The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As an RFID application, e-ticket system is evolving as a ubiquitous infrastructure, commonly used for access control to some services like entrance to public transportations or some sports or cultural events. It presents lots of advantages, but brings numerous open issues that need to be addressed. Two open issues we mostly care about are security and cost issues. We propose an RFID security protocol...
The Radio Interferometric Positioning System (RIPS) provides a localization method with high accuracy and simple hardware configuration for sensor networks by means of measuring the phase difference of the interference signal. However, due to the periodicity of phase, it is hard to determine the actual distance difference only from a single phase measurement. To solve the problem, RIPS makes multiple...
Residue Number Systems (RNS) based on Chinese Remainder Theorem (CRT) permits the representation of large integers in terms of combinations of smaller ones. The set of all integers from 0 to M-1 with RNS representation and component wise modular addition and multiplication constitutes direct sum of smaller commutative rings. Encryption and decryption algorithm based on the properties of direct sum...
With the development of Internet technology, people can conveniently exchange and share image/video without the limit of time and space. In one image/video, some parts can be open to the public and some cannot or only can be open to specific people because of privacy issue. How to protect privacy information in the image/video has become more and more important. This paper proposes a content (image/video)...
In this paper, we propose two memoryless converters for the moduli set {22n+1 -1,22n,2n -1}. First, we propose a novel reverse converter, which is purely adder based, using the traditional Chinese remainder theorem (CRT). Second, due to the fact that the proposed CRT based structure does not cover the entire dynamic range, a second converter, which covers the entire dynamic range based on mixed radix...
In this paper the design of a balanced 8-modulus RNS system is presented. This RNS is based on the modulus set A = {2n-5 - 1, 2n-3 - 1, 2n-3 + 1, 2n-2 + 1, 2n-1 - 1, 2n-1 + 1, 2n, 2n + 1}; n = 2k, k = 4, 5, 6, ..., which comprises non co-prime moduli. The system is balanced, in the sense that adjacent moduli are of similar word length and achieve fast internal processing and dynamic ranges larger...
In this paper, we propose a new 4-moduli set {2n + 3, 2n + 2, 2n + 1, 2n} that increases the dynamic range and the processing parallelism enabling efficient reverse conversion. First, we assume a general 4-moduli set {mi}i=1,4, m1 > m2 > m3 > m4, with the dynamic range M = ??i=14 mi and introduce a modified Chinese remainder theorem (CRT) that requires mod-m4 instead of mod-M calculations...
Broadcast authentication is a critical security service in wireless sensor networks (WSNs). However, due to resource constrains of sensor nodes, providing authentication mechanism for broadcast message is difficult. ??TESLA is a lightweight broadcast authentication protocol, which use a one-way hash chain and the delayed disclosure of keys to provide the authentication service. However, it suffers...
In this paper two group signature schemes are developed using the Chinese remainder theorem, the first work is based on exponentiation of primitive root of a prime field and the second work is based on elliptic curves. A trusted authority is involved in the schemes for the construction of the group key and individual participant keys. The constructed keys are used as long run keys. The group signature...
Several applications benefited from multicast data distribution because a sender can concurrently transmit data to multiple receivers using fewer bandwidth. However, reliability is an important issue in multicast because retransmission is not very efficient in multicast. In recent years, Forward Error Correction (FEC) codes are proposed to facilitate reliable multicast data distribution and are applied...
The study of the knapsack PKC is important from both practical and theoretical standpoints. We proposed a double-sequence knapsack PKC on the basis of MH PKC. We also proposed a single-sequence knapsack PKC using the Chinese remainder theorem on the basis of this scheme. In this paper, we explain the double-sequence knapsack PKC and the single-sequence knapsack PKC. We describe examples of trapdoors...
A mobile ad hoc network (MANET) is an infrastructure-less system having no designated access points or routers and it has a dynamic topology. MANETs follow a distributed architecture, in which each node can move randomly in an area of operation. MANETs are vulnerable to various attacks. Security services in these kinds of networks are more complex than in traditional networks. In this paper, we implement...
Some variants of RSA, such as CRT-RSA, multifactor RSA, and rebalanced RSA, are desiged to speed up RSA decryption or encryption. In this work, the authors present four schemes, where the scale of the public key and the private key could be chosen by the user. For a 1024-bit modulus, the encryption of Scheme I and Scheme III are at least 4.3 times faster than that of in the original rebalanced CRT-RSA,...
The Chinese Remainder Theorem (CRT) is used for secret sharing by both Mignotte and Asmuth Bloom in 1983. Then Shyu et al. used Mignotte's scheme in the field of secret image sharing in 2008. However, their method use a Pseudo Random Number Generator (PRNG) with a seed to generate different pixel values for the consecutive secret pixels that have the same value. The need to distribute the seed and...
In a multicasting environment, group communications is essential. An important issue of providing secure group communications is group key management. The exclusion basis system (EBS) provides a framework for supporting group key management, especially in a large-size network. In EBS, a key server (KS) is used to generate both administration and session keys. In turn, KS uses these keys to distribute...
Cryptographic algorithm implementations are subject to specific attacks, called side channel attacks, focusing on the analysis of their power consumption or execution time or on the analysis of faulty computations. At FDTC06, Fumaroli and Vigilant presented a generic method to compute an exponentiation resistant against different side channel attacks. However, even if this algorithm does not reveal...
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of introducing privacy and security in such a practical surveillance system has been stifled by the enormous computational and communication overhead required by the solutions. In this paper, we propose an efficient framework to...
This chapter contains sections titled:
Introduction
How to Factor Numbers
How to Find the Period of a Function: The Magic Role of Entanglement
Analogy with Atom Optics
Exponential Growth of Hilbert Space as a Resource of Exponential Speedup
Conclusions
Modular Arithmetic
Chinese Remainder Theorem
Euler's Function
Euclidean Algorithm
Primitive Root
Probability for Lucky Choice
Elements of AtomOptics...
This paper proposes a novel data embedding method for embedding secrets into VQ indices by using the Chinese Remainder Theorem (CRT). In the experimental results, the hiding capacity is flexible which corresponds to the pre-defined prime parameters. In addition, a reversible mechanism is imported into the scheme so the original VQ indices can be restored after extracting secrets retrieval.
In this paper, we investigate Residue Number System (RNS) to decimal conversion for moduli sets with common factors. First, we propose a new RNS to decimal converter for the moduli set {2n+2; 2n+1; 2n} for any integer n > 0, which is a generalization of a recently proposed reverse converter for this moduli set. Second, we provide a general 4-moduli RNS conversion scheme and then present a compact...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.