在1989年剧变之后不久,中东欧国家出于政治、经济上的长远考虑表现出了加入欧盟的极大热情.从1991年中到1992年底,波兰、匈牙利等中东欧十国先后与欧盟签订了《欧洲协定(the European Agreements)》,迈出了加入欧盟的第一步.《欧洲协定...在1989年剧变之后不久,中东欧国家出于政治、经济上的长远考虑表现出了加入欧盟的极大热情.从1991年中到1992年底,波兰、匈牙利等中东欧十国先后与欧盟签订了《欧洲协定(the European Agreements)》,迈出了加入欧盟的第一步.《欧洲协定》旨在建立一个欧盟--中东欧国家间的自由贸易区,首先从贸易上将中东欧国家纳入欧盟的经济大气候.从1994年4月到1997年1月,中东欧国家又先后正式提出了加入欧盟的申请,而1994年以来的历届欧洲理事会则提出了一系列中东欧国家加入欧盟的前提条件:如坚定的民主制度、正常运转的市场经济、应付国际竞争的能力、接受欧盟《内部市场法(Internal Market Naw)》等.为了满足这些条件,近年来中东欧国家一直在积极努力,其中波兰、匈牙利、捷克等国在保持政治稳定、培养市场体系、改革企业制度等方面已取得有目共睹的成果.展开更多
Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple m...Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple metrics measurement is proposed to improve TCP performance in MANETs. Multi-metric Measurement based Enhancement of TCP (MME-TCP) designs the metrics and the identification algorithm according to the characteristics of MANETs and the experiment results. Furthermore,these metrics are measured at the sender node to reduce the overhead of control information over networks. Simulation results show that MME-TCP mechanism achieves a significant performance improvement over standard TCP in MANETs.展开更多
Since the 1990s, indigenous people in Taiwan have engaged in tribal councils for the purpose of integrating the tribal authority and the modern administrative system. The establishment of tribal councils provides a co...Since the 1990s, indigenous people in Taiwan have engaged in tribal councils for the purpose of integrating the tribal authority and the modern administrative system. The establishment of tribal councils provides a communicative forum for tribal leaders, village, and the association of community development to make decisions of common tribal affairs. When disasters happen, the internal tribal response strategies and external assistance mechanisms might cooperate through either traditional or modern administrative systems. The research focused on how these organizations, while in interim housing, influenced the reconstruction and rehabilitation after disasters. The research's findings suggested that tribal councils, a pre-existing mechanism, seemed to be an appropriate forum for negotiation and decision-making for tribal affairs.展开更多
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GH...This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.展开更多
The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption...The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption scheme can be attacked by a powerful participant.We introduce a attack strategy called participant forciblemanipulation and analyze the information leakage in this protocol under this attack.At last,we give an improved versionof the original protocol.The improved protocol is robust and has the same efficiency as the original one.展开更多
This paper builds on the previous work of Knott, Ninassi and Eisenhardt's 2009 paper, "Using the Analytic Hierarchy Process (AHP) to Look at the Tradeoffs Among Stakeholders in the Case of Surrogacy, when the Init...This paper builds on the previous work of Knott, Ninassi and Eisenhardt's 2009 paper, "Using the Analytic Hierarchy Process (AHP) to Look at the Tradeoffs Among Stakeholders in the Case of Surrogacy, when the Initial Intention of the Parties Involved Change After the Pregnancy Has Ensued". This paper proposes a new methodology for analyzing cases involving stakeholders in disputed surrogacy arrangement. The methodology utilized is the Analytic Hierarchy Process, which allows users to weigh different criteria based on their own opinions and background. Three case studies involved a surrogacy arrangement among three stakeholders: the biological mother, the biological father and the surrogate mother. The base for the model was that all parties had entered into an agreement, and that after the agreement had been made, a situation changed, such that a decision as to who had parental rights over the fetus became an issue. The criteria used in the decision making process in the three case studies were legal, health and ethical. The criteria differed based upon each stakeholder's point of view. In this paper, the three models were developed using the AI-tP methodology and judgments were gathered for each of the three cases to derive the priorities for the criteria in each model. Each author took the role of one of the three stakeholders.展开更多
In the paper we propose a general, abstract framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying Secret Sharing Scheme (SSS). ASGS allows to prevent the Dealer from kno...In the paper we propose a general, abstract framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying Secret Sharing Scheme (SSS). ASGS allows to prevent the Dealer from knowing the secret. The Basic Property Conjecture (BPC) forms the base of the framework. Due to the level of abstraction, results are portable into the realm of quantum computing. Two situations are discussed. First concerns simultaneous generation and sharing of the random, prior nonexistent secret. Such a secret remains unknown until it is reconstructed. Next, we propose the framework for automatic sharing of a known secret. In this case the Dealer does not know the secret and the secret Owner does not know the shares. We present opportunities for joining ASGS with other extended capabilities, with special emphasis on PVSS and pre-positioned secret sharing. Finally, we illustrate framework with practical implementation.展开更多
