9-intersection model is the most popular framework used for formalizing the spatial relations between two spatial objectsA andB. It transforms the topological relationships between two simple spatial objectsA andB int...9-intersection model is the most popular framework used for formalizing the spatial relations between two spatial objectsA andB. It transforms the topological relationships between two simple spatial objectsA andB into point-set topology problem in terms of the intersections ofA’s boundary (?A), interior (A 0) and (A ?) withB’s boundary (?B), interior (B 0) and exterior (B ?). It is shown in this paper that there exist some limitations of the original 9-intersection model due to its definition of an object’s exterior as its complement, and it is difficult to distinguish different disjoint relations and relations between complex objects with holes, difficult or even impossible to compute the intersections with the two object’s complements (?A∩B ?,A 0∩?B ?,A ?∩?B,A ?∩B 0 andA ?∩B ?)since the complements are infinitive. The authors suggest to re-define the exterior of spatial object by replacing the complement with its Voronoi region. A new Voronoi-based 9-intersection (VNI) is proposed and used for formalizing topological relations between spatial bojects. By improving the 9-intersection model, it is now possible to distinguish disjoint relations and to deal with objects with holes. Also it is possible to compute the exterior-based intersections and manipulate spatial relations with the VNI.展开更多
支持等式测试的标识加密(identity-based encryption with equality test, IBEET)体制解决了传统等式测试方案中证书管理的问题,得到了广泛的关注.但现有的IBEET体制难以抵抗渗透攻击,且都是基于国外密码算法设计,不具有自主知识产权....支持等式测试的标识加密(identity-based encryption with equality test, IBEET)体制解决了传统等式测试方案中证书管理的问题,得到了广泛的关注.但现有的IBEET体制难以抵抗渗透攻击,且都是基于国外密码算法设计,不具有自主知识产权.基于此,提出一种支持等式测试并具有密码逆向防火墙的SM9标识加密方案(SM9 identity-based encryption scheme with equality test and cryptographic reverse firewalls, SM9-IBEET-CRF).该方案在用户与云服务器的上行信道间部署密码逆向防火墙(cryptographic reverse firewalls,CRF),对用户发出的信息执行重随机化以达到抵抗渗透攻击的作用.该方案拓展国密算法SM9至IBEET领域中,提升其运行效率并丰富国密算法在云计算领域的研究.给出了SM9-IBEET-CRF的形式化定义和安全模型,并在随机预言机模型中考虑2种不同的敌手将此方案在选择密文攻击下的不可区分性与单向性分别形式化地规约到BDH困难假设上.同时,该方案通过考虑第3种敌手证明CRF的部署为其带来维持功能性、保留安全性以及抵抗渗透性.实验仿真和分析结果展示了该方案的有效性.展开更多
基金Project supported by the National Natural Science Foundation of China(No.49471059)
文摘9-intersection model is the most popular framework used for formalizing the spatial relations between two spatial objectsA andB. It transforms the topological relationships between two simple spatial objectsA andB into point-set topology problem in terms of the intersections ofA’s boundary (?A), interior (A 0) and (A ?) withB’s boundary (?B), interior (B 0) and exterior (B ?). It is shown in this paper that there exist some limitations of the original 9-intersection model due to its definition of an object’s exterior as its complement, and it is difficult to distinguish different disjoint relations and relations between complex objects with holes, difficult or even impossible to compute the intersections with the two object’s complements (?A∩B ?,A 0∩?B ?,A ?∩?B,A ?∩B 0 andA ?∩B ?)since the complements are infinitive. The authors suggest to re-define the exterior of spatial object by replacing the complement with its Voronoi region. A new Voronoi-based 9-intersection (VNI) is proposed and used for formalizing topological relations between spatial bojects. By improving the 9-intersection model, it is now possible to distinguish disjoint relations and to deal with objects with holes. Also it is possible to compute the exterior-based intersections and manipulate spatial relations with the VNI.
文摘支持等式测试的标识加密(identity-based encryption with equality test, IBEET)体制解决了传统等式测试方案中证书管理的问题,得到了广泛的关注.但现有的IBEET体制难以抵抗渗透攻击,且都是基于国外密码算法设计,不具有自主知识产权.基于此,提出一种支持等式测试并具有密码逆向防火墙的SM9标识加密方案(SM9 identity-based encryption scheme with equality test and cryptographic reverse firewalls, SM9-IBEET-CRF).该方案在用户与云服务器的上行信道间部署密码逆向防火墙(cryptographic reverse firewalls,CRF),对用户发出的信息执行重随机化以达到抵抗渗透攻击的作用.该方案拓展国密算法SM9至IBEET领域中,提升其运行效率并丰富国密算法在云计算领域的研究.给出了SM9-IBEET-CRF的形式化定义和安全模型,并在随机预言机模型中考虑2种不同的敌手将此方案在选择密文攻击下的不可区分性与单向性分别形式化地规约到BDH困难假设上.同时,该方案通过考虑第3种敌手证明CRF的部署为其带来维持功能性、保留安全性以及抵抗渗透性.实验仿真和分析结果展示了该方案的有效性.