Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of pr...Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.展开更多
Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,t...Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,this paper explores an approach to analyze group key exchange protocols,which realize automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants’ number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt(BD) protocol with three participants against passive adversary(3-BD-Passive) . In a nutshell,our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography.展开更多
This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group...This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, we propose a novel, secure, scalable and efficient region-based group key agreement protocol for ad hoc networks. This is implemented by a two-level structure and a new scheme of group key update. The idea is to divide the group into subgroups, each maintaining its subgroup keys using group elliptic curve diffie-hellman (GECDH) Protocol and links with other subgroups in a tree structure using tree-based group elliptic curve diffie-hellman (TGECDH) protocol. By introducing region-based approach, messages and key updates will be limited within subgroup and outer group;hence computation load is distributed to many hosts. Both theoretical analysis and experimental results show that this Region-based key agreement protocol performs well for the key establishment problem in ad hoc network in terms of memory cost, computation cost and communication cost.展开更多
Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to...Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.展开更多
Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distri...Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key distribution protocols, specifically, secrecy properties, such as group secrecy, forward secrecy, backward secrecy, and key independence. In this paper, we present a method to verify forward secrecy properties for group-oriented protocols. The method is based on a correct semantical link between group key protocols and event-B models and also uses the refinement process in the B method to model and verify group and forward secrecy. We use an event-B first-order theorem proving system to provide invariant checking for these secrecy properties. We illustrate our approach on the Tree based Group Diffie-Hellman protocol as case study.展开更多
Background: Group B Streptococcus [GBS] is a bacterium which transiently colonises the genital tract and can be transmitted from mother to baby at birth. Babies colonised with GBS can develop early-onset group B strep...Background: Group B Streptococcus [GBS] is a bacterium which transiently colonises the genital tract and can be transmitted from mother to baby at birth. Babies colonised with GBS can develop early-onset group B streptococcus disease [EOGBSD] which can lead to extended hospital stay, disability and death. One of the primary methods for determining which women are most likely to be GBS positive at the time of birth is antenatal universal culture-based screening. Recently Polymerase Chain Reaction [PCR] screening has emerged as a point-of-care method for screening women during the intrapartum period. This study will compare the diagnostic accuracy of this new technology and antenatal culture-based screening at 35 to 37 weeks gestational age, with the reference standard of formal culture-based testing in labour. Methods: This prospective observational study will take place in an Australian hospital. Consecutive women with one or more live fetuses, intending to have a vaginal birth will be asked to participate. Planned screening for GBS colonisation using microbiological culture on a self-collected specimen will occur at 35 to 37 completed weeks gestational age as per our usual hospital policy. A PCR GBS test by Xpert GBS (Cepheid) will be performed on admission to labour ward or at the time of rupture of membranes. The reference standard will be a formal GBS culture on a combined lower vaginal and perianal swab. The sensitivity, specificity, positive and negative predictive values, and positive and negative likelihood ratios will be estimated for both antenatal screening and the intrapartum Xpert GBS (Cepheid) point-of-care test and compared to the reference standard. Results: It is expected that the study will be completed by mid to late 2020. Conclusion: This study has the potential to improve the accuracy of GBS screening of pregnant women and therefore health outcomes for mothers and babies. There is also the potential for a cost savings to the health system.展开更多
Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid mu...Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before.On the basis of a well known protocol relationship named protocol conversion, three novel protocol relationships including protocol collaboration relationship, protocol cooperation relationship and protocol independent relationship are presented, so that protocol relationships are classified into four types.According to the functionality and purpose of each protocol, main protocols related to softswitch are divided into five groups.As to protocol conversion in softswitch, information flow trail(IFT) is utilized to facilitate problem solving.A decision rule for protocol conversion mode is proposed to guide how to choose between direct conversion and indirect conversion.A property of protocol relationships in softswitch is induced from all kinds of service scenarios of softswitch.This property summarizes protocol relationships within each protocol group or between two specific protocol groups.A merit of protocol grouping together with classification of protocol relationship is also presented.The effort of this paper pushes the protocol engineering to go ahead.展开更多
Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which d...Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which did not sacrifice the soundness of cryptography.Recently,Canetti and Herzog have proposed Universally Composable Symbolic Analysis(UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes.This scheme can analyze the protocols automatically and guarantee the soundness of cryptography.Therefore,we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman(JTDH) using UCSA.Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography.展开更多
目的分析儿童急性淋巴细胞白血病(acute lymphoblastic leukemia,ALL)经中国儿童肿瘤协作组急性淋巴细胞白血病2015方案(Chinese Children's Cancer Group ALL-2015 protocol,CCCG-ALL-2015)治疗后的累积复发率(cumulative incidenc...目的分析儿童急性淋巴细胞白血病(acute lymphoblastic leukemia,ALL)经中国儿童肿瘤协作组急性淋巴细胞白血病2015方案(Chinese Children's Cancer Group ALL-2015 protocol,CCCG-ALL-2015)治疗后的累积复发率(cumulative incidence of relapse,CIR),并探讨影响复发的危险因素。方法回顾性分析2015年1月—2019年12月接受CCCG-ALL-2015方案治疗的852例患儿的临床资料,计算CIR并分析影响儿童急性B淋巴细胞白血病(B-ALL)复发的危险因素。结果852例ALL患儿中,146例(17.1%)发生复发,8年CIR为(19.8±1.6)%。B-ALL与急性T淋巴细胞白血病患儿的8年CIR比较差异无统计学意义(P>0.05)。146例复发患儿中,复发时间主要集中于极早期(62例,42.5%)和早期(46例,31.5%),极早期单纯骨髓复发42例(28.8%),早期单纯骨髓复发27例(18.5%)。Cox比例风险回归模型分析显示,融合基因MLLr阳性(HR=4.177,95%CI:2.086~8.364,P<0.001)和第46天微小残留病≥0.01%(HR=2.013,95%CI:1.163~3.483,P=0.012)是B-ALL患儿经CCCG-ALL-2015方案治疗后复发的危险因素。结论儿童ALL经CCCG-ALL-2015方案治疗后仍有较高的复发率,以极早期和早期单纯骨髓复发常见;第46天微小残留病≥0.01%、融合基因MLLr阳性与B-ALL复发密切相关。展开更多
Mobile Ad Hoc networks has been widely applied to military field, emergency management, public service and so on. Because it is uncertain on network and communication, a great deal of energy will be consumed with node...Mobile Ad Hoc networks has been widely applied to military field, emergency management, public service and so on. Because it is uncertain on network and communication, a great deal of energy will be consumed with nodes increasing and creating routing each other. The reformative on-demand multicast routing protocol was putted forward by researching the energy consuming of multicast routing protocol in Ad Hoc. It will decrease consumption in a big multicast flooding through studying the relaying group net structure based on map or wormhole. The energy consumption is reduced 30% by creating the two kinds of routing principles: minimization of energy consumption and minimization of maximum nodes energy consumption. The simulation result indicates that the reformative RODMRP is effective to reduce the energy consuming while routing protocol built.展开更多
External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in...External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in the quantum computing epoch. Three hard problems on this new platform, Subgroup Root Problem, Multi-variant Subgroup Root Problem and Subgroup Action Problem are presented and well analyzed, which all have no relations with conjugacy. New secure public key encryption system and key agreement protocol are designed based on these hard problems. The new cryptosystems can be implemented in a general group environment other than in braid or Artin groups.展开更多
We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformation...We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformations. Nielsen transformations are a linear technique to study free groups and general infinite groups. In addition the group of all automorphisms of a free group F, denoted by AUT (F), is generated by a regular Nielsen transformation between two basis of F, and each regular Nielsen transformation between two basis of F defines an automorphism of F.展开更多
A fair electronic cash system is a system that allows customers to make payments anonymously. Furthermore the trusted third party can revoke the anonymity when the customers did illegal transactions. In this paper, a ...A fair electronic cash system is a system that allows customers to make payments anonymously. Furthermore the trusted third party can revoke the anonymity when the customers did illegal transactions. In this paper, a new fair electronic cash system based on group signature scheme by using elliptic curve cryptography is proposed, which satisfies properties of secure group signature scheme (correctness, unforgeability, etc). Moreover, our electronic cash contains group members (users, merchants and banks) and trusted third party which is acted by central bank as group manager.展开更多
