A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
|
|
|
- Ellen McCoy
- 10 years ago
- Views:
Transcription
1 INFORMATICA, 2000, Vol. 11, No. 2, Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc Ju-Ln LU Department of Informaton Management, Chaoyang Unversty of Technology 168, Gfeng E. Rd., Wufeng, Tachung County, Tawan 413, R.O.C. e-mal: [email protected] Receved: December 1999 Abstract. In the (t, n) proxy sgnature scheme, the sgnature, orgnally sgned by a sgner, can be sgned by t or more proxy sgners out of a proxy group of n members. Recently, an effcent nonrepudable threshold proxy sgnature scheme wth known sgners was proposed by H.-M. Sun. Sun s scheme has two advantages. One s nonrepudaton. The proxy group cannot deny that havng sgned the proxy sgnature. Any verfer can dentfy the proxy group as a real sgner. The other s dentfable sgners. The verfer s able to dentfy the actual sgners n the proxy group. Also, the sgners cannot deny that havng generated the proxy sgnature. In ths artcle, we present a cryptanalyss of the Sun s scheme. Further, we propose a secure, nonrepudable and known sgners threshold proxy sgnature scheme whch remedes the weakness of the Sun s scheme. Key words: cryptography, Lagrange nterpolatng polynomal, proxy sgnature, threshold proxy sgnature. 1. Introducton A proxy sgnature scheme s a method whch allows orgnal sgner delegate hs works to a desgnated person wth a proxy sgnature key (Mambo, 1996a; Mambo, 1996b; Usuda, 1996). In these schemes, the proxy sgnature key s created by the orgnal sgner s sgnature key whch cannot be computed from the proxy sgnature key. The proxy sgner can generate proxy sgnature on a message on behalf of the orgnal sgner. To further expand the proxy sgnature scheme, the (t, n) threshold proxy sgnature schemes were proposed (Km, 1997; Lee, 1998; Zhang, 1997). The orgnal sgner now shares the proxy sgnature key wth an authorzed proxy group. Any t or more proxy sgners of the proxy group of n members can cooperately generate a proxy sgnature on a message. Some threshold proxy sgnature schemes, such as Zhang s scheme (Zhang, 1997), are not nonrepudable. Although some threshold proxy sgnature schemes, such as the Km s scheme (Km, 1997), are nonrepudable, they suffer a severe lmtaton; that the verfer cannot dentty the actual sgners n the proxy group. Based on Km s scheme, H.-M. Sun proposed an effcent nonrepudable threshold proxy sgnature scheme wth known sgner (Sun, 1999). The Sun s scheme s more effcent than the other threshold proxy sgnature schemes, and has nonrepudable property.
2 138 M.-Sh. Hwang et al. The man advantage of Sun s scheme s that the verfer s able to dentfy the actual sgners n the proxy group. The securty of the Sun s scheme s based on Lagrange nterpolatng polynomal and the dffculty of calculatng dscrete logarthms. However, the weakness of the Sun s scheme s that, f an adversary can obtan the proxy sgner s secret key. Then he can mpersonate a legal proxy sgner to generate a proxy sgnature and the real proxy sgner cannot deny that havng sgned the proxy sgnature before. In ths artcle, we show the weakness of the Sun s scheme and remedy the Sun s scheme. In next secton, we revew the Sun s scheme and llustrate ts weakness. In Secton 3, we propose a new secure scheme based on the Sun s scheme. And the securty of our proposed scheme s analyzed. Fnally, we conclude ths paper by lstng the advantages of the proposed scheme. 