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua...The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.展开更多
Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which d...Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which did not sacrifice the soundness of cryptography.Recently,Canetti and Herzog have proposed Universally Composable Symbolic Analysis(UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes.This scheme can analyze the protocols automatically and guarantee the soundness of cryptography.Therefore,we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman(JTDH) using UCSA.Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography.展开更多
China announced plans on April 1,2017 to create Xiong'an New Area,a new economic zone about 110 km southwest of Beijing.The new area of national significance covers the three counties of Xiongxian,Rongcheng and Anxin...China announced plans on April 1,2017 to create Xiong'an New Area,a new economic zone about 110 km southwest of Beijing.The new area of national significance covers the three counties of Xiongxian,Rongcheng and Anxin in Hebei Province,and is home to Baiyangdian,a major wetland in northern China.It will cover around 100 km2 initially(called "Starting Zone") and will be expanded to 200 km2 in the mid-term and about 2000 km2 in the long term.In this context,it is important to assess the land use pattern for the new area's planning and development.Based on remote sensing interpretation of Landsat OLI images,we examine the current land use features,the potential for built-up land saving and intensive use,and the spatial variation of arable land quality.The results indicate that the arable lands,built-up lands and wetlands account for around 60%,20% and 10%,respectively.The potential for rural built-up land saving and intensive use is quite large.The arable land quality and use intensity in Rongcheng and Anxin counties are much better than that of Xiongxian.The pros and cons for three potential options for the Starting Zone are listed and compared.The eastern area of Rongcheng county,to the north of Baiyangdian,is believed to be the most suitable Starting Zone.Policy recommendations for built-up land expansion,farmland saving and flood risk mitigation for Xiong'an New Area are also proposed in this paper.展开更多
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol compositio...The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol composition operation.In the paper,we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area.The proposed scheme is suitable for the mobile agents,which should migrate across different environment through network.Furthermore,we give the concrete analysis of the reduction to prove the security of the proposed scheme.展开更多
文摘在1989年剧变之后不久,中东欧国家出于政治、经济上的长远考虑表现出了加入欧盟的极大热情.从1991年中到1992年底,波兰、匈牙利等中东欧十国先后与欧盟签订了《欧洲协定(the European Agreements)》,迈出了加入欧盟的第一步.《欧洲协定》旨在建立一个欧盟--中东欧国家间的自由贸易区,首先从贸易上将中东欧国家纳入欧盟的经济大气候.从1994年4月到1997年1月,中东欧国家又先后正式提出了加入欧盟的申请,而1994年以来的历届欧洲理事会则提出了一系列中东欧国家加入欧盟的前提条件:如坚定的民主制度、正常运转的市场经济、应付国际竞争的能力、接受欧盟《内部市场法(Internal Market Naw)》等.为了满足这些条件,近年来中东欧国家一直在积极努力,其中波兰、匈牙利、捷克等国在保持政治稳定、培养市场体系、改革企业制度等方面已取得有目共睹的成果.
基金Supported by the National Natural Science Foundation of China (No.60496314)the Chinese 863 National High Technology Program (No.2002AA783043).
文摘Transmission Control Protocol (TCP) optimization in Mobile Ad hoc NETworks (MANETs) is a challenging issue because of some unique characteristics of MANETs. In this paper,a new end-to-end mechanism based on multiple metrics measurement is proposed to improve TCP performance in MANETs. Multi-metric Measurement based Enhancement of TCP (MME-TCP) designs the metrics and the identification algorithm according to the characteristics of MANETs and the experiment results. Furthermore,these metrics are measured at the sender node to reduce the overhead of control information over networks. Simulation results show that MME-TCP mechanism achieves a significant performance improvement over standard TCP in MANETs.
文摘Since the 1990s, indigenous people in Taiwan have engaged in tribal councils for the purpose of integrating the tribal authority and the modern administrative system. The establishment of tribal councils provides a communicative forum for tribal leaders, village, and the association of community development to make decisions of common tribal affairs. When disasters happen, the internal tribal response strategies and external assistance mechanisms might cooperate through either traditional or modern administrative systems. The research focused on how these organizations, while in interim housing, influenced the reconstruction and rehabilitation after disasters. The research's findings suggested that tribal councils, a pre-existing mechanism, seemed to be an appropriate forum for negotiation and decision-making for tribal affairs.
基金Supported by the National Science Council,Taiwan,China,under the Contract No.NSC 98-2221-E-006-097-MY3
文摘This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency.