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential t...The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential to be very useful, but it suffers from many problems like security. To achieve secure multicast communications with the dynamic aspect of group applications due to free membership joins and leaves in addition to member's mobility, key management is one of the most critical problems. So far, a lot of multicast key management schemes have been proposed and most of them are centralized, which have the problem of 'one point failure' and that the group controller is the bottleneck of the group. In order to solve these two problems, we propose a Key Management Scheme, using cluster-based End-System Multicast (ESM). The group management is between both 1) the main controller (MRP, Main Rendezvous Point) and the second controllers (CRP, Cluster RP), and 2) the second controllers (CRPs) and its members. So, ESM simplifies the implementation of group communication and is efficient ways to deliver a secure message to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. In this paper, we analyze different key management schemes and propose a new scheme, namely Advanced Transition/Cluster Key management Scheme (ATCKS) and find it has appropriate performance in security.展开更多
针对群组机器人系统在应急场景下移动频繁、能量有限的特点,提出了一种基于能量与速度的分簇自组织按需距离矢量协议(Clustered Ad hoc On-Demand Distance Vector Protocol Based on Energy and Speed,ESC-AODV),以延长群组机器人网络...针对群组机器人系统在应急场景下移动频繁、能量有限的特点,提出了一种基于能量与速度的分簇自组织按需距离矢量协议(Clustered Ad hoc On-Demand Distance Vector Protocol Based on Energy and Speed,ESC-AODV),以延长群组机器人网络运行时间,提高通信可靠性。用路由性能代替跳数作为路由判据,目的节点在重复接收到路由请求(Route Request,RREQ)数据包时,若路由性能更小,则回复路由应答(Routing Reply,RREP)数据包,以此选择更好的路由,引入分簇结构,通过簇头和网关组成的骨干网络减少广播洪泛次数。实验结果证明,节点数量多时,改进的ESC-AODV协议在延长网络生存时间的同时,平均端到端时延、数据包投递率、吞吐量和路由开销均优于AODV以及基于能量、负载和速度的AODV路由协议(AODV Routing Protocol Based on Energy,Load and Speed,ELS-AODV)。ESC-AODV协议能够节约网络能量,提高可靠性,获得更优的网络性能。展开更多
基金Supported by the National Natural Science Foun-dation of China (90104005 ,60473023) the National High Tech-nology Research and Development Programof China (863 Program)(2002AA41051)
文摘Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.
基金supported by National Natural Science Foundation of China No.61003262,National Natural Science Foundation of China No.60873237Doctoral Fund of Ministry of Education of China No.20070007071
文摘Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,this paper explores an approach to analyze group key exchange protocols,which realize automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants’ number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt(BD) protocol with three participants against passive adversary(3-BD-Passive) . In a nutshell,our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography.
文摘This paper addresses an interesting security problem in wireless ad hoc networks: the dynamic group key agreement key establishment. For secure group communication in an ad hoc network, a group key shared by all group members is required. This group key should be updated when there are membership changes (when the new member joins or current member leaves) in the group. In this paper, we propose a novel, secure, scalable and efficient region-based group key agreement protocol for ad hoc networks. This is implemented by a two-level structure and a new scheme of group key update. The idea is to divide the group into subgroups, each maintaining its subgroup keys using group elliptic curve diffie-hellman (GECDH) Protocol and links with other subgroups in a tree structure using tree-based group elliptic curve diffie-hellman (TGECDH) protocol. By introducing region-based approach, messages and key updates will be limited within subgroup and outer group;hence computation load is distributed to many hosts. Both theoretical analysis and experimental results show that this Region-based key agreement protocol performs well for the key establishment problem in ad hoc network in terms of memory cost, computation cost and communication cost.
基金Supported by the National Natural Science Foundation of China(No.61501064)Sichuan Technology Support Program(No.2015GZ0088)
文摘Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.
文摘Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key distribution protocols, specifically, secrecy properties, such as group secrecy, forward secrecy, backward secrecy, and key independence. In this paper, we present a method to verify forward secrecy properties for group-oriented protocols. The method is based on a correct semantical link between group key protocols and event-B models and also uses the refinement process in the B method to model and verify group and forward secrecy. We use an event-B first-order theorem proving system to provide invariant checking for these secrecy properties. We illustrate our approach on the Tree based Group Diffie-Hellman protocol as case study.
文摘Background: Group B Streptococcus [GBS] is a bacterium which transiently colonises the genital tract and can be transmitted from mother to baby at birth. Babies colonised with GBS can develop early-onset group B streptococcus disease [EOGBSD] which can lead to extended hospital stay, disability and death. One of the primary methods for determining which women are most likely to be GBS positive at the time of birth is antenatal universal culture-based screening. Recently Polymerase Chain Reaction [PCR] screening has emerged as a point-of-care method for screening women during the intrapartum period. This study will compare the diagnostic accuracy of this new technology and antenatal culture-based screening at 35 to 37 weeks gestational age, with the reference standard of formal culture-based testing in labour. Methods: This prospective observational study will take place in an Australian hospital. Consecutive women with one or more live fetuses, intending to have a vaginal birth will be asked to participate. Planned screening for GBS colonisation using microbiological culture on a self-collected specimen will occur at 35 to 37 completed weeks gestational age as per our usual hospital policy. A PCR GBS test by Xpert GBS (Cepheid) will be performed on admission to labour ward or at the time of rupture of membranes. The reference standard will be a formal GBS culture on a combined lower vaginal and perianal swab. The sensitivity, specificity, positive and negative predictive values, and positive and negative likelihood ratios will be estimated for both antenatal screening and the intrapartum Xpert GBS (Cepheid) point-of-care test and compared to the reference standard. Results: It is expected that the study will be completed by mid to late 2020. Conclusion: This study has the potential to improve the accuracy of GBS screening of pregnant women and therefore health outcomes for mothers and babies. There is also the potential for a cost savings to the health system.
基金National Science Fund for Distinguished Young Scholars (No. 60525110)National 973 Program (No. 2007CB307100, 2007CB307103)+1 种基金National Natural Science Foundation of China (No. 60902051)Development Fund Project for Electronic and Information Industry (Mobile Service and Application System Based on 3G)
文摘Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before.On the basis of a well known protocol relationship named protocol conversion, three novel protocol relationships including protocol collaboration relationship, protocol cooperation relationship and protocol independent relationship are presented, so that protocol relationships are classified into four types.According to the functionality and purpose of each protocol, main protocols related to softswitch are divided into five groups.As to protocol conversion in softswitch, information flow trail(IFT) is utilized to facilitate problem solving.A decision rule for protocol conversion mode is proposed to guide how to choose between direct conversion and indirect conversion.A property of protocol relationships in softswitch is induced from all kinds of service scenarios of softswitch.This property summarizes protocol relationships within each protocol group or between two specific protocol groups.A merit of protocol grouping together with classification of protocol relationship is also presented.The effort of this paper pushes the protocol engineering to go ahead.
基金supported by the National Natural Science Foundation of China under Grants No.61003262,No.60873237,No.61100205,No.60873001the Fundamental Research Funds for the Central Universities under Grant No.2009RC0212
文摘Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which did not sacrifice the soundness of cryptography.Recently,Canetti and Herzog have proposed Universally Composable Symbolic Analysis(UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes.This scheme can analyze the protocols automatically and guarantee the soundness of cryptography.Therefore,we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman(JTDH) using UCSA.Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography.
文摘目的分析儿童急性淋巴细胞白血病(acute lymphoblastic leukemia,ALL)经中国儿童肿瘤协作组急性淋巴细胞白血病2015方案(Chinese Children's Cancer Group ALL-2015 protocol,CCCG-ALL-2015)治疗后的累积复发率(cumulative incidence of relapse,CIR),并探讨影响复发的危险因素。方法回顾性分析2015年1月—2019年12月接受CCCG-ALL-2015方案治疗的852例患儿的临床资料,计算CIR并分析影响儿童急性B淋巴细胞白血病(B-ALL)复发的危险因素。结果852例ALL患儿中,146例(17.1%)发生复发,8年CIR为(19.8±1.6)%。B-ALL与急性T淋巴细胞白血病患儿的8年CIR比较差异无统计学意义(P>0.05)。146例复发患儿中,复发时间主要集中于极早期(62例,42.5%)和早期(46例,31.5%),极早期单纯骨髓复发42例(28.8%),早期单纯骨髓复发27例(18.5%)。Cox比例风险回归模型分析显示,融合基因MLLr阳性(HR=4.177,95%CI:2.086~8.364,P<0.001)和第46天微小残留病≥0.01%(HR=2.013,95%CI:1.163~3.483,P=0.012)是B-ALL患儿经CCCG-ALL-2015方案治疗后复发的危险因素。结论儿童ALL经CCCG-ALL-2015方案治疗后仍有较高的复发率,以极早期和早期单纯骨髓复发常见;第46天微小残留病≥0.01%、融合基因MLLr阳性与B-ALL复发密切相关。
基金Project(20051015) supported by the Natural Science Foundation of Shanxi Province, China
文摘Mobile Ad Hoc networks has been widely applied to military field, emergency management, public service and so on. Because it is uncertain on network and communication, a great deal of energy will be consumed with nodes increasing and creating routing each other. The reformative on-demand multicast routing protocol was putted forward by researching the energy consuming of multicast routing protocol in Ad Hoc. It will decrease consumption in a big multicast flooding through studying the relaying group net structure based on map or wormhole. The energy consumption is reduced 30% by creating the two kinds of routing principles: minimization of energy consumption and minimization of maximum nodes energy consumption. The simulation result indicates that the reformative RODMRP is effective to reduce the energy consuming while routing protocol built.
