A necessary condition for existence of any weakly consistent estimator is presented in nonlinear models with random effects. Under mild regularity conditions, the strong consistency and the asymptotic normality of the...A necessary condition for existence of any weakly consistent estimator is presented in nonlinear models with random effects. Under mild regularity conditions, the strong consistency and the asymptotic normality of the estimator are proved. The results of Breslow and Calyton(1993), Lee and Nelder(1996) are improved.展开更多
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ...Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now.展开更多
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche...In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates.展开更多
In the field of underwater image processing, the line and rounded objects, like mines and torpedoes, are the most common targets for rec, ognition. Before further analysis, these two image patterns need to be detected...In the field of underwater image processing, the line and rounded objects, like mines and torpedoes, are the most common targets for rec, ognition. Before further analysis, these two image patterns need to be detected and extracted from the underwater images in real-time. Using the subpixel position, direction and curvature information of an edge provided by Zernike Orthogonal Moment (ZOM) edge detection operators, an enhanced Randomized Hough Transform (RHT) to extract straight-lines is developed. This line extraction method consists of two steps : the rough parameters of a line are obtained robustly at first using RHT with large quantization in the Hough space and then the parameters are refined with line fitting techniques. Therefore both the robustness and high precision can be achieved simultaneously. Particularly, the problem of ellipse extraction is often computationally demanding using traditional Hough Transform, since an ellipse is characterized by five parameters. Based on the generalized K-RASAC algorithm, we develop a new ellipse extraction algorithm using the concept of quadratic curve cluster and random sampling technique. We first develop a new representation of quadratic curves, which facilitates quantization and voting for the parameter A that represents a candidate ellipse among the quadratic curves. Then, after selecting two tangent points and calculating the quadratic parameter equation, we vote for the parameter A to determine an ellipse. Thus the problem of ellipse extraction is reduced into finding the local minimum in the A accumulator array. The methods presented have been applied successfully to the extraction of lines and ellipses from synthetic and real underwater images, serving as a basic computer vision module of the underwater objects recognition system. Compared to the standard RHT line extraction method and K-RANSAC ellipse extraction method, our methods have the attractive advantages of obtaining robustness and high precision simultaneously while preserving the merits of high computation speed and small storage requirement.展开更多
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signat...Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures.展开更多
文摘A necessary condition for existence of any weakly consistent estimator is presented in nonlinear models with random effects. Under mild regularity conditions, the strong consistency and the asymptotic normality of the estimator are proved. The results of Breslow and Calyton(1993), Lee and Nelder(1996) are improved.
基金Supported by the National Natural Science Foundation of China (No. 60970111, 61133014, 60903189, 60903020).
文摘Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now.
基金Supported by the National Natural Science Foundation of China (No. 60573032, 60773092, 90604036, 60873229, 60903178, 60672072, 60832003)Zhejiang Provincial Natural Science Foundation of China (No. Y106505)
文摘In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates.
文摘In the field of underwater image processing, the line and rounded objects, like mines and torpedoes, are the most common targets for rec, ognition. Before further analysis, these two image patterns need to be detected and extracted from the underwater images in real-time. Using the subpixel position, direction and curvature information of an edge provided by Zernike Orthogonal Moment (ZOM) edge detection operators, an enhanced Randomized Hough Transform (RHT) to extract straight-lines is developed. This line extraction method consists of two steps : the rough parameters of a line are obtained robustly at first using RHT with large quantization in the Hough space and then the parameters are refined with line fitting techniques. Therefore both the robustness and high precision can be achieved simultaneously. Particularly, the problem of ellipse extraction is often computationally demanding using traditional Hough Transform, since an ellipse is characterized by five parameters. Based on the generalized K-RASAC algorithm, we develop a new ellipse extraction algorithm using the concept of quadratic curve cluster and random sampling technique. We first develop a new representation of quadratic curves, which facilitates quantization and voting for the parameter A that represents a candidate ellipse among the quadratic curves. Then, after selecting two tangent points and calculating the quadratic parameter equation, we vote for the parameter A to determine an ellipse. Thus the problem of ellipse extraction is reduced into finding the local minimum in the A accumulator array. The methods presented have been applied successfully to the extraction of lines and ellipses from synthetic and real underwater images, serving as a basic computer vision module of the underwater objects recognition system. Compared to the standard RHT line extraction method and K-RANSAC ellipse extraction method, our methods have the attractive advantages of obtaining robustness and high precision simultaneously while preserving the merits of high computation speed and small storage requirement.
基金Project (Nos 60573032, 60773092, 60842002, 60873229, and 90604036) supported by the National Natural Science Foundation of China
文摘Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures.