Group Key Agreement(GKA)is a cryptographic primitive allowing two or more entities to negotiate a shared session key over public networks.In existing GKA models,it is an open problem to construct a one-round multi-par...Group Key Agreement(GKA)is a cryptographic primitive allowing two or more entities to negotiate a shared session key over public networks.In existing GKA models,it is an open problem to construct a one-round multi-party GKA protocol.Wu et al.recently proposed the concept of asymmetric group key agreement(ASGKA)and realized a one-round ASGKA protocol,which affirmatively answers the above open problem in a relaxed way.However,the ASGKA protocol only applies to static groups.To fill this gap,this paper proposes an extended ASGKA protocol based on the Wu et al.protocol.The extension allows any member to join and leave at any point,provided that the resulting group size is not greater than n.To validate the proposal,extensive experiments are performed and the experimental results show that our protocol is more effective than a plain realization of the Wu et al.protocol for dynamic groups.The extended protocol is also more efficient than the up-to-date dynamic GKA protocol in terms of communication and computation.展开更多
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi...The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure.展开更多
In this paper we present systematic differential representations for the dynamical group SO(4).Theserepresentations include the left and the right differential representations and the left and the right adjoint differ...In this paper we present systematic differential representations for the dynamical group SO(4).Theserepresentations include the left and the right differential representations and the left and the right adjoint differentialrepresentations in both the group parameter space and its coset spaces.They are the generalization of the differentialrepresentations of the SO(3) rotation group in the Euler angles.These representations may find their applications in thestudy of the physical systems with SO(4) dynamical symmetry.展开更多
Secret-sharing is a common method to protect important data, such as the private key of a public-key system. Dynamic Group Secret-sharing (DGS) is a system where all of the members in a group hold a subsecret of the k...Secret-sharing is a common method to protect important data, such as the private key of a public-key system. Dynamic Group Secret-sharing (DGS) is a system where all of the members in a group hold a subsecret of the key information and where the number of members in the group is variable. This kind of secret-sharing is broadly used in many special distribution systems, such as Self-secure Ad-hoc Network. Distributing this subsecret to a new member when he enters the group is the common method that ensures all the members participate in the same secret-sharing. However, no’atisfactory subsecret distribution scheme exists at present. This paper proposes a new protocol that tries to satisfy both security and efficiency.展开更多
In this paper, a new dynamic group signature scheme is proposed. It allows the group manager to increase or delete group members flexibly. Furthermore, the length of group signatures, as well as the computational effo...In this paper, a new dynamic group signature scheme is proposed. It allows the group manager to increase or delete group members flexibly. Furthermore, the length of group signatures, as well as the computational effort for signing, verifying and opening are very small and independent of the number of group members and deleted group members. So it is efficient.展开更多
Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of pr...Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.展开更多
This paper analyses the game model between the individual and the group that has the characteristics of Stackelberg model in traditional game theory and replicator dynamic model in evolutionary game theory. In the fir...This paper analyses the game model between the individual and the group that has the characteristics of Stackelberg model in traditional game theory and replicator dynamic model in evolutionary game theory. In the first phase of game, the bounded rationality group players adopt the replicator dynamic behavior. Secondly, the full rationality individual player decides the own response function by the strategies distribution of group players. The shortsighted individual player will take the risk-dominant strategy. This model has some unique characteristics.展开更多
At zero temperature, based on the Ising model, the phase transition in a two-dimensional square lattice is studied using the generalized zero-temperature Glauber dynamics. Using Monte Carlo (MC) renormalization grou...At zero temperature, based on the Ising model, the phase transition in a two-dimensional square lattice is studied using the generalized zero-temperature Glauber dynamics. Using Monte Carlo (MC) renormalization group methods, the static critical exponents and the dynamic exponent are studied; the type of phase transition is found to be of the first order.展开更多
A forward-secure group signature(FSGS)ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the current time period.As we know,traditional FSGS schemes are mostly rel...A forward-secure group signature(FSGS)ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the current time period.As we know,traditional FSGS schemes are mostly relying on number-theoretic assumptions unable to resist quantum attacks.Therefore,we present an efficient lattice-based fully dynamic(ie.users can flexibly join or quit the group)forward-secure group signature(DFSGS)by combining an improved version of FSGS scheme proposed by Ling.Based on an efficient zero-knowledge argument,we construct argument of knowledge of the committed value and the plaintext that help with privacy protection.Our DFSGS scheme is proved to be anonymous and forward-secure traceable relying on short integer solution and learning with errors assumptions in random oracle model.Moreover,the lengths of group public key and signature of our DFSGS scheme have been improved,and the length of user secret key has no connection with the quantity of group members.展开更多
P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved b...P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.展开更多