基金Supported by the National Natural Science Funda-tion of China (60403027)
文摘External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in the quantum computing epoch. Three hard problems on this new platform, Subgroup Root Problem, Multi-variant Subgroup Root Problem and Subgroup Action Problem are presented and well analyzed, which all have no relations with conjugacy. New secure public key encryption system and key agreement protocol are designed based on these hard problems. The new cryptosystems can be implemented in a general group environment other than in braid or Artin groups.
文摘We introduce in this paper cryptographic protocols which use combinatorial group theory. Based on a combinatorial distribution of shares we present secret sharing schemes and cryptosystems using Nielsen transformations. Nielsen transformations are a linear technique to study free groups and general infinite groups. In addition the group of all automorphisms of a free group F, denoted by AUT (F), is generated by a regular Nielsen transformation between two basis of F, and each regular Nielsen transformation between two basis of F defines an automorphism of F.
文摘A fair electronic cash system is a system that allows customers to make payments anonymously. Furthermore the trusted third party can revoke the anonymity when the customers did illegal transactions. In this paper, a new fair electronic cash system based on group signature scheme by using elliptic curve cryptography is proposed, which satisfies properties of secure group signature scheme (correctness, unforgeability, etc). Moreover, our electronic cash contains group members (users, merchants and banks) and trusted third party which is acted by central bank as group manager.
文摘The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential to be very useful, but it suffers from many problems like security. To achieve secure multicast communications with the dynamic aspect of group applications due to free membership joins and leaves in addition to member's mobility, key management is one of the most critical problems. So far, a lot of multicast key management schemes have been proposed and most of them are centralized, which have the problem of 'one point failure' and that the group controller is the bottleneck of the group. In order to solve these two problems, we propose a Key Management Scheme, using cluster-based End-System Multicast (ESM). The group management is between both 1) the main controller (MRP, Main Rendezvous Point) and the second controllers (CRP, Cluster RP), and 2) the second controllers (CRPs) and its members. So, ESM simplifies the implementation of group communication and is efficient ways to deliver a secure message to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. In this paper, we analyze different key management schemes and propose a new scheme, namely Advanced Transition/Cluster Key management Scheme (ATCKS) and find it has appropriate performance in security.
文摘针对群组机器人系统在应急场景下移动频繁、能量有限的特点,提出了一种基于能量与速度的分簇自组织按需距离矢量协议(Clustered Ad hoc On-Demand Distance Vector Protocol Based on Energy and Speed,ESC-AODV),以延长群组机器人网络运行时间,提高通信可靠性。用路由性能代替跳数作为路由判据,目的节点在重复接收到路由请求(Route Request,RREQ)数据包时,若路由性能更小,则回复路由应答(Routing Reply,RREP)数据包,以此选择更好的路由,引入分簇结构,通过簇头和网关组成的骨干网络减少广播洪泛次数。实验结果证明,节点数量多时,改进的ESC-AODV协议在延长网络生存时间的同时,平均端到端时延、数据包投递率、吞吐量和路由开销均优于AODV以及基于能量、负载和速度的AODV路由协议(AODV Routing Protocol Based on Energy,Load and Speed,ELS-AODV)。ESC-AODV协议能够节约网络能量,提高可靠性,获得更优的网络性能。