The search functionality is under construction.

Author Search Result

[Author] Qiaoyan WEN(17hit)

1-17hit
  • New General Constructions of LCZ Sequence Sets Based on Interleaving Technique and Affine Transformations

    Xuan ZHANG  Qiaoyan WEN  Jie ZHANG  

     
    PAPER-Communication Theory and Signals

      Vol:
    E93-A No:5
      Page(s):
    942-949

    In this paper, we propose four new general constructions of LCZ/ZCZ sequence sets based on interleaving technique and affine transformations. A larger family of LCZ/ZCZ sequence sets with longer period are generated by these constructions, which are more flexible among the selection of the alphabet size, the period of the sequences and the length of LCZ/ZCZ, compared with those generated by the known constructions. Especially, two families of the newly constructed sequences can achieve or almost achieve the theoretic bound.

  • A General Construction of Sequences with Good Autocorrelation over the 16-QAM Constellation

    Xuan ZHANG  Jing QIN  Qiaoyan WEN  Jie ZHANG  

     
    LETTER-Coding Theory

      Vol:
    E95-A No:10
      Page(s):
    1801-1805

    In this paper, we introduce a construction of 16-QAM sequences based on known binary sequences using multiple sequences, interleaved sequences and Gray mappings. Five kinds of binary sequences of period N are put into the construction to get five kinds of new 16-QAM sequences of period 4N. These resultant sequences have 5-level autocorrelation {0, ±8, ±8N}, where ±8N happens only once each. The distributions of the periodic autocorrelation are also given. These will provide more choices for many applications.

  • New Constructions of Binary Sequences with Good Autocorrelation Based on Interleaving Technique

    Xiuwen MA  Qiaoyan WEN  Jie ZHANG  Xuan ZHANG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:12
      Page(s):
    2874-2878

    In this paper, we propose new constructions of binary sequences based on an interleaving technique. In our constructions, we make use of any binary sequences with ideal 2-level autocorrelation, a special shift sequence as well as the perfect binary sequence or sequence (0,1,1) in the interleaved structure to get the new sequences. Except for the most autocorrelation values of our new sequences, we find that the unexpected autocorrelation values only occur four or two times in each period no matter how long the period is. We state that the sequences have a good autocorrelation in this case. In particular, the autocorrelation distribution of our sequences is determined.

  • Construction and Counting of 1-Resilient Rotation Symmetric Boolean Functions on pq Variables

    Jiao DU  Qiaoyan WEN  Jie ZHANG  Shanqi PANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:7
      Page(s):
    1653-1656

    In this letter, a property of the characteristic matrix of the Rotation Symmetric Boolean Functions (RSBFs) is characterized, and a sufficient and necessary condition for RSBFs being 1st correlation-immune (1-CI for simplicity) is obtained. This property is applied to construct resilient RSBFs of order 1 (1-resilient for simplicity) on pq variables, where p and q are both prime consistently in this letter. The results show that construction and counting of 1-resilient RSBFs on pq variables are equivalent to solving an equation system and counting the solutions. At last, the counting of all 1-resilient RSBFs on pq variables is also proposed.

  • New Construction of Symmetric Orthogonal Arrays of Strength t

    Jiao DU  Qiaoyan WEN  Jie ZHANG  Xin LIAO  

     
    LETTER-Coding Theory

      Vol:
    E96-A No:9
      Page(s):
    1901-1904

    Orthogonal arrays have important applications in statistics and computer science, as well as in coding theory. In this letter, a new construction method of symmetric orthogonal arrays of strength t is proposed, which is a concatenation of two orthogonal partitions according to a latin square. As far as we know, this is a new construction of symmetric orthogonal arrays of strength t, where t is a given integer. Based on the different latin squares, we also study the enumeration problem of orthogonal partitions, and a lower bound on the count of orthogonal partitions is derived.

  • Linear Complexity of Generalized Cyclotomic Binary Sequences with Period 2pm+1qn+1

    Dandan LI  Qiaoyan WEN  Jie ZHANG  Liying JIANG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:6
      Page(s):
    1244-1254

    The linear complexity of binary sequences plays a fundamental part in cryptography. In the paper, we construct more general forms of generalized cyclotomic binary sequences with period 2pm+1qn+1. Furthermore, we establish the formula of the linear complexity of proposed sequences. The results reveal that such sequences with period 2pm+1qn+1 have a good balance property and high linear complexity.

