伪随机数发生器(pseudorandom number generator,PRNG)是重要的密码学概念.基于单向函数的伪随机数发生器起始于1982年的BMY发生器,将单向函数反复迭代,周期性地输出伪随机序列.单向函数的性质和种子长度关系到发生器的可实现性和安全性...伪随机数发生器(pseudorandom number generator,PRNG)是重要的密码学概念.基于单向函数的伪随机数发生器起始于1982年的BMY发生器,将单向函数反复迭代,周期性地输出伪随机序列.单向函数的性质和种子长度关系到发生器的可实现性和安全性,是此类发生器的2个重要参数.在分析现有工作的基础上,改进了单向函数的随机化迭代方式,基于不可逆性证明了迭代过程的安全性.迭代方式的改进消除了单向函数的长度保持性质,采用一般的压缩规范单向函数和通用散列函数构建伪随机数发生器.输出级与BMY发生器结构类似,以迭代函数的核心断言作为伪随机序列.基于与真随机序列的不可区分性,证明了伪随机数发生器的安全性.所构建的伪随机数发生器与现有同类发生器结构类似,但放松了对单向函数性质的要求,增强了可实现性,减小了种子长度,提高了效率.展开更多
Goal of this experiment is basically measuring the velocity of light. As usual we will measure two-way velocity of light (from A to B and back). In contrast to the similar experiments we will not assume that speeds of...Goal of this experiment is basically measuring the velocity of light. As usual we will measure two-way velocity of light (from A to B and back). In contrast to the similar experiments we will not assume that speeds of light from A to B and from B to A are equal. To achieve this we will take into account Earth’s movement through the space, rotation around its axis and apply “least squares method for cosine function”, which will be explained in Section 9. Assuming that direction East-West is already known, one clock, a source of light and a mirror, is all equipment we need for this experiment.展开更多
Background:The Identification of Functional Ankle Instability(IdFAI)is a valid and reliable tool to identify chronic ankle instability;however,it was developed in English,thus limiting its usage only to those who can ...Background:The Identification of Functional Ankle Instability(IdFAI)is a valid and reliable tool to identify chronic ankle instability;however,it was developed in English,thus limiting its usage only to those who can read and write in English.The objectives of our study were to(1)cross-culturally adapt a Chinese(Mandarin)version of the IdFAI and(2)determine the psychometric properties of the Chinese version IdFAI.Methods:The cross-cultural adaptation procedures used by the investigators and translators followed previously published guidelines and included 6 stages:(1)initial translation,(2)synthesis of the translations,(3)back translation,(4)developing the pre-final version for field testing,(5)testing the pre-final version,and(6)finalizing the Chinese version of IdFAI(IdFAI-C).Five psychometric properties of the IdFAI-C were assessed from results of 2 participant groups:bilingual(n=20)and Chinese(n=625).Results:A high degree of agreement was found between the English version of IdFAI and IdFAI-C(intra-class correlation_(2,1)=0.995).An excellent internal consistency(Cronbach'sα=0.89),test—retest reliability(intra-class correlation_(2,1)=0.970),and construct validity(r(625)=0.67)was also found for the IdFAI-C.In addition,the results of exploratory and confirmatory factor analysis indicated that ankle instability was the only construct measured from the IdFAI.Conclusion:The IdFAI-C is a highly reliable and valid self-report questionnaire that can be used to assess ankle instability.Therefore,we suggest that it can be used to effectively and accurately assess chronic ankle instability in clinical settings for Chinese-speaking individuals.展开更多
Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in ...Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in a group environment system. A transmutation of CFP named T-CFP is proposed in this paper. The precondition of T-CFP is the system's user trusts the system center and center's cheating is meaningless at the same time. The significant difference between CFP and T-CFP is that CFP supports only two users while T-CFP can support many users to exchange special information. The security and efficiency of T-CFP are discussed with a detailed example on T-CFP utilization is demonstrated in this paper.展开更多
The key problem of securing multieast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed (MPE) scheme is an approach which is based on Polynomial expansion (PE...The key problem of securing multieast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed (MPE) scheme is an approach which is based on Polynomial expansion (PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number (SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.展开更多
文摘伪随机数发生器(pseudorandom number generator,PRNG)是重要的密码学概念.基于单向函数的伪随机数发生器起始于1982年的BMY发生器,将单向函数反复迭代,周期性地输出伪随机序列.单向函数的性质和种子长度关系到发生器的可实现性和安全性,是此类发生器的2个重要参数.在分析现有工作的基础上,改进了单向函数的随机化迭代方式,基于不可逆性证明了迭代过程的安全性.迭代方式的改进消除了单向函数的长度保持性质,采用一般的压缩规范单向函数和通用散列函数构建伪随机数发生器.输出级与BMY发生器结构类似,以迭代函数的核心断言作为伪随机序列.基于与真随机序列的不可区分性,证明了伪随机数发生器的安全性.所构建的伪随机数发生器与现有同类发生器结构类似,但放松了对单向函数性质的要求,增强了可实现性,减小了种子长度,提高了效率.