There is cult leader who has not studied the psychology in a systematic way, but he is very good at using some psychology principles to capture a large number of believers and to make them follow him with their whole ...There is cult leader who has not studied the psychology in a systematic way, but he is very good at using some psychology principles to capture a large number of believers and to make them follow him with their whole hearts. This article takes the need theory, the psychological frustration theory, the cognitive process theory and the theory of group psychological motivation as the principles, and obtaining the event in the actual struggle with the cult, the author reveals how the cult sets up the swindle with these theories and how the cult organization is developed fast and how to control cult believers and how they provide a service to themselves. The writers argue that when the cult leader crazily steals the psychological theory to deceive others and murder others and to loot money, we also should wave the psychological sword, and should use the psychological theory and methods against the cult to rescue the practitioners captured by cults, and the article also provides a strategy and method which can be a reference.展开更多
In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit le...In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit level is carried out.The keystream generated by logistic map is related to the plain-image,which confuses the relationship between the plain-image and the cipher-image.The computer simulation results of statistical analysis,information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application.展开更多
The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which ...The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which was obtained by combining the ElGamal encryption scheme with the ElGamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy(PFS)and key independence(KI)were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks.展开更多
Message-dependent opening is one of the solutions to solve the problem of the tracing manager owns excessive power.In this paper,we present a new lattice-based fully dynamic group signature scheme with message-depende...Message-dependent opening is one of the solutions to solve the problem of the tracing manager owns excessive power.In this paper,we present a new lattice-based fully dynamic group signature scheme with message-dependent opening by combining an improved version of the fully dynamic group signature scheme proposed by Ling et al and the double encryption paradigm.In addition,we propose an improved underlying zero knowledge protocol,it has a soundness error 1 max(n,p)+1 that is better than the Stern-like protocol,which helps to bring down the communication complexity of the protocol and hence the signature scheme.Our scheme constrains the power of group managers by adding an admitter,and the signature size has a logarithmic relationship with the group size.展开更多
In this paper.we discuss Lagrangian vector field on Kahler manifold and use it to describe and solve some problem in Newtonican and Lagrangian Mechanics on Kahler Manifold.
In the decision-making process,the decision information provided by decision makers over alter-natives may take the form of intuitionistic fuzzy numbers and come from different periods.The weight of information on dec...In the decision-making process,the decision information provided by decision makers over alter-natives may take the form of intuitionistic fuzzy numbers and come from different periods.The weight of information on decision makers,criteria,periods is usually completely unknown.To this issue,we first utilise hesitation degree information and introduce the concept of confi-dence degree function to determine the decision maker’s weights.Then we aggregate individual evaluation information into group evaluation information through intuitionistic fuzzy number weighted arithmetic averaging operator.We construct a nonlinear optimisation model to gain the criterion weights and apply the aggregate operator to gain the integrated rating value of alternatives in different periods,calculating the deviations of the integrated rating values with respect to their average.Then the period weights are been obtained by using the entropy method.According to the closeness coefficient between alternatives and ideal solution to sort the alternatives and select the optimal one.展开更多
基金National Natural Science Foundation of China under Grant No. 60970116,60970115 and 90718006
文摘Group Key Agreement(GKA)is a cryptographic primitive allowing two or more entities to negotiate a shared session key over public networks.In existing GKA models,it is an open problem to construct a one-round multi-party GKA protocol.Wu et al.recently proposed the concept of asymmetric group key agreement(ASGKA)and realized a one-round ASGKA protocol,which affirmatively answers the above open problem in a relaxed way.However,the ASGKA protocol only applies to static groups.To fill this gap,this paper proposes an extended ASGKA protocol based on the Wu et al.protocol.The extension allows any member to join and leave at any point,provided that the resulting group size is not greater than n.To validate the proposal,extensive experiments are performed and the experimental results show that our protocol is more effective than a plain realization of the Wu et al.protocol for dynamic groups.The extended protocol is also more efficient than the up-to-date dynamic GKA protocol in terms of communication and computation.
基金The National Natural Science Foundation of China (No60403027)
文摘The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure.
基金National Natural Science Foundation of China under Grant Nos.10205007,10226033,10375039,and 90503008the Nuclear Theory Research Program for NCET and Fund of HIRFL of China
文摘In this paper we present systematic differential representations for the dynamical group SO(4).Theserepresentations include the left and the right differential representations and the left and the right adjoint differentialrepresentations in both the group parameter space and its coset spaces.They are the generalization of the differentialrepresentations of the SO(3) rotation group in the Euler angles.These representations may find their applications in thestudy of the physical systems with SO(4) dynamical symmetry.
文摘Secret-sharing is a common method to protect important data, such as the private key of a public-key system. Dynamic Group Secret-sharing (DGS) is a system where all of the members in a group hold a subsecret of the key information and where the number of members in the group is variable. This kind of secret-sharing is broadly used in many special distribution systems, such as Self-secure Ad-hoc Network. Distributing this subsecret to a new member when he enters the group is the common method that ensures all the members participate in the same secret-sharing. However, no’atisfactory subsecret distribution scheme exists at present. This paper proposes a new protocol that tries to satisfy both security and efficiency.
基金Supported by the Scientific Research Plan Projectof the Education Department of Shaanxi Province (06JK197)
文摘In this paper, a new dynamic group signature scheme is proposed. It allows the group manager to increase or delete group members flexibly. Furthermore, the length of group signatures, as well as the computational effort for signing, verifying and opening are very small and independent of the number of group members and deleted group members. So it is efficient.
