1-9hit |
Jinyong CHANG Rui XUE Anling ZHANG
In this letter, we prove that the Kurosawa-Desmedt (KD) scheme [10], which belongs to the hybrid framework, is KDM-CCA secure w.r.t. an ensemble proposed by Qin et al. in [12] under the decisional Diffie-Hellman assumption. Since our proof does not rely on the random oracle model, we partially answer the question presented by Davies and Stam in [7], where they hope to achieve the KDM-CCA security for hybrid encryption scheme in the standard model (i.e. not random oracle model). Moreover, our result may also make sense in practice since KD-scheme is (almost) the most efficient CCA secure scheme.
Biling ZHANG Kai CHEN Jung-lang YU Shiduan CHENG
In cognitive radio networks, the primary user (PU) can lease a fraction of its licensed spectrum to the secondary users (SUs) in exchange for their cooperative transmission if it has a minimum transmission rate requirement and is experiencing a bad channel condition. However, due to the selfish nature of the SUs, they may not cooperate to meet the PU's Quality of Service (QoS) requirement. On the other hand, the SUs may not exploit efficiently the benefit from cooperation if they compete with each other and collaborate with the PU independently. Therefore, when SUs belong to the same organization and can work as a group, how to stimulate them to cooperate with the PU and thus guarantee the PU's QoS requirement, and how to coordinate the usage of rewarded spectrum among these SUs after cooperation are critical challenges. In this paper, we propose a two-level bargaining framework to address the aforementioned problems. In the proposed framework, the interactions between the PU and the SUs are modeled as the upper level bargaining game while the lower level bargaining game is used to formulate the SUs' decision making process on spectrum sharing. We analyze the optimal actions of the users and derive the theoretic results for the one-PU one-SU scenario. To find the solutions for the one-PU multi-SU scenario, we put forward a revised numerical searching algorithm and prove its convergence. Finally, we demonstrate the effectiveness and efficiency of the proposed scheme through simulations.
Tianyang DONG Jianwei SHI Jing FAN Ling ZHANG
Rule engine technologies have been widely used in the development of enterprise information systems. However, these rule-based systems may suffer the problem of low performance, when there is a large amount of facts data to be matched with the rules. The way of cluster or grid to construct rule engines can flexibly expand system processing capability by increasing cluster scale, and acquire shorter response time. In order to speed up pattern matching in rule engine, a double hash filter approach for alpha network, combined with beta node indexing, is proposed to improve Rete algorithm in this paper. By using fact type node in Rete network, a hash map about ‘fact type - fact type node’ is built in root node, and hash maps about ‘attribute constraint - alpha node’ are constructed in fact type nodes. This kind of double hash mechanism can speed up the filtration of facts in alpha network. Meanwhile, hash tables with the indexes calculated through fact objects, are built in memories of beta nodes, to avoid unnecessary iteration in the join operations of beta nodes. In addition, rule engine based on this improved Rete algorithm is applied in the enterprise information systems. The experimental results show that this method can effectively speed up the pattern matching, and significantly decrease the response time of the application systems.
Han MA Qiaoling ZHANG Roubing TANG Lu ZHANG Yubo JIA
Recently, robust speech recognition for real-world applications has attracted much attention. This paper proposes a robust speech recognition method based on the teacher-student learning framework for domain adaptation. In particular, the student network will be trained based on a novel optimization criterion defined by the encoder outputs of both teacher and student networks rather than the final output posterior probabilities, which aims to make the noisy audio map to the same embedding space as clean audio, so that the student network is adaptive in the noise domain. Comparative experiments demonstrate that the proposed method obtained good robustness against noise.
Jiuling ZHANG Beixing DENG Xing LI Xiao-lei ZHANG
Ranking the encrypted documents stored on secure cloud computing servers is becoming prominent with the expansion of the encrypted data collection. In our work, order preserving encryption is employed to pre-rank the encrypted documents. Paillier's additive homomorphic encryption is used to re-rank the top pre-ranked documents of some considerate scale.
Saad ALKHATEIB Tieling ZHANG Michio HORIGOME
There are two distinct types of maintenance action, namely preventive one and corrective one. Preventive maintenance is performed at regular intervals and can contribute significantly towards the increase of reliability and availability. It must be scheduled carefully in order that the availability is maximized through optimizing regular interval. On the other hand, corrective maintenance is performed when the system fails, and so the occurrence of corrective maintenance action is a random variable that cannot be predicted beforehand. From these considerations, it is clear that time is the most important factor in maintainability, and therefore, we classify maintenance data into two groups, that is, scheduled maintenance data and unscheduled maintenance one. Next, based on these classified data, we propose the new availability model which modifies Policy II proposed by R. Barlow and L. Hunter. Finally, we show the usefulness of the new model proposed here by applying these theoretical results to real data of some power plant.
The purpose of this note is to carry out study on a 3-out-of-4:G warm standby system with nonidentical components. By using Markov model, the general form solution of stationary availability of the system is obtained. Examples are given to illustrate the solutions of transient and stationary availability of such system.
Shuxia MA Hongling ZHANG Weidong JIN Xianhua NIU
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms compared with the linear block codes. The objective of this letter is to present a new family of ternary cyclic codes with parameters [3m-1,3m-1-2m,4], where m is an odd integer. The proposed cyclic codes are optimal in the sense that their parameters meet the Sphere Packing bound.
Meiling ZHANG Weiguo ZHANG Jingmei LIU Xinmei WANG
Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α,β). And a trade-off relation between the number of plaintexts and times of encryptions in the process of the attack is derived, which makes only some values of (α,β) allowed in the attack for different key length.