The search functionality is under construction.

Author Search Result

[Author] Ling ZHANG(9hit)

1-9hit
  • The KDM-CCA Security of the Kurosawa-Desmedt Scheme

    Jinyong CHANG  Rui XUE  Anling ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:4
      Page(s):
    1032-1037

    In this letter, we prove that the Kurosawa-Desmedt (KD) scheme [10], which belongs to the hybrid framework, is KDM-CCA secure w.r.t. an ensemble proposed by Qin et al. in [12] under the decisional Diffie-Hellman assumption. Since our proof does not rely on the random oracle model, we partially answer the question presented by Davies and Stam in [7], where they hope to achieve the KDM-CCA security for hybrid encryption scheme in the standard model (i.e. not random oracle model). Moreover, our result may also make sense in practice since KD-scheme is (almost) the most efficient CCA secure scheme.

  • Two-Level Bargaining Game Modeling for Cooperation Stimulation in Spectrum Leasing

    Biling ZHANG  Kai CHEN  Jung-lang YU  Shiduan CHENG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E96-B No:7
      Page(s):
    1953-1961

    In cognitive radio networks, the primary user (PU) can lease a fraction of its licensed spectrum to the secondary users (SUs) in exchange for their cooperative transmission if it has a minimum transmission rate requirement and is experiencing a bad channel condition. However, due to the selfish nature of the SUs, they may not cooperate to meet the PU's Quality of Service (QoS) requirement. On the other hand, the SUs may not exploit efficiently the benefit from cooperation if they compete with each other and collaborate with the PU independently. Therefore, when SUs belong to the same organization and can work as a group, how to stimulate them to cooperate with the PU and thus guarantee the PU's QoS requirement, and how to coordinate the usage of rewarded spectrum among these SUs after cooperation are critical challenges. In this paper, we propose a two-level bargaining framework to address the aforementioned problems. In the proposed framework, the interactions between the PU and the SUs are modeled as the upper level bargaining game while the lower level bargaining game is used to formulate the SUs' decision making process on spectrum sharing. We analyze the optimal actions of the users and derive the theoretic results for the one-PU one-SU scenario. To find the solutions for the one-PU multi-SU scenario, we put forward a revised numerical searching algorithm and prove its convergence. Finally, we demonstrate the effectiveness and efficiency of the proposed scheme through simulations.

  • An Improved Rete Algorithm Based on Double Hash Filter and Node Indexing for Distributed Rule Engine

    Tianyang DONG  Jianwei SHI  Jing FAN  Ling ZHANG  

     
    PAPER

      Vol:
    E96-D No:12
      Page(s):
    2635-2644

    Rule engine technologies have been widely used in the development of enterprise information systems. However, these rule-based systems may suffer the problem of low performance, when there is a large amount of facts data to be matched with the rules. The way of cluster or grid to construct rule engines can flexibly expand system processing capability by increasing cluster scale, and acquire shorter response time. In order to speed up pattern matching in rule engine, a double hash filter approach for alpha network, combined with beta node indexing, is proposed to improve Rete algorithm in this paper. By using fact type node in Rete network, a hash map about ‘fact type - fact type node’ is built in root node, and hash maps about ‘attribute constraint - alpha node’ are constructed in fact type nodes. This kind of double hash mechanism can speed up the filtration of facts in alpha network. Meanwhile, hash tables with the indexes calculated through fact objects, are built in memories of beta nodes, to avoid unnecessary iteration in the join operations of beta nodes. In addition, rule engine based on this improved Rete algorithm is applied in the enterprise information systems. The experimental results show that this method can effectively speed up the pattern matching, and significantly decrease the response time of the application systems.

  • Robust Speech Recognition Using Teacher-Student Learning Domain Adaptation

    Han MA  Qiaoling ZHANG  Roubing TANG  Lu ZHANG  Yubo JIA  

     
    PAPER-Speech and Hearing

      Pubricized:
    2022/09/09
      Vol:
    E105-D No:12
      Page(s):
    2112-2118

    Recently, robust speech recognition for real-world applications has attracted much attention. This paper proposes a robust speech recognition method based on the teacher-student learning framework for domain adaptation. In particular, the student network will be trained based on a novel optimization criterion defined by the encoder outputs of both teacher and student networks rather than the final output posterior probabilities, which aims to make the noisy audio map to the same embedding space as clean audio, so that the student network is adaptive in the noise domain. Comparative experiments demonstrate that the proposed method obtained good robustness against noise.

  • Secure Ranking over Encrypted Documents

    Jiuling ZHANG  Beixing DENG  Xing LI  Xiao-lei ZHANG  

     
    LETTER

      Vol:
    E95-D No:12
      Page(s):
    2954-2955

    Ranking the encrypted documents stored on secure cloud computing servers is becoming prominent with the expansion of the encrypted data collection. In our work, order preserving encryption is employed to pre-rank the encrypted documents. Paillier's additive homomorphic encryption is used to re-rank the top pre-ranked documents of some considerate scale.

  • A Proposal of Availability Model and Its Applications

    Saad ALKHATEIB  Tieling ZHANG  Michio HORIGOME  

     
    PAPER

      Vol:
    E83-A No:5
      Page(s):
    828-834

    There are two distinct types of maintenance action, namely preventive one and corrective one. Preventive maintenance is performed at regular intervals and can contribute significantly towards the increase of reliability and availability. It must be scheduled carefully in order that the availability is maximized through optimizing regular interval. On the other hand, corrective maintenance is performed when the system fails, and so the occurrence of corrective maintenance action is a random variable that cannot be predicted beforehand. From these considerations, it is clear that time is the most important factor in maintainability, and therefore, we classify maintenance data into two groups, that is, scheduled maintenance data and unscheduled maintenance one. Next, based on these classified data, we propose the new availability model which modifies Policy II proposed by R. Barlow and L. Hunter. Finally, we show the usefulness of the new model proposed here by applying these theoretical results to real data of some power plant.

  • Availability of 3-out-of-4:G Warm Standby System

    Tieling ZHANG  Michio HORIGOME  

     
    LETTER

      Vol:
    E83-A No:5
      Page(s):
    857-862

    The purpose of this note is to carry out study on a 3-out-of-4:G warm standby system with nonidentical components. By using Markov model, the general form solution of stationary availability of the system is obtained. Examples are given to illustrate the solutions of transient and stationary availability of such system.

  • A New Family of Optimal Ternary Cyclic Codes

    Shuxia MA  Hongling ZHANG  Weidong JIN  Xianhua NIU  

     
    LETTER-Coding Theory

      Vol:
    E97-A No:2
      Page(s):
    690-693

    Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms compared with the linear block codes. The objective of this letter is to present a new family of ternary cyclic codes with parameters [3m-1,3m-1-2m,4], where m is an odd integer. The proposed cyclic codes are optimal in the sense that their parameters meet the Sphere Packing bound.

  • General Impossible Differential Attack on 7-Round AES

    Meiling ZHANG  Weiguo ZHANG  Jingmei LIU  Xinmei WANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E93-A No:1
      Page(s):
    327-330

    Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α,β). And a trade-off relation between the number of plaintexts and times of encryptions in the process of the attack is derived, which makes only some values of (α,β) allowed in the attack for different key length.