2. Revew of Sun s Nonrepudable Threshold Proxy Sgnature Scheme In ths secton, we frst revew the Sun s threshold proxy sgnature scheme (Sun, 1999) and then present a weakness of the Sun s scheme Sun s (t, n) Threshold Proxy Sgnature Scheme The Sun s proposed nonrepudable (t, n) threshold proxy sgnature wth known sgner, whch s based on the Km s threshold scheme (Km, 1997). The Sun s scheme uses the secret share technque (Blakley, 1979; Shamr, 1979) to share the proxy sgnature key. It s dvded nto three phases: proxy sharng generaton, proxy sgnature ssung, and proxy sgnature verfcaton. Intally, the system parameters are defned as follows: p be a large prme, q be a prme factor of p 1, g be an element of order q n Zp; x s partcpant p s prvate key and ts correspondng publc key s y, y = g x (modp); h s an one-way functon; m w s a warrant that be mnted by the orgnal sgner, and ts records some nformaton such as the dentty of the orgnal sgner; the denttes of proxy sgners of the proxy group; etc. and ASID (Actual Sgners ID) records the denttes of the actual sgners. In the proxy sharng generaton phase, the group shares a secret value from multplcatve sharng technque. The steps are descrbed as follows: 1 (Group key generaton). In a (t, n) threshold proxy sgnature scheme, let p 0 be the orgnal sgner, and p 1,p 2,...,p n be the n proxy sgners of the proxy group. Each member, p 1,p 2,...,p n, randomly generates a secret polynomal f of degree t 1,whch f (X) =x + a (,1) X a (,t 1) X t 1 (mod q). Here, a (,1),a (,2),...,a (,t 1) are random number. Then, each proxy sgner p can receve the shared value f j () from p j,where0<,j<n,and j. Therefore, each proxy sgner p can obtan a value s,
3 A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners 139 s = f() = f 1 ()+f 2 ()+...+ f n () = a 0 + a a t 1 t 1 (mod q), (1) where a 0 = n x (mod p), a 1 = n a (,1) (mod p),..., a t 1 = n a (,t 1) (mod p). And the publc parameters of the proxy group (Pedersen, 1991-a; Pedersen, 1991-b) are y G = g a0 (mod p), anda j = g aj (mod p), j =1,...,t 1. 2 (Proxy generaton). The orgnal sgner chooses a random number k and computes the parameter K, K = g k mod p. Then the orgnal sgner can obtan the value σ, σ = ex 0 + k (mod q), (2) where e = h(m w,k). 3 (Proxy sharng). The orgnal sgner shares a proxy key σ n a (t, n) threshold scheme. He generates a secret degree t 1 polynomal f, and computes σ = f (), = σ + b b t 1 t 1, for =1, 2,...,n, (3) where b j s a random number, j =1,...,t 1. After the orgnal sgner sends σ to proxy sgner p, =1,...,n, over a secured channel, and publshes B j = g bj (mod p), j =1,...,t 1,and(m w,k). 4 (Proxy share generaton). After recevng the σ, each proxy sgner p checks whether or not the followng equaton s hold, g σ t 1 = y h(mw,k) 0 K Bj j (mod p). (4) j=1 If the above equaton s hold, each p computes σ = σ + s h(m w,k)(modq), (5) the σ as a proxy share of p. Otherwse, the proxy sgner rejects σ. Assume that the t proxy sgners, p 1,...,p t, want to cooperately sgn a message on behalf of the proxy group, the steps of the proxy sgnature ssung phase are lsted below: 1. As the step 1 of the proxy share generaton phase, the polynomal s usng f (X) =(c (,0) + x )+c (,1) X c (,t 1) X t 1 (mod q). Each actual proxy sgner p can obtan the value s when they receve the values f j () from each actual proxy sgner p j, as shown n followng:
