RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Quantum Authentication Protocol of Classical Messages Based on Different Sets of Orthogonal Quantum States

        Xiangjun,Chaoyang Li,Dongsheng Chen,Fagen Li 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.5

        Most of the quantum authentication protocols are used to authenticate quantum messages. In this paper, by using a pair of non-entangled qubits, a quantum authentication protocol of classical messages is proposed. In the pair of qubits, the first one is used to carry a bit message, and the second one is used as a tag to authenticate the classical message. In our protocol, a bit string instead of a sequence of maximally entangled states is used directly as an authentication key, so the authentication key can be easily stored offline. On the other hand, in our protocol, a unitary operation UA is chosen to encrypt the qubits so that the successful probability of all attacks analyzed is less than one. Our quantum authentication protocol is secure against various attacks such as the no-message attack and message attacks.

      • On the Security of a Group Key Agreement Protocol and Its Improvement with Pairings

        Xiangjun Xin,Chaoyang Li,Dongsheng Chen,Fagen Li 보안공학연구지원센터 2016 International Journal of Hybrid Information Techno Vol.9 No.2

        In the paper, we analyze the security vulnerability of the key agreement protocol proposed by Lee et al.'s. We present a forgery attack to their protocol. In this attack, the adversary can modify the signed message and forge a new signature, which can pass the verification. Then, we propose a new group key agreement protocol, which overcomes this security drawback. The new protocol can be proved to be secure under Elliptic Curve Discrete Logarithm Problem, Bilinear Computational Diffie–Hellman Problem and Square-Exponent Problem. On the other hand, in the new protocol, only three pairing operations are used, so it is more efficient. Our protocol is also a contributory group key agreement protocol.

      • Quantum Authentication of Classical Messages without Entangled State as Authentication Key

        Xiangjun Xin,Fagen Li 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.8

        Classical messages can be authenticated by traditional authentication protocols based on hash functions. The security of these protocols depends on long authentication keys, the selection of appropriate hash functions and some assumptions concerning the computational complexity of some algorithms. In this paper, by encoding the classical binary messages and binary keys as nonorthogonal quantum messages and nonorthogonal sets of states, respectively, and using quantum encrypting scheme, a new quantum authentication protocol is proposed. In our protocol, instead of entangled quantum states, the traditional binary bits, which can be easily saved, are encoded as quantum keys. Because the quantum messages are nonorthogonal, any forgery or measurement on the quantum messages will be detected with a certain probability. Our protocol allows the authentication of binary classical messages in a secure manner.

      • Quantum Authentication Protocol for Classical Messages Based on Bell states and Hash Function

        Xiangjun Xin,Xiaolin Hua,Jianpo Song,Fagen Li 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.7

        Quantum authentication protocols can be used to authenticate both quantum messages and classical messages. In this paper, a new quantum authentication protocol of classical messages is proposed. In our protocol, a sequence of Bell states is shared by the message sender and the corresponding receiver. This sequence is used as the authentication key. Four different unitary operations U0, U1, U2 and U3 are used to encode a classical message m and its hash value h(m) into a sequence of Bell states. To authenticate the classical message, the message receiver extracts m and h(m) from the qubits owned by himself/herself, and verifies whether h(m) matches m. The adversary’s disturbance to the quantum channel can be detected by checking whether h(m) matches m. The transmitted message has the properties of both secrecy and authentication. Our quantum authentication protocol is secure against message attack and no-message attack.

      • KCI등재
      • Quantum Authentication of Classical Messages Using Non-orthogonal Qubits and Hash Function

        Xiangjun Xin,Xiaolin Hua,Chaoyang Li,Dongsheng Chen 보안공학연구지원센터 2016 International Journal of u- and e- Service, Scienc Vol.9 No.10

        Quantum authentication protocol can be used to authenticate classical messages in a secure manner. In this paper, by using the cryptographic hash function and non-orthogonal qubits, a quantum authentication protocol of classical messages is proposed. In our protocol, the classical messages and their corresponding tags are encoded as nonorthogonal qubits. The message receiver decodes the classical messages and their corresponding tags from the received qubits by using the authentication key. To verify the validity of the received classical messages, the message receiver verifies whether the hash values of the decoded classical messages are equal to the corresponding tags. Our scheme can be proved to be secure against forgery attack and measurement attack. On the other hand, the authentication key is a binary string, which can be securely obtained and easily saved. What is more, because the authentication key remains secure after executing the authentication protocol, it provides the possibility of reusing the authentication key.

