To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key w...To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient.展开更多
To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key...To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes .展开更多
Residual stress plays a vital role in the structural strength and stability. The determination of residual stress at single-point has become mature at present. However, the method to determine residual stress distribu...Residual stress plays a vital role in the structural strength and stability. The determination of residual stress at single-point has become mature at present. However, the method to determine residual stress distribution is still in shortage. For this problem, a finite element approach combined with slot milling method was developed in this study. In the method, firstly a slot is milled on the specimen surface to release the residual stress and then the released displacement field is measured by optical method, such as digital image correlation (DIC), finally the finite element approach is used to determine the residual stress distribution along the slot. In order to verify the feasibility of the method, it was applied to study the residual stress introduced by shot peening, mainly about the stress distribution along the direction vertical to the shot peened surface. Since the influence depth of shot peening was too small, we utilized focused ion beam (FIB) to determine the microscale residual stress distribution. The result measured by X-ray diffraction (XRD) demonstrated that the method was feasible to determine the residual stress distribution.展开更多
In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processi...In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads.展开更多
To improve the inlet performance of a ramjet working under variable conditions,a design is proposed by controlling the inlet with jet controlling,which combines the method of reducing the sealing Mach number of the ex...To improve the inlet performance of a ramjet working under variable conditions,a design is proposed by controlling the inlet with jet controlling,which combines the method of reducing the sealing Mach number of the external waves and the technique of controlling inlet by jet controlling.Three inlets were designed to analyze the feasibility and a numerical simulation method was used to simulate the three inlet flow fields.The adjustment mechanism of the design was studied through analysis of the simulation results.The design was verified by comparing the performances of the three inlets.The study showed that the method of reducing the sealing Mach number of the external wave system can improve the flow coefficient when the inlet works at low Mach numbers.The technique of controlling inlet by jet controlling can homogenize inlet flow fields at high Mach numbers,reduce effective throat area and increase the total pressure recovery(TPR).Adjustable inlets controlled by jet controlling demonstrate good performance at certain working ranges.展开更多
A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme with the special property that anyone is able to verify the shares whether they are correctly distributed by a dealer. PVSS pl...A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme with the special property that anyone is able to verify the shares whether they are correctly distributed by a dealer. PVSS plays an important role in many applications such as electronic voting, payment systems with revocable anonymity, and key escrow. Up to now, all PVSS schemes are based on the traditional public-key systems. Recently, the pairing-based cryptography has received much attention from cryp- tographic researchers. Many pairing-based schemes and protocols have been proposed. However, no PVSS scheme using bilinear pairings is proposed. This paper presents the first pairing-based PVSS scheme. In the random oracle model and under the bilinear Diffie-HeUman assumption, the authors prove that the proposed scheme is a secure PVSS scheme.展开更多
∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the f...∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the following difficult problems 1-3 and to construct three ettlcient cryptographic protocols 4 6:1) How to construct a protocol for proving a secret integer to be a Blum integer with form PQ, where P, Q are two different primes and both -- 3(mod 4);2) How to construct a protocol for proving a secret polynomial with exact degree t - 1 iil a (t, n)- threshold secret sharing scheme:3) How to construct witness indistinguishable and witness hiding protocol not from zero-knowledge proof;4) A publicly verifiable secret sharing scheme with information-theoretic security;5) A delegateable signature scheme under the existence of one-way permutations;6) Non-interactive universal designated verifier signature schemes.展开更多
基金The National High Technology Research and Development Program of China(863Program)(No.2001AA115300)the Natural Science Foundation of Liaoning Province(No.20031018,20062023)
文摘To prevent server compromise attack and password guessing attacks,an improved and efficient verifier-based key exchange protocol for three-party is proposed,which enables two clients to agree on a common session key with the help of the server.In this protocol,the client stores a plaintext version of the password,while the server stores a verifier for the password.And the protocol uses verifiers to authenticate between clients and the server.The security analysis and performance comparison of the proposed protocol shows that the protocol can resist many familiar attacks including password guessing attacks,server compromise attacks,man-in-the-middle attacks and Denning-Sacco attacks,and it is more efficient.
基金This research was supported partially by the National Natural Science Foundation of China under Grants No. 61103247, No. 6110209 the Natural Science Foundation of Fujian Province under Grant No. 2011J05147+1 种基金 the Research Foundation of Education Bureau of Fujian Province under Grant No. JBll017 the Foundation for Excellent Young Teachers of Fujian Normal University under Grant No. fjsdjk2012049.