4 140 M.-Sh. Hwang et al. s = f () = f 1 ()+f 2 ()+...+ f t () n = x + c 0 + c c t 1 t 1 (mod q), (6) where =1,...,t. The publc parameters of ths step are Y = g c0 (mod p), and C j = g cj (mod p), j =1,...,t Each proxy sgner p, =1,...,t, has two secret values σ and s. Therefore, each proxy sgner p can computes γ = s Y + σ h(asid, m)(modq), (7) where m s the message. Then each proxy sgner p sends γ to proxy sgner p j, j =1,...,tand j. 3. For each receved γ j (j =1,...,t; j ), p can check whether the followng equaton s hold g γj = [ Y ( t 1 C j [ ( t 1 y h(mw,k) 0 K )( t 1 ) ] Y y t 1 B j )(y G ) ] h(mw,k) h(asid,m) A j mod p. (8) 4. Each proxy sgner p can apply Lagrange formula to [γ j ] to compute (Dennng, 1983) T = f (0)Y +[f(0) + f (0)] h(asid, m). (9) The proxy sgnature on m s (m, T, K, m w,asid). In the verfcaton phase, any verfer can verfy the valdty of the proxy sgnature and dentfy the actual sgners. The steps of ths phase are descrbed as follows: 1. Accordng to m w and ASID, the verfer gets the publc keys of the proxy sgners from the CA, and knows who the orgnal sgner and the actual proxy sgners are. 2. The verfer then checks the valdty of the proxy sgnature on the message m from the followng equaton: g T = [ y h(mw,k) 0 K n ] h(asid,m) y (Y t= The Weakness of Sun s Scheme t ) Y y (mod p). (10) In Sun s (t, n) threshold proxy sgnature scheme, any verfer can verfy the valdty of the proxy sgnature and dentfy the actual sgners. However, n ths subsecton we wll
5 A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners 141 show that the proxy sgner s secret key s not kept n prvacy. Any (n 1) proxy sgners n the group of n members can conspre the secret key of the remander one. We call ths attack as colluson attack. In ths attack, any (n 1) proxy sgners n the group of n members can mpersonate the remander one. For example, assume that a (3, 5) threshold proxy sgnature scheme. The proxy sgner p 1,...,p 4 ntend to obtan the secret key of the proxy sgner p 5. Then, they can mpersonate a legal proxy sgner p 5 to sgn a message m.in(1),any3 proxy sgners of p 1,...,p 4 can compute a 0 usng the Lagrange formula snce a 0 = 5 x (mod p). Thus the proxy sgners p 1,...,p 4 can present ther secret keys to conspre the secret key x 5 of the proxy sgner p 5 easly. Next, we can mpersonate the proxy sgner p 5 to generate a legal proxy sgnature. In the same way, the s 5, σ 5,andσ 5 can be computed by usng Lagrange formula from the Eqs. (1), (3), and (5), respectvely. In proxy sgnature ssung phase, we can mpersonate p 5 to share a random number as descrbed n Step 1, and we can get a secret s 5 from (6). By havng s 5 and σ 5, we can obtan γ 5 from (7) and send t to other proxy sgners of the proxy group. Then T can be computed from (9) and, thus, the proxy group can generate a proxy sgnature (m, T, K, m w,asid) for message m. In the verfcaton phase, the verfer can verfy the valdty of the proxy sgnature and dentfy the p 5 as actual sgner of the proxy group. In fact, p 5 have never sgned the message m,butp 5 cannot deny. Therefore, n Sun s scheme, the secret key x of the proxy sgner p can be compromsed by colluson attack and an adversary can mpersonate a legal proxy sgner p to sgn a message. 3. Improvement of Sun s Scheme In ths secton, we modfy Sun s scheme to remedy the weakness as descrbed n Secton 2.2 and analyze the securty of our scheme The Improved Scheme In Sun s scheme, the secret key x can be compromsed by colluson attack. To remedy the weakness we modfy Sun s scheme and the revsed scheme s presented n detals. In the proxy share generaton phase, we replace f (X) wth f (X) =x + a (,0) + a (,1) X a (,t 1) X t 1 (mod q), wherea (,0) s a random number. Therefore, the Eq. 1 becomes s = f() = n x + a 0 + a a t 1 t 1 (mod q), (11) where a = t 1 a (,0) (mo d p). The proxy group then publshes y g (y G = n gx = n y (mod p)), anda j (A j = g aj (mod p); j =0,...,t 1). The other steps of the proxy share generaton phase are the same as that of the Sun s scheme.
