32 resultados para Xi’an


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We characterise ideal threshold schemes from different approaches. Since the characteristic properties are independent to particular descriptions of threshold schemes, all ideal threshold schemes can be examined by new points of view and new results on ideal threshold schemes can be discovered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider secret sharing with binary shares. This model allows us to use the well developed theory of cryptographically strong boolean functions. We prove that for given secret sharing, the average cheating probability over all cheating and original vectors, i.e., ρ ¯= 1 n ⋅ 2 −n ∑ n c=1 ∑ α∈Vn ρ c,α , satisfies ρ ¯⩾ 1 2 , and the equality holds ⇔ ρc,α satisfies ρc,α = 1/2 for every cheating vector δc and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions. This enables us to construct cheating-immune secret sharing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention is given in the context of different strategies applied by cheaters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work investigates cheating prevention in secret sharing. It is argued that cheating is immune against cheating if the cheaters gain no advantage over honest participants by submitting invalid shares to the combiner. This work addresses the case when shares and the secret are taken from GF(pt). Two models are considered. The first one examines the case when cheaters consistently submit always invalid shares. The second modeldeal s with cheaters who submit a mixture of valid and invalid shares. For these two models, cheating immunity is defined, properties of cheating immune secret sharing are investigated and their constructions are given.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work addresses the problem of cheating prevention in secret sharing. Two cheating scenarios are considered. In the first one, the cheaters always submit invalid shares to the combiner. In the second one, the cheaters collectively decide which shares are to be modified so the combiner gets a mixture of valid and invalid shares from the cheaters. The secret scheme is said to be k-cheating immune if any group of k cheaters has no advantage over honest participants. The paper investigates cryptographic properties of the defining function of secret sharing so the scheme is k-cheating immune. Constructions of secret sharing immune against k cheaters are given.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restriction of regular mappings to permutations gives a convenient tool for investigation of the relation between permutations and ideal secret sharing generated by them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We observe that MDS codes have interesting properties that can be used to construct ideal threshold schemes. These schemes permit the combiner to detect cheating, identify cheaters and recover the correct secret. The construction is later generalised so the resulting secret sharing is resistant against the Tompa-Woll cheating.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Plasma plumes with exotically segmented channel structure and plasma bullet propagation are produced in atmospheric plasma jets. This is achieved by tailoring interruptions of a continuous DC power supply over the time scales of lifetimes of residual electrons produced by the preceding discharge phase. These phenomena are explained by studying the plasma dynamics using nanosecond-precision imaging. One of the plumes is produced using 2-10μs interruptions in the 8kV DC voltage and features a still bright channel from which a propagating bullet detaches. A shorter interruption of 900ns produces a plume with the additional long conducting dark channel between the jet nozzle and the bright area. The bullet size, formation dynamics, and propagation speed and distance can be effectively controlled. This may lead to micrometer-and nanosecond-precision delivery of quantized plasma bits, warranted for next-generation health, materials, and device technologies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Effects of surrounding gases on the propagation of room-temperature atmospheric-pressure plasma jets are reported. A highly unusual feather-like plasma plume is observed only when N2 is used as surrounding gas. The He concentration on the axis at the starting point of the feather-like plume is ∼0.85 of the maximum value and is independent on the He flow rates. High-speed optical imaging reveals that dim diffuse plasmas emerge just behind the bright head of the plasma bullet at the starting point of the feather-like plume. These results help tailoring surface exposure in emerging applications of plasma jets in medicine and nanotechnology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cold atmospheric-pressure plasma plumes are generated in the ambient air by a single-electrode plasma jet device powered by pulsed dc and ac sine-wave excitation sources. Comprehensive comparisons of the plasma characteristics, including electrical properties, optical emission spectra, gas temperatures, plasma dynamics, and bacterial inactivation ability of the two plasmas are carried out. It is shown that the dc pulse excited plasma features a much larger discharge current and stronger optical emission than the sine-wave excited plasma. The gas temperature in the former discharge remains very close to the room temperature across the entire plume length; the sine-wave driven discharge also shows a uniform temperature profile, which is 20-30 degrees higher than the room temperature. The dc pulse excited plasma also shows a better performance in the inactivation of gram-positive staphylococcus aureus bacteria. These results suggest that the pulsed dc electric field is more effective for the generation of nonequilibrium atmospheric pressure plasma plumes for advanced plasma health care applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effects of various discharge parameters and ambient gas on the length of He atmospheric plasma jet plumes expanding into the open air are studied. It is found that the voltage and width of the discharge-sustaining pulses exert significantly stronger effects on the plume length than the pulse frequency, gas flow rate, and nozzle diameter. This result is explained through detailed analysis of the I-V characteristics of the primary and secondary discharges which reveals the major role of the integrated total charges of the primary discharge in the plasma dynamics. The length of the jet plume can be significantly increased by guiding the propagating plume into a glass tube attached to the nozzle. This increase is attributed to elimination of the diffusion of surrounding air into the plasma plume, an absence which facilitates the propagation of the ionization front. These results are important for establishing a good level of understanding of the expansion dynamics and for enabling a high degree of control of atmospheric pressure plasmas in biomedical, materials synthesis and processing, environmental and other existing and emerging industrial applications. © 2009 American Institute of Physics.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper investigates the design of secret sharing that is immune against cheating (as defined by the Tompa-Woll attack). We examine secret sharing with binary shares and secrets. Bounds on the probability of successful cheating are given for two cases. The first case relates to secret sharing based on bent functions and results in a non-perfect scheme. The second case considers perfect secret sharing built on highly nonlinear balanced Boolean functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Algebraic immunity AI(f) defined for a boolean function f measures the resistance of the function against algebraic attacks. Currently known algorithms for computing the optimal annihilator of f and AI(f) are inefficient. This work consists of two parts. In the first part, we extend the concept of algebraic immunity. In particular, we argue that a function f may be replaced by another boolean function f^c called the algebraic complement of f. This motivates us to examine AI(f ^c ). We define the extended algebraic immunity of f as AI *(f)= min {AI(f), AI(f^c )}. We prove that 0≤AI(f)–AI *(f)≤1. Since AI(f)–AI *(f)= 1 holds for a large number of cases, the difference between AI(f) and AI *(f) cannot be ignored in algebraic attacks. In the second part, we link boolean functions to hypergraphs so that we can apply known results in hypergraph theory to boolean functions. This not only allows us to find annihilators in a fast and simple way but also provides a good estimation of the upper bound on AI *(f).