文摘To solve the key escrow problem of the identity-based cryptosystem, Girault introduced the notion of a self-certified public key, which not only eliminates the need to authenticate a public key but also solves the key escrow problerrL This paper proposes a Self-Certified Signature (SCS) scheme with message recovery and two variants without using bilinear pairings: one is the authenticated encryption scheme in which only the designated re- ceiver can verify the signature, and the other is the authenticated encryption scheme with message linkage that deals with large messages. These three SCS schemes are provably secure in the random oracle model and are more efficient than previous schemes .
基金supported by the National Natural Science Foundation of China(Grant Nos.11672153,11232008 & 11227801)
文摘Residual stress plays a vital role in the structural strength and stability. The determination of residual stress at single-point has become mature at present. However, the method to determine residual stress distribution is still in shortage. For this problem, a finite element approach combined with slot milling method was developed in this study. In the method, firstly a slot is milled on the specimen surface to release the residual stress and then the released displacement field is measured by optical method, such as digital image correlation (DIC), finally the finite element approach is used to determine the residual stress distribution along the slot. In order to verify the feasibility of the method, it was applied to study the residual stress introduced by shot peening, mainly about the stress distribution along the direction vertical to the shot peened surface. Since the influence depth of shot peening was too small, we utilized focused ion beam (FIB) to determine the microscale residual stress distribution. The result measured by X-ray diffraction (XRD) demonstrated that the method was feasible to determine the residual stress distribution.
基金the National High Technology Research and Development Program (863) of China (Nos. 2006AA01Z436, 2007AA01Z455, and2007AA01Z473)
文摘In wireless sensor networks (WSNs), group key distribution is the core of secure communications since sensor nodes usually form groups and cooperate with each other in sensing data collection and in-network processing. In this paper, we present a scalable authenticated scheme for group key distribution based on a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication. The proposed scheme guarantees a lightweight authenticated group key updating procedure and is efficient in terms of storage, communication and computation overheads.
文摘To improve the inlet performance of a ramjet working under variable conditions,a design is proposed by controlling the inlet with jet controlling,which combines the method of reducing the sealing Mach number of the external waves and the technique of controlling inlet by jet controlling.Three inlets were designed to analyze the feasibility and a numerical simulation method was used to simulate the three inlet flow fields.The adjustment mechanism of the design was studied through analysis of the simulation results.The design was verified by comparing the performances of the three inlets.The study showed that the method of reducing the sealing Mach number of the external wave system can improve the flow coefficient when the inlet works at low Mach numbers.The technique of controlling inlet by jet controlling can homogenize inlet flow fields at high Mach numbers,reduce effective throat area and increase the total pressure recovery(TPR).Adjustable inlets controlled by jet controlling demonstrate good performance at certain working ranges.
文摘A publicly verifiable secret sharing (PVSS) scheme is a verifiable secret sharing scheme with the special property that anyone is able to verify the shares whether they are correctly distributed by a dealer. PVSS plays an important role in many applications such as electronic voting, payment systems with revocable anonymity, and key escrow. Up to now, all PVSS schemes are based on the traditional public-key systems. Recently, the pairing-based cryptography has received much attention from cryp- tographic researchers. Many pairing-based schemes and protocols have been proposed. However, no PVSS scheme using bilinear pairings is proposed. This paper presents the first pairing-based PVSS scheme. In the random oracle model and under the bilinear Diffie-HeUman assumption, the authors prove that the proposed scheme is a secure PVSS scheme.
基金supported by the Foundation of tihe National Natural Science of China under Grant Nos 90604034 (Key Project), 10726012, 10871222, 10531040,and 10471156
文摘∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the following difficult problems 1-3 and to construct three ettlcient cryptographic protocols 4 6:1) How to construct a protocol for proving a secret integer to be a Blum integer with form PQ, where P, Q are two different primes and both -- 3(mod 4);2) How to construct a protocol for proving a secret polynomial with exact degree t - 1 iil a (t, n)- threshold secret sharing scheme:3) How to construct witness indistinguishable and witness hiding protocol not from zero-knowledge proof;4) A publicly verifiable secret sharing scheme with information-theoretic security;5) A delegateable signature scheme under the existence of one-way permutations;6) Non-interactive universal designated verifier signature schemes.