6 142 M.-Sh. Hwang et al. In the proxy sgnature ssung phase, the proxy sgner p computes γ from (7) and sends γ to other proxy sgners of the proxy group. Each proxy sgner can verfy the valdty of γ from the followng equaton: g γj = [ Y ( t 1 C j )( t 1 t 1 0 K [ ( y h(mw,k) ) ] Y y B j t 1 )(y G A 0 ) ] h(mw,k) h(asid,m) A j (mod p). Then, each sgner computes T from (9) and the proxy sgnature on message m s (m, T, K, m w,asid). Fnally, the verfer checks the valdty of the proxy sgnature and dentfy the actual sgners of the group from the followng equaton: g T = [ y h(mw,k) 0 KA 0 t=1 n ] h(asid,m)( y Y t ) Y y (mod p). (12) If the above equaton s hold, the verfer can frmly beleve the valdty of the proxy sgnature and dentfy the actual sgners. Furthermore, the revsed scheme can wthstand the colluson attack. Any n 1 proxy sgners cannot conspre the secret key of the remander. Therefore, the secret key of any proxy sgner can be kept n prvacy. And any adversary cannot forge the legal proxy sgnature Securty Analyss of the Improved Scheme The securty of the proposed threshold proxy sgnature scheme as descrbed above s examned. As wth Sun s scheme, the level of securty s tghtened. However, our scheme can wthstand the colluson attack. Assume that we use the same example as descrbed n Secton 2.2. Any 3 proxy sgners can obtan the f(0) = 5 (x + c (,0) )(modp) by Lagrange formula. However, any 4 proxy sgners, p 1,...,p 4, can only obtan x 5 + c (5,0). They cannot conspre the secret key x 5 of proxy sgner p 5. Therefore, colluson attack s mpossble snce t s dffcult to compute the secret key x 5 from the addton of two unknown numbers x 5 and c (5,0). The secret key of the proxy sgner n the proposed scheme s kept n prvacy. In addton, we can conspre to get the σ 5,andσ 5 from Eqs. (3), and (5). However, an adversary cannot obtan vald s 5 and S 5 wthout p 5 secret key. If an adversary tres to forge a proxy sgnature of p 5, the verfy check n the Eq. 10 s not hold. Therefore, t can wthstand the colluson attack and the proxy sgnature cannot be forged.
7 A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Conclusons In ths artcle, we presented a cryptanalyss of Sun s threshold proxy sgnature scheme. We have shown that the secret key can be compromsed by colluson attack. And a secure threshold proxy sgnature scheme was proposed to remedy the weakness of Sun s scheme. The man advantages of our scheme are: t obtans the property of nonrepudable, the verfer s able to dentfy the actual proxy sgner of the proxy group, and anyone cannot forge the legal proxy sgnature. Acknowledgements The authors wsh to thank many anonymous referees for ther suggestons to mprove ths paper. Part of ths research was supported by the Natonal Scence Councl, Tawan, R.O.C., under contract no. NSC E References Blakley, G.R. (1979). Safeguardng cryptographc keys. Proc. of AFIPs, pp Dennng, D.E.R. (1983). Cryptography and Data Securty. Addson-Wesley. Km, S., S. Park, and D. Won (1997). Proxy sgnatures, revsted. Proc. of ICICS 97, LNCS, 1334, pp Lee, N.Y., T. Hwang, and C.H. Wang (1998). On Zhang s nonrepudable proxy sgnature schemes. ACISP 98, LNCS, 1438, pp Mambo, M., K. Usuda, and E. Okamoto (1996a). Proxy sgnatures: Delegaton of the power to sgn message. IEICE Trans. Fundamentals, E79-A(9), Mambo, M., K. Usuda, and E. Okamoto (1996b). Proxy sgnatures for delegatng sgnng operaton. Proc. Thrd ACM Conf. on Computer and Communcatons Securty, pp Pedersen, T.P. (1991a). Dstrbuted provers wth applcatons to undenable sgnatures. Proc. Eurocrypt 91, LNCS, 547, pp Pedersen, T.P. (1991-b). A threshold cryptosystem wthout a trusted party. Proc. Eurocrypt 91, LNCS, 547, pp Shamr, A. (1979). How to share a secret. Commun. of the ACM, 22(11), Sun, H.M. (1999). An effcent nonrepudable threshold proxy sgnature scheme wth known sgners. Computer Communcatons, 22(8), Usuda, K., M. Mambo, T. Uyematsu, and E. Okamoto (1996). Proposal of an automatc sgnature scheme usng a compler. IEICE Trans. Fundamentals, E79-A(1), Zhang, K. (1997). Threshold proxy sgnature schemes, Informaton Securty Workshop,
