http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
On the Security of a Group Key Agreement Protocol and Its Improvement with Pairings
Xiangjun Xin,Chaoyang Li,Dongsheng Chen,Fagen Li 보안공학연구지원센터 2016 International Journal of Hybrid Information Techno Vol.9 No.2
In the paper, we analyze the security vulnerability of the key agreement protocol proposed by Lee et al.'s. We present a forgery attack to their protocol. In this attack, the adversary can modify the signed message and forge a new signature, which can pass the verification. Then, we propose a new group key agreement protocol, which overcomes this security drawback. The new protocol can be proved to be secure under Elliptic Curve Discrete Logarithm Problem, Bilinear Computational Diffie–Hellman Problem and Square-Exponent Problem. On the other hand, in the new protocol, only three pairing operations are used, so it is more efficient. Our protocol is also a contributory group key agreement protocol.
Xin Xiangjun,António Luís Jesus Teixeira,Paulo P. Monteiro,José R. F. da Rocha,Paulo Sérgio de Brito André 한국전자통신연구원 2005 ETRI Journal Vol.27 No.3
The transmission performance of optical labeling based on a combined frequency shift keying/amplitude shift keying (FSK/ASK) format is studied by numerical simulation. The simulation demonstrates that the bit-error ratio (BER) characteristic of an ASK signal is limited by the extinction ratio, received optical power, and dispersion, simultaneously. However, an FSK signal is mainly limited by the extinction ratio (ER) and received optical power when the peak spectrum, which is used to detect the FSK signal, is relatively narrow.
Quantum Authentication of Classical Messages without Entangled State as Authentication Key
Xiangjun Xin,Fagen Li 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.8
Classical messages can be authenticated by traditional authentication protocols based on hash functions. The security of these protocols depends on long authentication keys, the selection of appropriate hash functions and some assumptions concerning the computational complexity of some algorithms. In this paper, by encoding the classical binary messages and binary keys as nonorthogonal quantum messages and nonorthogonal sets of states, respectively, and using quantum encrypting scheme, a new quantum authentication protocol is proposed. In our protocol, instead of entangled quantum states, the traditional binary bits, which can be easily saved, are encoded as quantum keys. Because the quantum messages are nonorthogonal, any forgery or measurement on the quantum messages will be detected with a certain probability. Our protocol allows the authentication of binary classical messages in a secure manner.
Quantum Authentication Protocol for Classical Messages Based on Bell states and Hash Function
Xiangjun Xin,Xiaolin Hua,Jianpo Song,Fagen Li 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.7
Quantum authentication protocols can be used to authenticate both quantum messages and classical messages. In this paper, a new quantum authentication protocol of classical messages is proposed. In our protocol, a sequence of Bell states is shared by the message sender and the corresponding receiver. This sequence is used as the authentication key. Four different unitary operations U0, U1, U2 and U3 are used to encode a classical message m and its hash value h(m) into a sequence of Bell states. To authenticate the classical message, the message receiver extracts m and h(m) from the qubits owned by himself/herself, and verifies whether h(m) matches m. The adversary’s disturbance to the quantum channel can be detected by checking whether h(m) matches m. The transmitted message has the properties of both secrecy and authentication. Our quantum authentication protocol is secure against message attack and no-message attack.
Quantum Authentication of Classical Messages Using Non-orthogonal Qubits and Hash Function
Xiangjun Xin,Xiaolin Hua,Chaoyang Li,Dongsheng Chen 보안공학연구지원센터 2016 International Journal of u- and e- Service, Scienc Vol.9 No.10
Quantum authentication protocol can be used to authenticate classical messages in a secure manner. In this paper, by using the cryptographic hash function and non-orthogonal qubits, a quantum authentication protocol of classical messages is proposed. In our protocol, the classical messages and their corresponding tags are encoded as nonorthogonal qubits. The message receiver decodes the classical messages and their corresponding tags from the received qubits by using the authentication key. To verify the validity of the received classical messages, the message receiver verifies whether the hash values of the decoded classical messages are equal to the corresponding tags. Our scheme can be proved to be secure against forgery attack and measurement attack. On the other hand, the authentication key is a binary string, which can be securely obtained and easily saved. What is more, because the authentication key remains secure after executing the authentication protocol, it provides the possibility of reusing the authentication key.
Detection of Voltage Sag using An Adaptive Extended Kalman Filter Based on Maximum Likelihood
Yanhui Xi,Zewen Li,Xiangjun Zeng,Xin Tang 대한전기학회 2017 Journal of Electrical Engineering & Technology Vol.12 No.3
An adaptive extended Kalman filter based on the maximum likelihood (EKF-ML) is proposed for detecting voltage sag in this paper. Considering that the choice of the process and measurement error covariance matrices affects seriously the performance of the extended Kalman filter (EKF), the EKF-ML method uses the maximum likelihood method to adaptively optimize the error covariance matrices and the initial conditions. This can ensure that the EKF has better accuracy and faster convergence for estimating the voltage amplitude (states). Moreover, without more complexity, the EKF-ML algorithm is almost as simple as the conventional EKF, but it has better anti-disturbance performance and more accuracy in detection of the voltage sag. More importantly, the EKF-ML algorithm is capable of accurately estimating the noise parameters and is robust against various noise levels. Simulation results show that the proposed method performs with a fast dynamic and tracking response, when voltage signals contain harmonics or a pulse and are jointly embedded in an unknown measurement noise.
Detection of Voltage Sag using An Adaptive Extended Kalman Filter Based on Maximum Likelihood
Xi, Yanhui,Li, Zewen,Zeng, Xiangjun,Tang, Xin The Korean Institute of Electrical Engineers 2017 Journal of Electrical Engineering & Technology Vol.12 No.3
An adaptive extended Kalman filter based on the maximum likelihood (EKF-ML) is proposed for detecting voltage sag in this paper. Considering that the choice of the process and measurement error covariance matrices affects seriously the performance of the extended Kalman filter (EKF), the EKF-ML method uses the maximum likelihood method to adaptively optimize the error covariance matrices and the initial conditions. This can ensure that the EKF has better accuracy and faster convergence for estimating the voltage amplitude (states). Moreover, without more complexity, the EKF-ML algorithm is almost as simple as the conventional EKF, but it has better anti-disturbance performance and more accuracy in detection of the voltage sag. More importantly, the EKF-ML algorithm is capable of accurately estimating the noise parameters and is robust against various noise levels. Simulation results show that the proposed method performs with a fast dynamic and tracking response, when voltage signals contain harmonics or a pulse and are jointly embedded in an unknown measurement noise.
A Ghost-Imaging System Based on a Microfluidic Chip
Kaimin Wang,Xiaoxuan Han,Hualong Ye,Zhaorui Wang,Leihong Zhang,Jiafeng Hu,Meiyong Xu,Xiangjun Xin,Dawei Zhang 한국광학회 2021 Current Optics and Photonics Vol.5 No.2
Microfluidic chip technology is a research focus in biology, chemistry, and medicine, for example. However, microfluidic chips are rarely applied in imaging, especially in ghost imaging. Thus in this work we propose a ghost-imaging system, in which we deploy a novel microfluidic chip modulator (MCM) constructed of double-layer zigzag micro pipelines. While in traditional situations a spatial light modulator (SLM) and supporting computers are required, we can get rid of active modulation devices and computers with this proposed scheme. The corresponding simulation analysis verifies good feasibility of the scheme, which can ensure the quality of data transmission and achieve convenient, fast ghost imaging passively.