A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic cu...A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic curve cryptography and introducing a new elliptic curve discrete logarithm assumption. The expiry date and denomination are embedded into the blindly signed coin by integrating partially blind signature with restrictive blind signature. A bank need not use different public keys for different coin values, shops and users need not carry a list of bank’s public keys to verify in their electronic wallet. At the same time, the bank just needs to keep undue electronic coins for double spending check in his database, thus bank’s database can be dramatically reduced.展开更多
We design a practical and provablysecure block ciper over small domain and non-binary inputs,which is also can be considered as a pseudorandom permutation on N elements.Our work is based on a relation we found between...We design a practical and provablysecure block ciper over small domain and non-binary inputs,which is also can be considered as a pseudorandom permutation on N elements.Our work is based on a relation we found between the small domain ciper and the negative hypergeometric probability(NHG) distribution.We prove that our block ciper achieves ideal security,that is,it is indistinguishable from a random permutation even if the adversary had already observed N plaintext-cipertext pairs.In particular,we initiate an efficient and sufficiently precise sampling algorithm for negative hypergeometric distribution.展开更多
The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that ...The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that principles are common and describe the fundamental mode of the organization of matter. The regeneration of its elements is the basic goal of the control of an object. The control systems try to allow elements to optimize their state depending on circumstances and occasionally in advance. The input system is the first one from these systems. It controls the input of material for the regeneration and at the same time is the source of primary information concerning its state in the environment and its development in time. The system of the control of the distribution of the energy named TOT is another element of the control. The system named EM0 controls the process of the regeneration on the basis of information about the successfulness of elements involved into the regeneration. Finally, the system named EM 1 controls the dynamics of the boundary of the object on the basis of information describing the tension on this boundary. The second goal of the control of an object, besides the regeneration, is to optimize the existence of the object as whole. New global criteria arise and are used throughout the process of the control for this sake.展开更多
The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.Howev...The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.However,the major limitation of DPI systems is that their signature library is mainly extracted manually,which makes it hard to efficiently obtain the signature of new applications.Hence,in this paper,we propose an automatic signature extraction mechanism using Principal Component Analysis(PCA)technology,which is able to extract the signature automatically.In the proposed method,the signatures are expressed in the form of serial consistent sequences constructed by principal components instead of normally separated substrings in the original data extracted from the traditional methods.Extensive experiments based on numerous sets of data have been carried out to evaluate the performance of the proposed scheme,and the results prove that the newly proposed method can achieve good performance in terms of accuracy and efficiency.展开更多
A relatively simple plug-and-play control system of quantum key distribution (QKD) based on PCI7300 card is demonstrated, including mechanism design, key generation and key acquisition. The system works very well at...A relatively simple plug-and-play control system of quantum key distribution (QKD) based on PCI7300 card is demonstrated, including mechanism design, key generation and key acquisition. The system works very well at the repetition frequency of 1 MHz, and the key generation rate is 100 k/s. A visibility of better than 95% over 50 km-long fiber at 1.31 gm is obtained, which is stable under ordinary lab conditions for 24 h without any feedback control or adjustment. The presented system is a quite promising candidate to realize the QKD in the future.展开更多
文摘A new fair off-line electronic cash scheme on elliptic curve cryptography was presented. The new scheme is more efficient than those by extending fair off-line electronic cash scheme from finite field into elliptic curve cryptography and introducing a new elliptic curve discrete logarithm assumption. The expiry date and denomination are embedded into the blindly signed coin by integrating partially blind signature with restrictive blind signature. A bank need not use different public keys for different coin values, shops and users need not carry a list of bank’s public keys to verify in their electronic wallet. At the same time, the bank just needs to keep undue electronic coins for double spending check in his database, thus bank’s database can be dramatically reduced.
基金National 973 Fundamental Basic Research Program under grant No.2014CB340600 and by the National Natural Science Foundations of China
文摘We design a practical and provablysecure block ciper over small domain and non-binary inputs,which is also can be considered as a pseudorandom permutation on N elements.Our work is based on a relation we found between the small domain ciper and the negative hypergeometric probability(NHG) distribution.We prove that our block ciper achieves ideal security,that is,it is indistinguishable from a random permutation even if the adversary had already observed N plaintext-cipertext pairs.In particular,we initiate an efficient and sufficiently precise sampling algorithm for negative hypergeometric distribution.
文摘The presented work describes principles of functioning of the object as a philosophical category on the basis of principles discovered in different, concrete objects. At the beginning, a supposition is thus made that principles are common and describe the fundamental mode of the organization of matter. The regeneration of its elements is the basic goal of the control of an object. The control systems try to allow elements to optimize their state depending on circumstances and occasionally in advance. The input system is the first one from these systems. It controls the input of material for the regeneration and at the same time is the source of primary information concerning its state in the environment and its development in time. The system of the control of the distribution of the energy named TOT is another element of the control. The system named EM0 controls the process of the regeneration on the basis of information about the successfulness of elements involved into the regeneration. Finally, the system named EM 1 controls the dynamics of the boundary of the object on the basis of information describing the tension on this boundary. The second goal of the control of an object, besides the regeneration, is to optimize the existence of the object as whole. New global criteria arise and are used throughout the process of the control for this sake.
基金supported by the National Natural Science Foundation of China under Grant No.61003282Beijing Higher Education Young Elite Teacher Project+3 种基金China Next Generation Internet(CNGI)Project"Research and Trial on Evolving Next Generation Network Intelligence Capability Enhancement(NICE)"the National Basic Research Program(973 Program)under Grant No.2009CB320-505the National Science and Technology Major Project"Research about Architecture of Mobile Internet"under Grant No.2011ZX03-002-001-01the National High Technology Research and Development Program(863 Program)under Grant No.2011AA010704
文摘The Deep Packet Inspection(DPI)method is a popular method that can accurately identify the flow data and its corresponding application.Currently,the DPI method is widely used in common network management systems.However,the major limitation of DPI systems is that their signature library is mainly extracted manually,which makes it hard to efficiently obtain the signature of new applications.Hence,in this paper,we propose an automatic signature extraction mechanism using Principal Component Analysis(PCA)technology,which is able to extract the signature automatically.In the proposed method,the signatures are expressed in the form of serial consistent sequences constructed by principal components instead of normally separated substrings in the original data extracted from the traditional methods.Extensive experiments based on numerous sets of data have been carried out to evaluate the performance of the proposed scheme,and the results prove that the newly proposed method can achieve good performance in terms of accuracy and efficiency.
基金supported by the National Natural Science Foundation of China(Nos.61178010and10805006)the Fundamental Research Funds for the Central Universities(No.bupt2010zx04)the China Postdoctoral Science Foundation(No.20100480508)
文摘A relatively simple plug-and-play control system of quantum key distribution (QKD) based on PCI7300 card is demonstrated, including mechanism design, key generation and key acquisition. The system works very well at the repetition frequency of 1 MHz, and the key generation rate is 100 k/s. A visibility of better than 95% over 50 km-long fiber at 1.31 gm is obtained, which is stable under ordinary lab conditions for 24 h without any feedback control or adjustment. The presented system is a quite promising candidate to realize the QKD in the future.