• 一种用于交通预测的自适应时空图神经网络

    Subjects: Computer Science >> Computer Application Technology submitted time 2023-02-15 Cooperative journals: 《桂林电子科技大学学报》

    Abstract: Traffic forecasting is of great significance in urban management and traffic planning. However, in the task of traffic
    prediction, the modeling of complex dynamic spatio-temporal dependence is still a great challenge. For the problem that
    the neural network can't capture the long-term traffic information in the spatial dimension, the new neural network structure
    proposed in the past can't capture the complex traffic data in the spatial dimension. Through adaptive graph convolutional
    network, the specific state of nodes is automatically captured and the interdependence between different nodes is automatically
    inferred to extract the complete spatial features of traffic data. Then, the time characteristics of traffic data are captured
    by the time memory module in the spatio-temporal short-term memory network, and the short, medium and long-term time
    dependence is simulated.

  • 一种轻量级的雾计算属性基外包加密算法

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-12-13 Cooperative journals: 《计算机应用研究》

    Abstract: Attribute-based encryption algorithm has the characteristics as flexibility, fine-grained and high security. This paper introduces an improved attribute-based outsourced encryption algorithm based on secure data access control attribute-based encryption, to reduce the resources consumed by computation, which outsources the complex bilinear pairings in the encryption computing to the fog node to reduce the user's computation overhead. By simplifying the system parameters, we reduce the random number generated by attribute authority for every attribute to shorten the length of ciphertext and the key, as well as the storage cost of the system. And the security proof of the scheme is given in the last part of this paper.

  • 一种改进的基于奇偶校验码的McEliece变型方案

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-09-12 Cooperative journals: 《计算机应用研究》

    Abstract: McEliece public-key cryptosystem is a public-key cryptosystem based on coding theory. Its security can be reduced to the general linear code decoding problem and it can resist quantum attack. This paper proposed an improved McEliece variant scheme based on quasi-cyclic medium density parity check (QC-MDPC) code and quasi-cyclic low density parity check (QC-LDPC) code. The main improvement was that the parity check matrices of QC-LDPC code and QC- MDPC code were combined as a private key, and the concatenated codewords generated were applied to the McEliece variant scheme, and an improved decoding algorithm was given. The analysis shows that under the 80-bit security, it has small system key and low-implement complexity. In addition, this system can resist the recently proposed key recovery attacks on QC-MDPC and QC-LDPC respectively.

  • 一种基于信用的改进PBFT高效共识机制

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-06-19 Cooperative journals: 《计算机应用研究》

    Abstract: Based on the characteristics and requirements of the consortium blockchain, this paper analyzed the protocol performance of the consensus mechanism and the spending of resources. Based on PBFT (practical byzantine fault tolerance) , this paper targeted the agreement in the consensus process for improvement. In the new consensus mechanism, it first introduced the credit evaluation, and used the simplified coherence protocol to promote the system to enter into a virtuous circle. It modified the checkpoint protocol that the nodes could dynamically join and leaved the system and improve the system flexibility. The experimental results show that the new consensus mechanism can shorten transaction confirmation time, reduce the use of communication resources, and improve system efficiency in the long running.

  • 一种改进的R-LWE同态掩码方案

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-20 Cooperative journals: 《计算机应用研究》

    Abstract: Aiming at the differential power attack of the encryption scheme based on lattice, Reparaz proposed an additively homomorphic R-LWE masking scheme in PQC 2016. This scheme can against the differential power attack effectively, but the additively homomorphic algorithm between the ciphertexts makes the size of noise increase. It declines the rate of decryption correctness. In view of this problem, this paper proposed an improved R-LWE homomorphic masking scheme. By introducing the modular switching technology, it made a modular reduction with the cipher text of additively homomorphic. Under the premising that plaintext and the ciphertext were corresponding, it declined the size of noise in the ciphertext. And it could improve the decryption correctness of the scheme. In order to protect the sub keys, it introduced a the random matrix to mask the sub key. And it makes the correctness analysis and the safety proof. The proposed scheme has better security and efficiency compared to the original scheme.

  • 基于IC协议的分块加密方案及其应用

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-19 Cooperative journals: 《计算机应用研究》

    Abstract: The problem of leaking through express sheet brings security risks to individuals, but also restricts the rapid development of express enterprises. This paper studied the privacy protection of express sheet. By combining the identity based encryption system (BF-IBE) , the idea of authority design and the two-dimensional code technology, this paper designed a block encryption scheme. The scheme used a new private key distribution protocol (IC protocol) to solve the key management problem. This paper applied the block encryption scheme to the domain of express privacy protection, and designed a new privacy express sheet and express business process. The results show that the IC protocol used in the block encryption scheme needs no inverse operation, and the bilinear pairings can be effectively reduced and the key management can be carried out easily. The encryption and decryption efficiency of the block encryption scheme is similar to that of BF-IBE. Its security is based on the discrete logarithm problem on elliptic curves. It can be applied to express field, which can effectively protect the user's privacy. It is also suitable for other areas with block encryption requirements.

  • 一种新型基于格上LWE问题密钥交换协议的设计

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-19 Cooperative journals: 《计算机应用研究》

    Abstract: The design of efficient and secure lattice-based post quantum key exchange protocols has certain practical and theoretical significance. In this paper, a scheme was proposed, which used straight-forward transformation LWE encryption mechanism and a ciphertext compression technology. This is a passively secure and practical key exchange protocol. Frodo was a key exchange scheme based on LWE problem proposed by Bos et al, which used the error reconciliation mechanism proposed by Peikert. The main advantage of the scheme over Frodo is simplicity. Compared with Frodo, the communications traffic merely increased by only 1.09%, the complexity of the scheme is reduced effectively. The scheme is proved to be passive security, Also, which can resist quantum computer attacks. Compared with existing key exchange protocol based on learning with error, this protocol is very competitive.

  • 完全隐藏策略的基于属性可搜索加密方案

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-17 Cooperative journals: 《计算机应用研究》

    Abstract: The current Attributa-based public encryption with keyword search(ATT-PEKS) , although it solves the problem that the keyword ciphertext can only be uniquely searched by the user to enable multi-user share of encrypted data, it does not hide the access structure. Once the access structure is obtained by unreliable servers attackers, it may be exposed to confidential information. Therefore, in order to solve this problem, this paper proposed an attributa-based public encryption scheme with keyword search that completely hides the access structure, which not only preserved the advantages of ATT-PEKS to realize multi-user data sharing, but also realized the complete concealment of the access structure that prevents the policy information leaking. And it analyzed the security and performance of the scheme. The simulation game proves that the scheme has the anti-attack security under the attribute set model, and also ensures the confidentiality of the index and the key words. The use of less computing power in terms of performance can be achieved hidden access policies and encrypted data sharing two functions.