文摘Goal of this experiment is basically measuring the velocity of light. As usual we will measure two-way velocity of light (from A to B and back). In contrast to the similar experiments we will not assume that speeds of light from A to B and from B to A are equal. To achieve this we will take into account Earth’s movement through the space, rotation around its axis and apply “least squares method for cosine function”, which will be explained in Section 9. Assuming that direction East-West is already known, one clock, a source of light and a mirror, is all equipment we need for this experiment.
文摘Background:The Identification of Functional Ankle Instability(IdFAI)is a valid and reliable tool to identify chronic ankle instability;however,it was developed in English,thus limiting its usage only to those who can read and write in English.The objectives of our study were to(1)cross-culturally adapt a Chinese(Mandarin)version of the IdFAI and(2)determine the psychometric properties of the Chinese version IdFAI.Methods:The cross-cultural adaptation procedures used by the investigators and translators followed previously published guidelines and included 6 stages:(1)initial translation,(2)synthesis of the translations,(3)back translation,(4)developing the pre-final version for field testing,(5)testing the pre-final version,and(6)finalizing the Chinese version of IdFAI(IdFAI-C).Five psychometric properties of the IdFAI-C were assessed from results of 2 participant groups:bilingual(n=20)and Chinese(n=625).Results:A high degree of agreement was found between the English version of IdFAI and IdFAI-C(intra-class correlation_(2,1)=0.995).An excellent internal consistency(Cronbach'sα=0.89),test—retest reliability(intra-class correlation_(2,1)=0.970),and construct validity(r(625)=0.67)was also found for the IdFAI-C.In addition,the results of exploratory and confirmatory factor analysis indicated that ankle instability was the only construct measured from the IdFAI.Conclusion:The IdFAI-C is a highly reliable and valid self-report questionnaire that can be used to assess ankle instability.Therefore,we suggest that it can be used to effectively and accurately assess chronic ankle instability in clinical settings for Chinese-speaking individuals.
基金Supported by the National Natural Science Foun-dation of China(60473072)
文摘Coin flipping by telephone protocol(CFP) is utilized in a system to exchange a binary sequence at random between two person apart far from each other. However, CFP cannot he used in a system with many users like in a group environment system. A transmutation of CFP named T-CFP is proposed in this paper. The precondition of T-CFP is the system's user trusts the system center and center's cheating is meaningless at the same time. The significant difference between CFP and T-CFP is that CFP supports only two users while T-CFP can support many users to exchange special information. The security and efficiency of T-CFP are discussed with a detailed example on T-CFP utilization is demonstrated in this paper.
基金Supported by the National Natural Science Foun-dation of China (60473072)
文摘The key problem of securing multieast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed (MPE) scheme is an approach which is based on Polynomial expansion (PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number (SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.