Anderson-Darling (AD) sensing, characteristic function (CF) sensing and order statistic (OS) sensing are three common spectrum sensing (SS) methods based on goodness of fit (GOF) testing. However, AD and OS ...Anderson-Darling (AD) sensing, characteristic function (CF) sensing and order statistic (OS) sensing are three common spectrum sensing (SS) methods based on goodness of fit (GOF) testing. However, AD and OS sensing needs the prior information of noise variance; CF and OS sensing have high computation complexity. To circumvent those difficulties, in this paper, the ratio of the mean square to variance (RM2V) of the samples, after deriving its probability density function (PDF), is employed as a test statistic to detect the availability of the vacant spectrum in the cognitive radio (CR) system. Then a blind SS method based on RM2V is proposed, which is dubbed as RM2V sensing, and its exact theoretical threshold is obtained via the derived PDF of RM2V. The performance of RM2V sensing is evaluated by theoretical analysis and Monte Carlo simulations. Comparing with the conventional energy detection (ED), AD, CF and OS sensing, RM2V sensing, with no need of noise variance, has advantages from the aspect of computation complexity and detection performance.展开更多
The traditional ciphertext policy attribute-based encryption(CP-ABE) has two problems: one is that the access policy must be embedded in the ciphertext and sent, which leads to the disclosure of user's privacy inf...The traditional ciphertext policy attribute-based encryption(CP-ABE) has two problems: one is that the access policy must be embedded in the ciphertext and sent, which leads to the disclosure of user's privacy information, the other is that it does not support collaborative decryption, which cannot meet the actual demand of conditional collaborative decryption among multiple users. In order to deal with the above two problems at the same time, a fine-grained cooperative access control scheme with hidden policies(FCAC-HP) is proposed based on the existing CP-ABE schemes combined with blockchain technology. In FCAC-HP scheme, users are grouped by group identifier so that only users within the same group can cooperate. In the data encryption stage, the access policy is encrypted and then embedded in the ciphertext to protect the privacy information of the access policy. In the data access stage, the anonymous attribute matching technology is introduced so that only matched users can decrypt ciphertext data to improve the efficiency of the system. In this process, a smart contract is used to execute the verification algorithm to ensure the credibility of the results. In terms of security, FCAC-HP scheme is based on the prime subgroup discriminative assumption and is proved to be indistinguishable under chosen plaintext attack(CPA) by dual system encryption technology. Experimental verification and analysis show that FCAC-HP scheme improves computational efficiency while implementing complex functions.展开更多
基金supported by Natural Science Foundation of China(6127127661301091)Natural Science Foundation of Shaanxi Province(2014JM8299)
文摘Anderson-Darling (AD) sensing, characteristic function (CF) sensing and order statistic (OS) sensing are three common spectrum sensing (SS) methods based on goodness of fit (GOF) testing. However, AD and OS sensing needs the prior information of noise variance; CF and OS sensing have high computation complexity. To circumvent those difficulties, in this paper, the ratio of the mean square to variance (RM2V) of the samples, after deriving its probability density function (PDF), is employed as a test statistic to detect the availability of the vacant spectrum in the cognitive radio (CR) system. Then a blind SS method based on RM2V is proposed, which is dubbed as RM2V sensing, and its exact theoretical threshold is obtained via the derived PDF of RM2V. The performance of RM2V sensing is evaluated by theoretical analysis and Monte Carlo simulations. Comparing with the conventional energy detection (ED), AD, CF and OS sensing, RM2V sensing, with no need of noise variance, has advantages from the aspect of computation complexity and detection performance.
基金supported by the National Natural Science Foundation of China (62072369,62072371,61772418)the Innovation Capability Support Program of Shaanxi (2020KJXX-052)+2 种基金the Shaanxi Special Support Program Youth Top-notch Talent Programthe Key Research and Development Program of Shaanxi (2020ZDLGY08-04,2021ZDLGY06-02)the Natural Science Basic Research Program of Shaanxi (2021JQ-722)。
文摘The traditional ciphertext policy attribute-based encryption(CP-ABE) has two problems: one is that the access policy must be embedded in the ciphertext and sent, which leads to the disclosure of user's privacy information, the other is that it does not support collaborative decryption, which cannot meet the actual demand of conditional collaborative decryption among multiple users. In order to deal with the above two problems at the same time, a fine-grained cooperative access control scheme with hidden policies(FCAC-HP) is proposed based on the existing CP-ABE schemes combined with blockchain technology. In FCAC-HP scheme, users are grouped by group identifier so that only users within the same group can cooperate. In the data encryption stage, the access policy is encrypted and then embedded in the ciphertext to protect the privacy information of the access policy. In the data access stage, the anonymous attribute matching technology is introduced so that only matched users can decrypt ciphertext data to improve the efficiency of the system. In this process, a smart contract is used to execute the verification algorithm to ensure the credibility of the results. In terms of security, FCAC-HP scheme is based on the prime subgroup discriminative assumption and is proved to be indistinguishable under chosen plaintext attack(CPA) by dual system encryption technology. Experimental verification and analysis show that FCAC-HP scheme improves computational efficiency while implementing complex functions.