Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to...Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.展开更多
A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg e...A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO.展开更多
Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic ph...Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic phase before 1990’s, the majority of these projects planned before that period have not considered the effect of long term variation of water resources. In all of these numerous operational and under-construction projects, an intelligent selection of the best water transmission protocol, can help the governments to optimize their expenditures on these projects ,and also can help water resources managers to face climate change effects wisely. In this paper as a case study, Dez to Qomrood inter-basin water transfer project is considered to evaluate the efficiency of three different protocols in long term. The effect of climate change has been forecasted via a wide range of GCMs (Global Circulation Model) in order to calculate the change of flow in the basin's area with different climate scenarios. After these calculation, a water allocation model has been used to evaluate which of these three water transmission protocols (Proportional Allocation (PA), Fix Upstream allocation (FU), and Fix Downstream allocation (FD)) is the most efficient logic switch economically in a framework including both upstream and downstream stakeholders. As the final result, it can be inferred that Fix Downstream allocation (FD) protocol can supply more population especially with urban water for a fix expense and also is the most adapted protocol with future global change, at least in the first round of sustainability assessment.展开更多
A new medium access control protocol for MANs named DQCA(Distributed QueueCyclic Access)is presented in this paper.When the users of DQCA MAN transfer long files,the network will reach a steady state which is fair aft...A new medium access control protocol for MANs named DQCA(Distributed QueueCyclic Access)is presented in this paper.When the users of DQCA MAN transfer long files,the network will reach a steady state which is fair after a transient period.The transient pe-riod is shorter than that of DQDB.DQCA MAN has the flexibility in bandwidth allocation:the users can achieve different throughputs if the parameters,Pmax(i),are set to be differ-ent.The implementation of priority mechanism is simpler than that of DQDB.展开更多
The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direc...The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direction. The present paper is a brief report of the authors’ design methodologyand development of File Transfer Access and Management in reference to the ISO / OSI Moduleand implementation of its service protocol in a LAN,展开更多
With the goal of meeting one-to-many negotiation mechanism in the process of inter-basin water transfer, according to features of all interest subjects in analysis of inter-basin water transfer, a one-to-many synchron...With the goal of meeting one-to-many negotiation mechanism in the process of inter-basin water transfer, according to features of all interest subjects in analysis of inter-basin water transfer, a one-to-many synchronous bidding negotiation model based on bidding rules of game theory is structured, which analyzes and negotiates the functions, code of conduct and information expression of each subject. In order to optimize overall interests and individual interests, and a series of parameters in the negotiation, the paper propose various rules corresponding to the negotiation model so that the efficiency of each interest subject and fair distribution of negotiation proceeds can be safeguarded in the inter-basin water transfer system.展开更多
Concurrent multipath transfer(CMT) using stream control transmission protocol(SCTP) multihoming has become an appealing option to increase the throughput and improve the performance of increasingly bandwidth-hungr...Concurrent multipath transfer(CMT) using stream control transmission protocol(SCTP) multihoming has become an appealing option to increase the throughput and improve the performance of increasingly bandwidth-hungry applications.To investigate the rate allocation for applications in CMT,this paper analyzes the capacities of paths shared by competing sources,then proposes the rate allocation model for elastic flows based on the framework of network utility maximization(NUM).In order to obtain the global optimum of the model,a distributed algorithm is presented which depends only on local available information.Simulation results confirm that the proposed algorithm can achieve the global optimum within reasonable convergence times.展开更多
基金Supported by the National Natural Science Foundation of China(No.61501064)Sichuan Technology Support Program(No.2015GZ0088)
文摘Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.
基金supported by Opening Project of State Key Laboratory of Cryptology, Scientific Research and Postgraduate Training Cooperation Project-Scientific Research Base-New Theory of Block Cipher and Obfuscation and their Application Research, and Information Management and Professional Building of Information System
文摘A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO.
文摘Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic phase before 1990’s, the majority of these projects planned before that period have not considered the effect of long term variation of water resources. In all of these numerous operational and under-construction projects, an intelligent selection of the best water transmission protocol, can help the governments to optimize their expenditures on these projects ,and also can help water resources managers to face climate change effects wisely. In this paper as a case study, Dez to Qomrood inter-basin water transfer project is considered to evaluate the efficiency of three different protocols in long term. The effect of climate change has been forecasted via a wide range of GCMs (Global Circulation Model) in order to calculate the change of flow in the basin's area with different climate scenarios. After these calculation, a water allocation model has been used to evaluate which of these three water transmission protocols (Proportional Allocation (PA), Fix Upstream allocation (FU), and Fix Downstream allocation (FD)) is the most efficient logic switch economically in a framework including both upstream and downstream stakeholders. As the final result, it can be inferred that Fix Downstream allocation (FD) protocol can supply more population especially with urban water for a fix expense and also is the most adapted protocol with future global change, at least in the first round of sustainability assessment.
基金Supported by the Institute of Electronic Science of China and the National Natural Science Foundation of China.
文摘A new medium access control protocol for MANs named DQCA(Distributed QueueCyclic Access)is presented in this paper.When the users of DQCA MAN transfer long files,the network will reach a steady state which is fair after a transient period.The transient pe-riod is shorter than that of DQDB.DQCA MAN has the flexibility in bandwidth allocation:the users can achieve different throughputs if the parameters,Pmax(i),are set to be differ-ent.The implementation of priority mechanism is simpler than that of DQDB.
文摘The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direction. The present paper is a brief report of the authors’ design methodologyand development of File Transfer Access and Management in reference to the ISO / OSI Moduleand implementation of its service protocol in a LAN,
文摘With the goal of meeting one-to-many negotiation mechanism in the process of inter-basin water transfer, according to features of all interest subjects in analysis of inter-basin water transfer, a one-to-many synchronous bidding negotiation model based on bidding rules of game theory is structured, which analyzes and negotiates the functions, code of conduct and information expression of each subject. In order to optimize overall interests and individual interests, and a series of parameters in the negotiation, the paper propose various rules corresponding to the negotiation model so that the efficiency of each interest subject and fair distribution of negotiation proceeds can be safeguarded in the inter-basin water transfer system.
基金supported by the National Natural Science Foundation of China (60833002)the National Basic Research Program of China (973 Program) (2007CB307100)+2 种基金the National High Technology Research and Development Program of China (863 Program) (2007AA01Z202)the Program for Changjiang Scholars and Innovative Research Team in University (IRT0707)the Program of Introducing Talents of Discipline to Universities (111 Project) (B08002)
文摘Concurrent multipath transfer(CMT) using stream control transmission protocol(SCTP) multihoming has become an appealing option to increase the throughput and improve the performance of increasingly bandwidth-hungry applications.To investigate the rate allocation for applications in CMT,this paper analyzes the capacities of paths shared by competing sources,then proposes the rate allocation model for elastic flows based on the framework of network utility maximization(NUM).In order to obtain the global optimum of the model,a distributed algorithm is presented which depends only on local available information.Simulation results confirm that the proposed algorithm can achieve the global optimum within reasonable convergence times.