  • 2-Adic Complexity of Self-Shrinking Sequence

    Huijuan WANG  Qiaoyan WEN  Jie ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:11
      Page(s):
    2462-2465

    This paper studies the 2-adic complexity of the self-shrinking sequence under the relationship between 2-adic integers and binary sequences. Based on the linear complexity and the number of the sequences which have the same connection integer, we conclude that the 2-adic complexity of the self-shrinking sequence constructed by a binary m-sequence of order n has a lower bound 2n-2-1. Furthermore, it is shown that its 2-adic complexity has a bigger lower bound under some circumstances.

  • Quantum Steganography with High Efficiency with Noisy Depolarizing Channels

    Xin LIAO  Qiaoyan WEN  Tingting SONG  Jie ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:10
      Page(s):
    2039-2044

    Quantum steganography is to send secret quantum information through a quantum channel, such that an unauthorized user will not be aware of the existence of secret data. The depolarizing channel can hide quantum information by disguising it as channel errors of a quantum error-correcting code. We improve the efficiency of quantum steganography with noisy depolarizing channels, by modifying the twirling procedure and adding quantum teleportation. The proposed scheme not only meets the requirements of quantum steganography but also has higher efficiency.

  • Transparent Discovery of Hidden Service

    Rui WANG  Qiaoyan WEN  Hua ZHANG  Sujuan QIN  Wenmin LI  

     
    LETTER-Information Network

      Pubricized:
    2016/08/08
      Vol:
    E99-D No:11
      Page(s):
    2817-2820

    Tor's hidden services provide both sender privacy and recipient privacy to users. A hot topic in security of Tor is how to deanonymize its hidden services. Existing works proved that the recipient privacy could be revealed, namely a hidden server's real IP address could be located. However, the hidden service's circuit is bi-directionally anonymous, and the sender privacy can also be revealed. In this letter, we propose a novel approach that can transparently discover the client of the hidden service. Based on extensive analysis on the hidden service protocol, we find a combination of cells which can be used to generate a special traffic feature with the cell-padding mechanism of Tor. A user can implement some onion routers in Tor networks and monitor traffic passing through them. Once the traffic feature is discovered, the user confirms one of the controlled routers is chosen as the entry router, and the adjacent node is the client. Compared with the existing works, our approach does not disturb the normal communication of the hidden service. Simulations have demonstrated the effectiveness of our method.

  • New Constructions of Binary Sequences with Optimal Autocorrelation Magnitude Based on Interleaving Technique

    Xiuwen MA  Qiaoyan WEN  Jie ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E94-A No:8
      Page(s):
    1760-1763

    Recently, Yu, Gong and Tang found new constructions of binary sequences of period 4N with optimal autocorrelation magnitude by different interleaved structure of sequences and sequences which had special correlation property, respectively. In this paper, we derive more results on binary sequences of period 4N which also have optimal autocorrelation.

  • A General Construction of ZCZ Sequence Set with Large Family Size and Long Period

    Xuan ZHANG  Qiaoyan WEN  Jie ZHANG  

     
    LETTER-Digital Signal Processing

      Vol:
    E94-A No:1
      Page(s):
    420-423

    In this paper, we introduce a new general construction of zero correlation zone (ZCZ) sequence set, which is based on two given ZCZ sequence sets. Compared with the two given sequence sets, the resultant sequence set not only has larger family size and longer period, but also provides more flexible choices of basic sequences, ZCZ length and family size.