基金Supported by the National Natural Science Foun-dation of China (90104005 ,60473023) the National High Tech-nology Research and Development Programof China (863 Program)(2002AA41051)
文摘Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.
基金The paper was supported by 'Excellent Innovative Research Group Funds Project from National Science Foundation (Ratifying No. 7012001)' and the National Nature Science Foundation (Ratifying No. 70371038) .
文摘This paper analyses the game model between the individual and the group that has the characteristics of Stackelberg model in traditional game theory and replicator dynamic model in evolutionary game theory. In the first phase of game, the bounded rationality group players adopt the replicator dynamic behavior. Secondly, the full rationality individual player decides the own response function by the strategies distribution of group players. The shortsighted individual player will take the risk-dominant strategy. This model has some unique characteristics.
文摘At zero temperature, based on the Ising model, the phase transition in a two-dimensional square lattice is studied using the generalized zero-temperature Glauber dynamics. Using Monte Carlo (MC) renormalization group methods, the static critical exponents and the dynamic exponent are studied; the type of phase transition is found to be of the first order.
基金This work is supported by the Major Program of Guangdong Basic and Applied Research(2019B030302008)National Natural Science Foundation of China(61872152)Science and Technology Program of Guangzhou(201902010081)。
文摘A forward-secure group signature(FSGS)ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the current time period.As we know,traditional FSGS schemes are mostly relying on number-theoretic assumptions unable to resist quantum attacks.Therefore,we present an efficient lattice-based fully dynamic(ie.users can flexibly join or quit the group)forward-secure group signature(DFSGS)by combining an improved version of FSGS scheme proposed by Ling.Based on an efficient zero-knowledge argument,we construct argument of knowledge of the committed value and the plaintext that help with privacy protection.Our DFSGS scheme is proved to be anonymous and forward-secure traceable relying on short integer solution and learning with errors assumptions in random oracle model.Moreover,the lengths of group public key and signature of our DFSGS scheme have been improved,and the length of user secret key has no connection with the quantity of group members.
基金supported in part by National Basic Research Program of China ("973 Program") under contract No.2007CB311106in part by the Special Funds for Key Program of National Standardization Committee of China No.TC260-JCYJ-W1-2008042
文摘P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.
文摘There is cult leader who has not studied the psychology in a systematic way, but he is very good at using some psychology principles to capture a large number of believers and to make them follow him with their whole hearts. This article takes the need theory, the psychological frustration theory, the cognitive process theory and the theory of group psychological motivation as the principles, and obtaining the event in the actual struggle with the cult, the author reveals how the cult sets up the swindle with these theories and how the cult organization is developed fast and how to control cult believers and how they provide a service to themselves. The writers argue that when the cult leader crazily steals the psychological theory to deceive others and murder others and to loot money, we also should wave the psychological sword, and should use the psychological theory and methods against the cult to rescue the practitioners captured by cults, and the article also provides a strategy and method which can be a reference.
文摘In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit level is carried out.The keystream generated by logistic map is related to the plain-image,which confuses the relationship between the plain-image and the cipher-image.The computer simulation results of statistical analysis,information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application.
基金supported by the National Natural Science Foundation of China(Grant No.90304009).
文摘The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which was obtained by combining the ElGamal encryption scheme with the ElGamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy(PFS)and key independence(KI)were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks.
基金the National Natural Science Foundation of China(Grant No.61932019,No.61772521,No.61772522)the Key Research Program of Frontier Sciences,CAS(Grant No.QYZDB-SSW-SYS035).
文摘Message-dependent opening is one of the solutions to solve the problem of the tracing manager owns excessive power.In this paper,we present a new lattice-based fully dynamic group signature scheme with message-dependent opening by combining an improved version of the fully dynamic group signature scheme proposed by Ling et al and the double encryption paradigm.In addition,we propose an improved underlying zero knowledge protocol,it has a soundness error 1 max(n,p)+1 that is better than the Stern-like protocol,which helps to bring down the communication complexity of the protocol and hence the signature scheme.Our scheme constrains the power of group managers by adding an admitter,and the signature size has a logarithmic relationship with the group size.
文摘In this paper.we discuss Lagrangian vector field on Kahler manifold and use it to describe and solve some problem in Newtonican and Lagrangian Mechanics on Kahler Manifold.
基金supported by the Natural Science Foundation of China[grant number 71601059],[grant number 71673069].
文摘In the decision-making process,the decision information provided by decision makers over alter-natives may take the form of intuitionistic fuzzy numbers and come from different periods.The weight of information on decision makers,criteria,periods is usually completely unknown.To this issue,we first utilise hesitation degree information and introduce the concept of confi-dence degree function to determine the decision maker’s weights.Then we aggregate individual evaluation information into group evaluation information through intuitionistic fuzzy number weighted arithmetic averaging operator.We construct a nonlinear optimisation model to gain the criterion weights and apply the aggregate operator to gain the integrated rating value of alternatives in different periods,calculating the deviations of the integrated rating values with respect to their average.Then the period weights are been obtained by using the entropy method.According to the closeness coefficient between alternatives and ideal solution to sort the alternatives and select the optimal one.