      • Study on Energy Matching methods for Ultra High-Speed Generator System Based on Qualitative Modelling Analysis

        Zhang Xiangjun,Li gengyao,Liu Hankui,Wang Yijie,Xu Dianguo 전력전자학회 2015 ICPE(ISPE)논문집 Vol.2015 No.6

        In high speed aircraft, Ultra high-speed generator’s safe operation and smooth power supply to load would be threatened by mismatching between open-loop generator and the fickle load condition. In this paper, a power converter with paralleled energy-matching link was developed, which can broaden safe operation zone and ensure generator’s safe operation as well as load’s smooth power supply under relatively light load conditions. This power converter can also ensure power supply voltage following under relatively heavy load conditions. The validity was verified by experiment results.

      • Service Dynamic Trust Evaluation Model based on Bayesian Network in Distributed Computing Environment

        Libin Wang,Xiangjun Li,Xinquan Yan,Song Qing,Yuanlu Chen 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.5

        In recent years, with the rapid development of computer network, distributed computing system has a very vast application prospect and potential utility value, which opens up a wealth of opportunities for different applications. With the characteristics of dynamic, heterogeneity, distribution, openness, voluntariness, uncertainty and deception, how to obtain trustworthy computing resource becomes a key issue in large-scale distributed computing research. Therefore, with considering the complex characters of trust in distributed computing environment, firstly, we construct STE architecture to rank and observe trust, which includes STE Broker, Monitoring and STE Catalogue. Secondly, a more comprehensive dynamic trust evaluation model is constructed based on Bayesian network. Finally, we apply simulation platform to imitate trust evolution process and collect related data, and the proposed method has been serviced in complex simulation system, and the results have indicated that the model is unbiased and effective. The first part is the research status and related problems. The second part is the establishment of an evaluation model. The last part is the experimental analysis and conclusion.

      • SCIESCOPUSKCI등재

        Detection of Voltage Sag using An Adaptive Extended Kalman Filter Based on Maximum Likelihood

        Xi, Yanhui,Li, Zewen,Zeng, Xiangjun,Tang, Xin The Korean Institute of Electrical Engineers 2017 Journal of Electrical Engineering & Technology Vol.12 No.3

        An adaptive extended Kalman filter based on the maximum likelihood (EKF-ML) is proposed for detecting voltage sag in this paper. Considering that the choice of the process and measurement error covariance matrices affects seriously the performance of the extended Kalman filter (EKF), the EKF-ML method uses the maximum likelihood method to adaptively optimize the error covariance matrices and the initial conditions. This can ensure that the EKF has better accuracy and faster convergence for estimating the voltage amplitude (states). Moreover, without more complexity, the EKF-ML algorithm is almost as simple as the conventional EKF, but it has better anti-disturbance performance and more accuracy in detection of the voltage sag. More importantly, the EKF-ML algorithm is capable of accurately estimating the noise parameters and is robust against various noise levels. Simulation results show that the proposed method performs with a fast dynamic and tracking response, when voltage signals contain harmonics or a pulse and are jointly embedded in an unknown measurement noise.

      • Effect of spatial variability of concrete materials on the uncertain thermodynamic properties of shaft lining structure

        Tao Wang,Shuai Li,Xiangjun Pei,Yafan Yang,Bin Zhu,Guoqing Zhou 국제구조공학회 2022 Structural Engineering and Mechanics, An Int'l Jou Vol.81 No.2

        The thermodynamic properties of shaft lining concrete (SLC) are important evidence for the design and construction, and the spatial variability of concrete materials can directly affect the stochastic thermal analysis of the concrete structures. In this work, an array of field experiments of the concrete materials are carried out, and the statistical characteristics of thermophysical parameters of SLC are obtained. The coefficient of variation (COV) and scale of fluctuation (SOF) of uncertain thermophysical parameters are estimated. A three-dimensional (3-D) stochastic thermal model of concrete materials with heat conduction and hydration heat is proposed, and the uncertain thermodynamic properties of SLC are computed by the self-compiled program. Model validation with the experimental and numerical temperatures is also presented. According to the relationship between autocorrelation functions distance (ACD) and SOF for the five theoretical autocorrelation functions (ACFs), the effects of the ACF, COV and ACD of concrete materials on the uncertain thermodynamic properties of SLC are analyzed. The results show that the spatial variability of concrete materials is subsistent. The average temperatures and standard deviation (SD) of inner SLC are the lowest while the outer SLC is the highest. The effects of five 3-D ACFs of concrete materials on uncertain thermodynamic properties of SLC are insignificant. The larger the COV of concrete materials is, the larger the SD of SLC will be. On the contrary, the longer the ACD of concrete materials is, the smaller the SD of SLC will be. The SD of temperature of SLC increases first and then decreases. This study can provide a reliable reference for the thermodynamic properties of SLC considering spatial variability of concrete materials.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