  • A Novel Protocol-Feature Attack against Tor's Hidden Service

    Rui WANG  Qiaoyan WEN  Hua ZHANG  Xuelei LI  

     
    PAPER-Network security

      Pubricized:
    2016/01/13
      Vol:
    E99-D No:4
      Page(s):
    839-849

    Tor is the most popular and well-researched low-latency anonymous communication network provides sender privacy to Internet users. It also provides recipient privacy by making TCP services available through “hidden service”, which allowing users not only to access information anonymously but also to publish information anonymously. However, based on our analysis of the hidden service protocol, we found a special combination of cells, which is the basic transmission unit over Tor, transmitted during the circuit creation procedure that could be used to degrade the anonymity. In this paper, we investigate a novel protocol-feature based attack against Tor's hidden service. The main idea resides in fact that an attacker could monitor traffic and manipulate cells at the client side entry router, and an adversary at the hidden server side could cooperate to reveal the communication relationship. Compared with other existing attacks, our attack reveals the client of a hidden service and does not rely on traffic analysis or watermarking techniques. We manipulate Tor cells at the entry router to generate the protocol-feature. Once our controlled entry onion routers detect such a feature, we can confirm the IP address of the client. We implemented this attack against hidden service and conducted extensive theoretical analysis and experiments over Tor network. The experiment results validate that our attack can achieve high rate of detection rate with low false positive rate.

  • Improving the Adaptive Steganographic Methods Based on Modulus Function

    Xin LIAO  Qiaoyan WEN  Jie ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:12
      Page(s):
    2731-2734

    This letter improves two adaptive steganographic methods in Refs. [5], [6], which utilize the remainders of two consecutive pixels to record the information of secret data. Through analysis, we point out that they perform mistakenly under some conditions, and the recipient cannot extract the secret data exactly. We correct these by enlarging the adjusting range of the remainders of two consecutive pixels within the block in the embedding procedure. Furthermore, the readjusting phase in Ref. [6] is improved by allowing every two-pixel block to be fully modified, and then the sender can select the best choice that introduces the smallest embedding distortion. Experimental results show that the improved method not only extracts secret data exactly but also reduces the embedding distortion.

  • New Perfect Gaussian Integer Sequences of Period pq

    Xiuwen MA  Qiaoyan WEN  Jie ZHANG  Huijuan ZUO  

     
    LETTER-Information Theory

      Vol:
    E96-A No:11
      Page(s):
    2290-2293

    In this letter, by using Whiteman's generalized cyclotomy of order 2 over Zpq, where p, q are twin primes, we construct new perfect Gaussian integer sequences of period pq.

  • A Novel Steganographic Method with Four-Pixel Differencing and Exploiting Modification Direction

    Xin LIAO  Qiaoyan WEN  Jie ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:7
      Page(s):
    1189-1192

    In this letter, a novel steganographic method with four-pixel differencing and exploiting modification direction is proposed. Secret data are embedded into each four-pixel block by adaptively applying exploiting modification direction technique. The difference value of the four-pixel block is used to judge whether the pixels in edge areas can tolerate larger changes than those in smooth areas. The readjustment guarantees to extract the secret data exactly and to minimize the embedding distortion. Since the proposed method processes non-overlapping 22 pixels blocks instead of two consecutive pixels, the features of edge can be considered sufficiently. Compared with the previous method, experimental results show that the proposed method provides better performance, i.e., larger embedding capacity and better image quality.

  • A General Construction of Low Correlation Zone Sequence Sets Based on Finite Fields and Balanced Function

    Huijuan ZUO  Qiaoyan WEN  Xiuwen MA  Jie ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E95-A No:10
      Page(s):
    1792-1795

    In this letter, we present a general construction of sequence sets with low correlation zone, which is based on finite fields and the balance property of some functions. The construction is more flexible as far as the partition of parameters is concerned. A simple example is also given to interpret the construction.

  • The Properties of the FCSR-Based Self-Shrinking Sequence

    Huijuan WANG  Qiaoyan WEN  Jie ZHANG  

     
    PAPER-Cryptography and Information Security

      Vol:
    E96-A No:2
      Page(s):
    626-634

    In the construction of a no-linear key-stream generator, self-shrinking is an established way of getting the binary pseudo-random periodic sequences in cryptography design. In this paper, using the theoretical analysis, we mainly study the self-shrinking sequence based on the l-sequence, and the theoretical results reflect its good cryptography properties accurately, such that it has the last period T = pe(p-1)/2 when T is an odd number, and the expected value of its autocorrelation belongs to {0,1/T and the variance is O(T/ln4T). Furthermore, we find that the 2-adic complexity of the self-shrinking sequence based on the l-sequence is large enough to resist the Rational Approximation attack.