-multiple enlarging design approach. It is demonstrated that the proposed method is preferable.