Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue a...Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model.展开更多
Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. T...Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames.It utilizes the sequence number of the frame along with the authentication stream generators for authentication.Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.展开更多
We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D c...We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D chaotic systems.Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results.展开更多
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell...In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.展开更多
In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In ...In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements.展开更多
Cluster synchronization is an important dynamical behavior in community networks and deserves further investigations.A community network with distributed time delays is investigated in this paper.For achieving cluster...Cluster synchronization is an important dynamical behavior in community networks and deserves further investigations.A community network with distributed time delays is investigated in this paper.For achieving cluster synchronization,an impulsive control scheme is introduced to design proper controllers and an adaptive strategy is adopted to make the impulsive controllers unified for different networks.Through taking advantage of the linear matrix inequality technique and constructing Lyapunov functions,some synchronization criteria with respect to the impulsive gains,instants,and system parameters without adaptive strategy are obtained and generalized to the adaptive case.Finally,numerical examples are presented to demonstrate the effectiveness of the theoretical results.展开更多
An adaptive control scheme is developed to study the synchronization and the anti-synchronization behaviors between two identical Lorenz–Stenflo systems with unknown parameters.This adaptive controller is designed ba...An adaptive control scheme is developed to study the synchronization and the anti-synchronization behaviors between two identical Lorenz–Stenflo systems with unknown parameters.This adaptive controller is designed based on Lyapunov stability theory and an analytic expression of the controller with its adaptive laws of parameters is shown.Theoretical analysis and numerical simulations are shown to verify the results.展开更多
In this paper it has been systematically studied the imbedding properties o f fractional integral operatorsof periodic functions of several variables,and isomorphic properties of fractional intregral operators in thes...In this paper it has been systematically studied the imbedding properties o f fractional integral operatorsof periodic functions of several variables,and isomorphic properties of fractional intregral operators in thespaces of Lipschitz continuous functions. It has also been proved that the space of fractional integration,thespace of Lipschitz continuous functions and the Sobolev space are identical in L^2-norm.Results obtainedhereare not true for fractional integrals(or Riesz potentials)in R^n.展开更多
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, b...An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.展开更多
文摘Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model.
文摘Authentication per frame is an implicit necessity for security in wireless local area networks(WLANs). We propose a novel per frame secure authentication scheme which provides authentication to data frames in WLANs. The scheme involves no cryptographic overheads for authentication of frames.It utilizes the sequence number of the frame along with the authentication stream generators for authentication.Hence, it requires no extra bits or messages for the authentication purpose and also no change in the existing frame format is required. The scheme provides authentication by modifying the sequence number of the frame at the sender, and that the modification is verified at the receiver. The modified sequence number is protected by using the XOR operation with a random number selected from the random stream. The authentication is lightweight due to the fact that it requires only trivial arithmetic operations like the subtraction and XOR operation.
基金Supported by the Natural Science Foundation of Shandong Province under Grant No ZR2010GL013.
文摘We investigate the synchronization and anti-synchronization of the new 4D chaotic system and propose a same adaptive controller in the form which not only synchronizes,but also anti-synchronizes two identical new 4D chaotic systems.Numerical simulations verify the correctness and the effectiveness of the proposed theoretical results.
文摘In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
基金Supported by the National Natural Science Foun-dation of Chinafor Distinguished Young Scholars(60225007) the Na-tional Research Fundfor the Doctoral Programof Higher Education ofChina(20020248024) the Science and Technology Research Pro-ject of Shanghai (04DZ07067)
文摘In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements.
基金Project supported by the National Natural Science Foundation of China(Grant No.61463022)the Natural Science Foundation of Jiangxi Province,China(Grant No.20161BAB201021)the Natural Science Foundation of Jiangxi Educational Committee,China(Grant No.GJJ14273)
文摘Cluster synchronization is an important dynamical behavior in community networks and deserves further investigations.A community network with distributed time delays is investigated in this paper.For achieving cluster synchronization,an impulsive control scheme is introduced to design proper controllers and an adaptive strategy is adopted to make the impulsive controllers unified for different networks.Through taking advantage of the linear matrix inequality technique and constructing Lyapunov functions,some synchronization criteria with respect to the impulsive gains,instants,and system parameters without adaptive strategy are obtained and generalized to the adaptive case.Finally,numerical examples are presented to demonstrate the effectiveness of the theoretical results.
文摘An adaptive control scheme is developed to study the synchronization and the anti-synchronization behaviors between two identical Lorenz–Stenflo systems with unknown parameters.This adaptive controller is designed based on Lyapunov stability theory and an analytic expression of the controller with its adaptive laws of parameters is shown.Theoretical analysis and numerical simulations are shown to verify the results.
文摘In this paper it has been systematically studied the imbedding properties o f fractional integral operatorsof periodic functions of several variables,and isomorphic properties of fractional intregral operators in thespaces of Lipschitz continuous functions. It has also been proved that the space of fractional integration,thespace of Lipschitz continuous functions and the Sobolev space are identical in L^2-norm.Results obtainedhereare not true for fractional integrals(or Riesz potentials)in R^n.
基金The National Hi-Tech Research and Development Program (863) of China (No. 2005AA145110)The Pudong New Area Technology Innovation Public Service Platform of China (No. PDP2005-04)
文摘An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.