Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key en...Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key encryption". It does this by signing and encr.ypting a message in a single step. An aggregate signcryption scheme allows individual signcryption ciphertexts intended for the same recipi- ent to be aggregated into a single (shorter) combined ciphertext without losing any of the security guarantees. We present an aggregate signcryption scheme in the identity-based setting using multilinear maps, and provide a proof of security in the standard model. To the best of our knowledge, our new scheme is the first aggregate signcryption scheme that is secure in the standard model.展开更多
Wireless communication and broadcasting convergence networks provide a potential solution to greater traffic throughput in the future. In this paper, the throughput of a convergence network is analyzed based on the st...Wireless communication and broadcasting convergence networks provide a potential solution to greater traffic throughput in the future. In this paper, the throughput of a convergence network is analyzed based on the standardization project for specific requirements for local and metropolitan area networks in China, referred to as broadband wireless multimedia systems. The convergence network is modeled as a combination of a broadcasting channel and a multi-access channel with interference. The throughput is then given as a function of the time resource allocation by calculating the channel capacity with interference. The maximum throughput and the optimal time resource allocation are then determined for a given delay constraint and traffic requirements. The results give guidelines for time resource allocation and system design for convergence networks.展开更多
We describe briefly here the recent R&D activities in the optical subassembly packaging technologies at the Hong Kong Applied Science and Technology Research Institute (ASTRI). We have designed, developed and prot...We describe briefly here the recent R&D activities in the optical subassembly packaging technologies at the Hong Kong Applied Science and Technology Research Institute (ASTRI). We have designed, developed and prototyped multiple of low-cost high performance packages for serial and parallel transmitters and receivers, in particular, the novel chip-in-plastic (CiP) package designed for 10G serial transmission for data communications.展开更多
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ...White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment.展开更多
Past research has demonstrated that a sampled phase-only hologram (SPOH) is capable of representing an image without the magnitude component of the hologram. At present, an SPOH can only record and reconstruct a singl...Past research has demonstrated that a sampled phase-only hologram (SPOH) is capable of representing an image without the magnitude component of the hologram. At present, an SPOH can only record and reconstruct a single source image. In this Letter, we propose, for the first time, to the best of our knowledge, a method for representing multiple images with a single integrated SPOH (ISPOH). Subsequently, each image can be retrieved from the ISPOH with a unique key parameter and displayed as a visible image on a phase-only spatial light modulator.展开更多
文摘Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key encryption". It does this by signing and encr.ypting a message in a single step. An aggregate signcryption scheme allows individual signcryption ciphertexts intended for the same recipi- ent to be aggregated into a single (shorter) combined ciphertext without losing any of the security guarantees. We present an aggregate signcryption scheme in the identity-based setting using multilinear maps, and provide a proof of security in the standard model. To the best of our knowledge, our new scheme is the first aggregate signcryption scheme that is secure in the standard model.
基金Supported by ASTRI-Tsinghua BMC Joint Lab and NSFC/RGC Project (No.60618001)
文摘Wireless communication and broadcasting convergence networks provide a potential solution to greater traffic throughput in the future. In this paper, the throughput of a convergence network is analyzed based on the standardization project for specific requirements for local and metropolitan area networks in China, referred to as broadband wireless multimedia systems. The convergence network is modeled as a combination of a broadcasting channel and a multi-access channel with interference. The throughput is then given as a function of the time resource allocation by calculating the channel capacity with interference. The maximum throughput and the optimal time resource allocation are then determined for a given delay constraint and traffic requirements. The results give guidelines for time resource allocation and system design for convergence networks.
文摘We describe briefly here the recent R&D activities in the optical subassembly packaging technologies at the Hong Kong Applied Science and Technology Research Institute (ASTRI). We have designed, developed and prototyped multiple of low-cost high performance packages for serial and parallel transmitters and receivers, in particular, the novel chip-in-plastic (CiP) package designed for 10G serial transmission for data communications.
基金supported by the Beijing Natural Science Foundation(4232034)the Fundamental Research Funds for the Central Universities(328202222)the“Communication Engineering”and“Electronic Information Engineering”National First-Class Undergraduate Major Construction Project。
文摘White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment.
文摘Past research has demonstrated that a sampled phase-only hologram (SPOH) is capable of representing an image without the magnitude component of the hologram. At present, an SPOH can only record and reconstruct a single source image. In this Letter, we propose, for the first time, to the best of our knowledge, a method for representing multiple images with a single integrated SPOH (ISPOH). Subsequently, each image can be retrieved from the ISPOH with a unique key parameter and displayed as a visible image on a phase-only spatial light modulator.