The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An improved stream cipher based on the linear feedback shift register is set up by adding disturbance on to the initial states. The key advantage of the new algorithm over the already proposed ones is that the characters of the ciphertext corresponding to the same characters in the plaintext are distinct. The new algorithm also keeps all other advantages. Therefore, for the adversary, it is more difficult...
Attribute-based signature (ABS) is a new cryptographic primitive, in which a signer can sign a message with his attributes, and the verifier can only known whether the signer owns attributes satisfying his policy. Moreover, the signature cannot be forged by any user not having attributes satisfying the policy. ABS has many applications, such as anonymous authentication, and attribute-based messaging...
An asymmetric traitor tracing scheme based on Luc public key cryptosystem is proposed. The scheme uses Shamir's secret sharing scheme. Comparing with existed schemes, the new scheme has some advantages. Firstly, we use the Luc public key cryptosystem in the scheme to increase the security. Secondly, the length of user key and data header is short. The scheme is asymmetric which means data supplier...
This paper presents a data purification algorithm based on outlier mining. In order to implement the purifying of training data, we define the central bias function of complex events and dissimilarity function of event set, and put forward an exception set growth algorithm based on bias priority. Experiment proves that the algorithm can solve non-deterministic polynomial hard and control the algorithm...
An ID-based authenticated multi-party key agreement scheme without trusted PKG is proposed in this paper. The proposed scheme is ID-based, but without any assumption of prefixed trust relationship between members, which effectively solves the problem that exists in some existing ID-based key agreement protocols in which a trusted PKG and key escrow is needed. The proposed scheme employs shared password...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.