8 144 M.-Sh. Hwang et al. M.-Sh. Hwang receved the B.S. n Electronc Engneerng from Natonal Tape Insttute of Technology, Tape, Tawan, Republc of Chna, n 1980; the M.S. n Industral Engneerng from Natonal Tsng Hua Unversty, Tawan, n 1988; and the Ph.D. n Computer and Informaton Scence from Natonal Chao Tung Unversty, Tawan, n He also studed Appled Mathematcs at Natonal Cheng Kung Unversty, Tawan, from Dr. Hwang passed the Natonal Hgher Examnaton n feld Electronc Engneer n He also passed the Natonal Telecommuncaton Specal Examnaton n feld Informaton Engneerng, qualfed as advanced techncan the frst class n From 1988 to 1991, he was the leader of the Computer Center at Telecommuncaton Laboratores (TL), Mnstry of Transportaton and Communcatons, ROC. He was also a project leader for research n computer securty at TL n July He obtaned the 1997, 1998, and 1999 Dstngushed Research Awards of the Natonal Scence Councl of the Republc of Chna. He s currently a professor and charman of the Department of Informaton Management, Chaoyang Unversty of Technology, Tawan, ROC. He s a member of IEEE, ACM, and Chnese Informaton Securty Assocaton. Hs current research nterests nclude database and data securty, cryptography, mage compresson, and moble communcatons. I.-Ch. Ln receved the B.S. n Computer and Informaton Scences from Tung Ha Unversty, Tachung, Tawan, Republc of Chna, n He s currently pursung hs master degree n Informaton Management from Chaoyang Unversty of Technology. Hs current research nterests nclude electronc commerce, nformaton securty, cryptography, and moble communcatons. E.J.-L. Lu receved hs B.S. degree n Transportaton Engneerng and Management from Natonal Chao Tung Unversty, Tawan, R.O.C, n 1982; M.S. degree n Computer Informaton Systems from San Francsco State Unversty, Calforna, U.S.A, n 1990; and Ph.D. degree n Computer Scence from Unversty of Mssour-Rolla, Mssour, U.S.A, n He s currently an assocate professor and vce charman of the Department of Informaton Management, Chaoyang Unversty of Technology, Tawan, R.O.C. Hs current research nterests nclude electronc commerce, dstrbuted processng, and securty. Saug slenkstnė galot u parašu schema, ka žnom pasrašantys asmenys Mn-Shang HWANG, Iuon-Chang LIN, Erc Ju-Ln LU Strapsnyje parodyta, kad grupės galot uasmen u parašu Sun o krptoanalzės algortmas tur trūkuma, nes slaptass raktas gal būt lengva apskačuotas. Pasūlyta Sun o algortmo modfkacja, neturnt šo trūkumo. Modfkuotas algortmas galna dentfkuot galot aj pasrašant asmen. Nekas negal suklastot tesėto galoto asmens parašo. Igalotass pasrašants asmuo negal atssakyt savo parašo.
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
Trivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Watermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
A Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI
ADVERTSEMENT FOR THE POST OF DRECTOR, lm TRUCHRAPPALL The ndan nsttute of Management Truchrappall (MT), establshed n 2011 n the regon of Taml Nadu s a leadng management school n nda. ts vson s "Preparng
Can Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS
Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and
Secure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
Practical PIR for Electronic Commerce
Practcal PIR for Electronc Commerce Ryan Henry Cherton School of Computer Scence Unversty of Waterloo Waterloo ON Canada N2L 3G1 [email protected] Fem Olumofn Cherton School of Computer Scence Unversty
Inter-domain Alliance Authentication Protocol Based on Blind Signature
Internatonal Journal of Securty Its Alcatons Vol9 No2 (205) 97-206 htt://ddoorg/04257/sa205929 Inter-doman Allance Authentcaton Protocol Based on Blnd Sgnature Zhang Je Zhang Q-kun Gan Yong Yn Yfeng Tan
An RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
How To Get A Tax Refund On A Retirement Account
CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
Scalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
Laddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems
Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE
Statistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
An Optimally Robust Hybrid Mix Network (Extended Abstract)
An Optmally Robust Hybrd Mx Network (Extended Abstract) Markus Jakobsson and Ar Juels RSA Laboratores Bedford, MA, USA {mjakobsson,ajuels}@rsasecurty.com Abstract We present a mx network that acheves effcent
Design and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
Traffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
BERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
Tuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
Calculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
PKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
An Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
Network Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters
Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
A DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
Identity-Based Encryption Gone Wild
