In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ...In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.展开更多
The emergence of new display devices,such as organic light-emitting diodes,has brought about numerous advantages,including high material utilization,low cost,and high adaptability.These devices are manufactured using ...The emergence of new display devices,such as organic light-emitting diodes,has brought about numerous advantages,including high material utilization,low cost,and high adaptability.These devices are manufactured using inkjet printing and possess the potential to become a key technology for display transformations.However,a challenge in achieving this is the display effect that reveals uneven brightness and darkness,which can be avoided by controlling the volume of ink solution in a pixel to within 5%.Currently,the volume difference among the nozzles of commercial printheads does not meet the requirements for volume uniformity,thus challenging the printing process.Therefore,designing a suitable printing method that allows for the fusion of different volumes of ink droplets,ultimately reducing the error of the post fusion process,is necessary.In this study,we propose a print display droplet fusion scheduling method comprising two main steps.First,we use a dichotomous trust domain algorithm to obtain a feasible range of printhead docking point spacings for different nozzle and pixel panel resolutions.Second,we model the printing process as a droplet fusion scheduling model based on mixed integer programming,with the optimization objective of achieving intra pixel volume uniformity via ensuring the volume uniformity of ink droplets within all pixels.We verified this method through numerical simulations and printing experiments using 394 pixels per inch(ppi)pixel panels and successfully reduced the volume uniformity error among pixels to within 5%.展开更多
To ensure the integrity and security of cloud tenants' workload, and to prevent unexpected interference among tenants, cloud platform must make sure that system behaviors are trusted. By analyzing threats that exist ...To ensure the integrity and security of cloud tenants' workload, and to prevent unexpected interference among tenants, cloud platform must make sure that system behaviors are trusted. By analyzing threats that exist in the cloud platform, a novel trusted domain hierarchical model(TDHM) based on noninterference theory was proposed in this paper to solve these problems. First of all, the abstraction modeling of tenants' computing environment and trusted domain(TD) were introduced for designing TDHM with formal methods. Secondly, corresponding constraints for trusted running were given to satisfy security requirements of tenants' TD, and security properties of TDHM ware analyzed. After that, trusted behavior of TD was defined based on these properties, and the decision theorem of that was proved. It illustrated that the design and implementation of TD in cloud followed the model with characteristics of trusted behavior. Finally, the implementation of prototype system was introduced based on our previous work, and evaluation results showed that the performance loss was in the acceptable range.展开更多
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this pro...To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.展开更多
基金Acknowledgements This work was supported by Research Funds of Information Security Key Laboratory of Beijing Electronic Science & Technology Institute National Natural Science Foundation of China(No. 61070219) Building Together Specific Project from Beijing Municipal Education Commission.
文摘In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.
基金This work was supported by the National Natural Science Foundation of China(Grant No.51975236)the National Key Research and Development Program of China(Grant No.2018YFA0703203)Innovation Project of Optics Valley Laboratory(Grant No.OVL2021BG007).
文摘The emergence of new display devices,such as organic light-emitting diodes,has brought about numerous advantages,including high material utilization,low cost,and high adaptability.These devices are manufactured using inkjet printing and possess the potential to become a key technology for display transformations.However,a challenge in achieving this is the display effect that reveals uneven brightness and darkness,which can be avoided by controlling the volume of ink solution in a pixel to within 5%.Currently,the volume difference among the nozzles of commercial printheads does not meet the requirements for volume uniformity,thus challenging the printing process.Therefore,designing a suitable printing method that allows for the fusion of different volumes of ink droplets,ultimately reducing the error of the post fusion process,is necessary.In this study,we propose a print display droplet fusion scheduling method comprising two main steps.First,we use a dichotomous trust domain algorithm to obtain a feasible range of printhead docking point spacings for different nozzle and pixel panel resolutions.Second,we model the printing process as a droplet fusion scheduling model based on mixed integer programming,with the optimization objective of achieving intra pixel volume uniformity via ensuring the volume uniformity of ink droplets within all pixels.We verified this method through numerical simulations and printing experiments using 394 pixels per inch(ppi)pixel panels and successfully reduced the volume uniformity error among pixels to within 5%.
基金supported by the National Natural Science Foundation of China (61272447)the National Key Technology R&D Program of China (2012BAH18B05)the National New Generation Broadband Wireless Mobile Communication Network Major Project (03 Project) of China (12H1510)
文摘To ensure the integrity and security of cloud tenants' workload, and to prevent unexpected interference among tenants, cloud platform must make sure that system behaviors are trusted. By analyzing threats that exist in the cloud platform, a novel trusted domain hierarchical model(TDHM) based on noninterference theory was proposed in this paper to solve these problems. First of all, the abstraction modeling of tenants' computing environment and trusted domain(TD) were introduced for designing TDHM with formal methods. Secondly, corresponding constraints for trusted running were given to satisfy security requirements of tenants' TD, and security properties of TDHM ware analyzed. After that, trusted behavior of TD was defined based on these properties, and the decision theorem of that was proved. It illustrated that the design and implementation of TD in cloud followed the model with characteristics of trusted behavior. Finally, the implementation of prototype system was introduced based on our previous work, and evaluation results showed that the performance loss was in the acceptable range.
基金the National Natural Science Foundation of China (60775010)the National Basic Research Program of China (2007CB311100)+2 种基金the Doctor Science Research Foundation of BJUT (52007016200701)the Excellent Person Development Foundation of Beijing (20061D0501500191)the Foundation for Talents of BJTU (2008RC028)
文摘To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.