基金Supported by National Natural Science Foundation of China under Grant Nos.60873191,60903152,60821001Specialized Research Fund for the Doctoral Program of High Education under Grant Nos.200800131016 and 20090005110010+2 种基金Beijing Nova Program under Grant No.2008B51Key Project of Chinese Ministry of Education under Grant No.109014Beijing Natural Science Foundation under Grant Nos.4072020 and 4102055
文摘The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption scheme can be attacked by a powerful participant.We introduce a attack strategy called participant forciblemanipulation and analyze the information leakage in this protocol under this attack.At last,we give an improved versionof the original protocol.The improved protocol is robust and has the same efficiency as the original one.
文摘This paper builds on the previous work of Knott, Ninassi and Eisenhardt's 2009 paper, "Using the Analytic Hierarchy Process (AHP) to Look at the Tradeoffs Among Stakeholders in the Case of Surrogacy, when the Initial Intention of the Parties Involved Change After the Pregnancy Has Ensued". This paper proposes a new methodology for analyzing cases involving stakeholders in disputed surrogacy arrangement. The methodology utilized is the Analytic Hierarchy Process, which allows users to weigh different criteria based on their own opinions and background. Three case studies involved a surrogacy arrangement among three stakeholders: the biological mother, the biological father and the surrogate mother. The base for the model was that all parties had entered into an agreement, and that after the agreement had been made, a situation changed, such that a decision as to who had parental rights over the fetus became an issue. The criteria used in the decision making process in the three case studies were legal, health and ethical. The criteria differed based upon each stakeholder's point of view. In this paper, the three models were developed using the AI-tP methodology and judgments were gathered for each of the three cases to derive the priorities for the criteria in each model. Each author took the role of one of the three stakeholders.
文摘In the paper we propose a general, abstract framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying Secret Sharing Scheme (SSS). ASGS allows to prevent the Dealer from knowing the secret. The Basic Property Conjecture (BPC) forms the base of the framework. Due to the level of abstraction, results are portable into the realm of quantum computing. Two situations are discussed. First concerns simultaneous generation and sharing of the random, prior nonexistent secret. Such a secret remains unknown until it is reconstructed. Next, we propose the framework for automatic sharing of a known secret. In this case the Dealer does not know the secret and the secret Owner does not know the shares. We present opportunities for joining ASGS with other extended capabilities, with special emphasis on PVSS and pre-positioned secret sharing. Finally, we illustrate framework with practical implementation.
基金the National Natural Science Foundation of China,the State Key Program of National Natural Science of China,the Major Research Plan of the National Natural Science Foundation of China,Major State Basic Research Development Program of China (973 Program),the Hubei Natural Science Foundation of China
文摘The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.
基金supported by the National Natural Science Foundation of China under Grants No.61003262,No.60873237,No.61100205,No.60873001the Fundamental Research Funds for the Central Universities under Grant No.2009RC0212
文摘Security analysis of cryptographic protocols has been widely studied for many years.As far as we know,we have not found any methods to effectively analyze group key exchange protocols for the three parties yet,which did not sacrifice the soundness of cryptography.Recently,Canetti and Herzog have proposed Universally Composable Symbolic Analysis(UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes.This scheme can analyze the protocols automatically and guarantee the soundness of cryptography.Therefore,we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman(JTDH) using UCSA.Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography.
基金National Natural Science Foundation of China(41430861)National Key Research and Development Program(2016YFC0503501)Youth Innovation Promotion Association of Chinese Academy of Sciences(2014040)
文摘China announced plans on April 1,2017 to create Xiong'an New Area,a new economic zone about 110 km southwest of Beijing.The new area of national significance covers the three counties of Xiongxian,Rongcheng and Anxin in Hebei Province,and is home to Baiyangdian,a major wetland in northern China.It will cover around 100 km2 initially(called "Starting Zone") and will be expanded to 200 km2 in the mid-term and about 2000 km2 in the long term.In this context,it is important to assess the land use pattern for the new area's planning and development.Based on remote sensing interpretation of Landsat OLI images,we examine the current land use features,the potential for built-up land saving and intensive use,and the spatial variation of arable land quality.The results indicate that the arable lands,built-up lands and wetlands account for around 60%,20% and 10%,respectively.The potential for rural built-up land saving and intensive use is quite large.The arable land quality and use intensity in Rongcheng and Anxin counties are much better than that of Xiongxian.The pros and cons for three potential options for the Starting Zone are listed and compared.The eastern area of Rongcheng county,to the north of Baiyangdian,is believed to be the most suitable Starting Zone.Policy recommendations for built-up land expansion,farmland saving and flood risk mitigation for Xiong'an New Area are also proposed in this paper.
基金the National Natural Science Foundation of China(Nos.60703031,60703004)the National High Technology Research and Development Program(863)of China(No.2006AA01Z4220the National Basic Research Program(973)of China(No.2007CB311201)
文摘The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol composition operation.In the paper,we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area.The proposed scheme is suitable for the mobile agents,which should migrate across different environment through network.Furthermore,we give the concrete analysis of the reduction to prove the security of the proposed scheme.