The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Undeniability is an essential security property of the traditional digital signature. Strong designated verifier signature(DSVS) is a special digital signature in where the validity of a signature can only be checked by the designated verifier. However, most strong DSVS schemes do not have the undeniability property which leads to dispute between a designated verifier and a signer. In this study,...
In a crowd model based on leader-follower interactions, where positions of the leaders are viewed as the control input, up-to-date solutions rely on knowledge of the agents' coordinates. In practice, it is more realistic to exploit knowledge of statistical properties of the group of agents, rather than their exact positions. In order to shape the crowd, we study thus the problem of controlling the...
Recently, Au et al. proposed a hierarchical identity-based signature scheme and Hu-Huang proposed a proxy key generation protocol. Based on the both schemes, we present a novel identity-based proxy signature scheme. The proposed scheme is provablly secure in the standard model and its security can be reduced to the hardness assumption of the g-strong Diffie-Hellman problem. Compared with all existing...
At Eurocrypt'02, Horwitz and Lynn first introduced the concept of HIBS. Till now, many HIBS schemes have been proposed. Recently (2011), Yang et al.'s proposed a hierarchical identity based signature (HIBS) scheme based on computational Diffie-Hellman (CDH) assumption in the standard model. They claimed that their scheme has more secure and more efficient than the existing HIBS schemes. However, we...
In this paper, an optimization-based adaptive Kalman filtering method is proposed. The method produces an estimate of the process noise covariance matrix Q by solving an optimization problem over a short window of data. The algorithm recovers the observations h(x) from a system x = f (x); y = h(x)+v without a priori knowledge of system dynamics. Potential applications include target tracking using...
Based on Gentry's identity based encryption, an identity based proxy re-encryption scheme is proposed and it is proved fully secure in the standard model under the truncated decision q-ABDHE (augmented bilinear Diffie-Hellman exponent) assumption with a tight security reduction and very compact public parameters. It is also very efficient and practical.
Based on Gentry' s identity based encryption, an identity based proxy re-signature scheme is proposed that is existentially unforgeable in the standard model under the q-SDH (Strong Diffie-Hellman) assumption. Comparison with all previous proxy re-signature schemes, the proposed scheme has a tight security reduction and very compact public parameters. It is also very efficient and practical.
To specify dataflow applications efficiently is one of the greatest challenges facing Network-on-Chip (NoC) simulation and exploration. BTS (Behavior-level Traffic Simulation) was proposed to specify behavior-level applications more efficiently than conventional message-passing programming model does. To alleviate the complexity in parallel programming, BTS has the computation tasks implemented as...
A proxy re-encryption scheme allows the proxy to transform ciphertext computed under one public key into the different ciphertext that can be decrypted by using another public key. Recently, many identity-based proxy re-encryption schemes have been proposed. However, all of these schemes are only proved secure in the random oracle not in the standard model. In this paper, Based on Waters's identity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.