An extended abstract of ths paper appeared n Mchele Bugles, Bart Preneel, Vladmro Sassone, and Ingo Wegener, edtors, 33rd Internatonal Colloquum on Automata, Languages and Programmng ICALP 2006, volume
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
A Generalized Temporal and Spatial Role-Based Access Control Model
92 JOURNAL OF NETWORKS, VOL. 5, NO. 8, AUGUST 200 A Generalzed Temporal Spatal Role-Based Access Control Model + Natonal Central Polce Unverst/ Depart. of Informaton Management, Taouan, Tawan E-mal: [email protected]
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
JOURNAL OF NETWORKS, VOL. 1, NO. 1, MAY 2006 47 Autentcated AODV Routng Protocol Usng One-Tme Sgnature and Transtve Sgnature Scemes Sd Xu Unversty of Wollongong, Wollongong, Australa Emal: [email protected]
Understanding the physical and economic consequences of attacks on control systems
I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( 2 0 0 9 ) 7 3 8 3 avalable at www.scencedrect.com journal homepage: www.elsever.com/locate/jcp
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Subcontracting Structure and Productivity in the Japanese Software Industry
Rev Soconetwork Strat (2009) 3:51-65 Subcontractng Structure and Productvty n e Japanese Software Industry Kazunor MINETAKI 1) and Kazuyuk MOTOHASHI 2) 1) The Research Insttute for Soconetwork Strateges,
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes
Internatonal Journal of Dgtal ontent Technology and ts Alcatons Volume 4 Number 9 December 00 hosen Publc Key and hertext Secure Proxy Re-encryton Schemes Lmng Fang Wlly Suslo Yongun Ren huneng Ge and
DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7
DISCLOSURES The Dsclosures set forth below may affect the accounts you have selected wth Bank Leum USA. Read these dsclosures carefully as they descrbe your rghts and oblgatons for the accounts and/or
RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
PRE COURSE ASSIGNMENT ALT COURSE ( This should be prepared in separate sheets bounded in one booklet presentable manner )
. THE BHARAT SCOUTS AND GUIDES, NATIONAL TRAINING CENTRE PACHMARHI { M.P. } 461881. Ph. No. 07578 252026 (O), 252153(R), Fax No. 07578 252541 E-Mal [email protected] ********************************************************************************************
Fast Variants of RSA
Fast Varants of RSA Dan Boneh [email protected] Hovav Shacham [email protected] Abstract We survey three varants of RSA desgned to speed up RSA decrypton. These varants are backwards compatble n
An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement
An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence
Tracker: Security and Privacy for RFID-based Supply Chains
Tracker: Securty and Prvacy for RFID-based Supply Chans Erk-Olver Blass Kaoutar Elkhyaou Refk Molva EURECOM Sopha Antpols, France {blass elkhyao molva}@eurecom.fr Abstract The counterfetng of pharmaceutcs
Simple Interest Loans (Section 5.1) :
Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part
v a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
On the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
The program for the Bachelor degrees shall extend over three years of full-time study or the parttime equivalent.
Bachel of Commerce Bachel of Commerce (Accountng) Bachel of Commerce (Cpate Fnance) Bachel of Commerce (Internatonal Busness) Bachel of Commerce (Management) Bachel of Commerce (Marketng) These Program
Efficiency Test on Taiwan s Life Insurance Industry- Using X-Efficiency Approach
Informaton and Management Scences Volume 18, Number 1, pp. 37-48, 2007 Effcency Test on Tawan s Lfe Insurance Industry- Usng X-Effcency Approach James C. Hao Tamkang Unversty R.O.C. Abstract Usng twenty-three
Using Series to Analyze Financial Situations: Present Value
2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated
ENVIRONMENTAL MONITORING Vol. II - Statistical Analysis and Quality Assurance of Monitoring Data - Iris Yeung
STATISTICAL ANALYSIS AND QUALITY ASSURANCE OF MONITORING DATA Irs Yeung Cty Unversty of Hong Kong, Kowloon, Hong Kong Keywords: AIC, ARIMA model, BIC, cluster analyss, dscrmnant analyss, factor analyss,
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
LIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
In our example i = r/12 =.0825/12 At the end of the first month after your payment is received your amount in the account, the balance, is
Payout annutes: Start wth P dollars, e.g., P = 100, 000. Over a 30 year perod you receve equal payments of A dollars at the end of each month. The amount of money left n the account, the balance, earns
