The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose an area efficient reverse converter for the moduli set {2n, 22n+1 − 1, 2n −1}. We show that the required multiplicative inverses are either unity or powers of two and that their computation can be eliminated. Theoretical analysis shows that the proposed scheme outperforms all state of the art equivalent converters.
In recent years, researchers has proposed (t, n)-threshold image secret sharing and hiding schemes with authentication. The secret image is shared and hided into typical cover images to form the stego images so that to be transmitted securely. Unfortunately, there is a common week point that each stego image should be extended to 4/t times of the secret image. Recently, a (t, n)-threshold image secret...
A technique, based on the residue number system (RNS) with diminished-1 encoded channel, has being used for implementing a finite impulse response (FIR) digital filter. The proposed RNS architecture of the filter consists of three main blocks: forward and reverse converter and arithmetic processor for each channel. Architecture for residue to binary (reverse) convertor with diminished-1 encoded channel...
With the rapid development of MANET, the secure and practical authentication problem in it increasingly becomes outstanding. The existing work study the problem from two aspects, i.e. secure key division/distributed storage and secure distributed authentication. But existing cheating problems and fault attack possibility will break the security. Besides, efficiency performance of such schemes is not...
We propose a Chinese remainder theorem (CRT)-based computationally efficient self-recovery watermarking technique for multimedia applications. Taking few examples of digital images we have shown that the proposed technique can recover the tampered region in the watermarked image quite effectively. Using an optimal quantizing technique we generate a 21-bit watermark from the DCT coefficients of an...
This paper presents a simple but novel Cryptography system that is based on Chinese remainder theorem. This scheme is the one that uses little or limited computation power for encryption and much lesser requirements for decryption. Also space requirements will not add any more cost as many other systems. Also it is secure for use as good alternate encryption system to deal with multiple secrets and...
In document authentication, the context refers to the ability to trace the origins of a document to a given person, the device that produced it, or the time and/or place it was produced. Forgeries pose significant dangers in terms of authentication and trust. Therefore, it is essential to maintain the integrity of important documents to prevent document content modification by an intruder. Here, we...
This paper proposes a new weighted threshold signature based on Iftene's general secret sharing scheme and the RSA threshold signature, which is itself based on the Chinese reminder theorem. In our scheme, group members are divided into different subgroups, and a positive weight is associated to each subgroup, where all members of the same subgroup have the same weight. The group signature can be...
A hierarchical threshold scheme is a scheme to solve the secret sharing with a hierarchical access structure where participants are partitioned into different levels. In the past hierarchical threshold scheme participants are partitioned based on a single attribute. But in practice, each participant always has several attributes, and the group of participants always should be partitioned based on...
Generalized robust Chinese remainder theorem has been proposed to reconstruct one positive real number when all the moduli have a common factor and the remainders have errors. In this paper, we consider the generalized robust Chinese remainder theorem to reconstruct multiple numbers when all the moduli have a common factor and all residue sets have errors. We apply the newly proposed theorem to multiple...
Nowadays, data outsourcing has become a solution for many organizations especially large scale enterprises due to the high costs of in-house management of the rapidly growing data. Among all security requirements in this context, user access control and its following dynamic changes are of interest. In this paper, we propose an efficient and reliable mechanism to solve this problem in owner-write-users-read...
Authentication in Wireless Sensor Networks (WSNs) is a challenging process. Providing authentication for the Nodes in WSN is a vital issue in Secure Group communication among WSNs. Massive group of tiny sensor Nodes form WSNs and these are placed in open, unattended milieu. Due to this reason, Nodes in WSN can endure exclusive encounters. WSNs are more vulnerable to active and passive attacks than...
This article summarizes the current state-of-the-art on combined random number generators (CRNGs). The main goal is to learn the development of CRNGs and summarize the knowledge we have learnt from the Random Number Generation class. It recalls the basic ideas, discusses various popular classes of random number generators, and provides details of several well known combined random number generators,...
This paper presents parallel extended operations of point-addition and point-double for cryptosystem on conic curves over ring Zn. The data dependencies are deduced by analyzing the definitions of two extended operations. Take procedure of paralleling extended point-addition as an example. We employ the Chinese Remainder Theorem to divide point-addition over ring Zn into two point-additions over finite...
In this paper, a novel digital rights management system based on cloud computing and dynamic secure permission is proposed, according to the problems existed in current DRM system and new requirements of consumes. This scheme embeds the second watermark which is jointly created by all the parties involved based on the Chinese remainder theorem, to realize reliable right tracing and detection; It manages...
This article proposed one kind of new phase difference solution fuzzy algorithm, this method choice base length satisfies certain diverse relations, thus increased the most greatly not fuzzy angle greatly, has solved the direction finding precision and most greatly between not the fuzzy angle contradiction. The simulation result has indicated the theoretical analysis accuracy.
This paper presents parallel point-multiplication on conic curves based on standard NAF algorithm and Chinese Remainder Theorem. All analysis of parallel methodologies should take advantage of the basic parallel algorithms of conic curves cryptosystem in our previous works. We employ standard NAF algorithm to parallel the point-multiplication over finite field Fp by adopting the pipeline technique...
Residue number system (RNS) is generally an integer number system. The foremost canonical reason for implementation of filter in residue arithmetic is the inherent property of carry-free addition, subtraction and multiplication. As a result we add, subtract and multiply in unison regardless to the numbers. Hereby, devices operating in this principle are fast and ingest low power. However, principal...
Nowadays, instant messaging (IM) represents the most used messaging service for both home and corporate users. IM is used in many different application fields. Thus, it is an effective and easy means of network-based communication. Unfortunately, this technology does not provide built-in support for security features. This paper proposes a new and secure instant messaging protocol for a centralized...
In this paper, we propose a new key distribution scheme for the flexible chipset pairing. Chipset pairing is the system that smartcard outputs encrypted CW (Control Word) to the STB, and the STB decrypts an encrypted CW by using the embedded secure chip. The drawback of this chipset pairing is that one smartcard is able to use for only one specified STB since it is the system using the STB bound to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.