9,447 research outputs found

    Still Wrong Use of Pairings in Cryptography

    Get PDF
    Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies. There have been however a wide range of incorrect use of these primitives. The paper of Galbraith, Paterson, and Smart (2006) pointed out most of the issues related to the incorrect use of pairing-based cryptography. However, we noticed that some recently proposed applications still do not use these primitives correctly. This leads to unrealizable, insecure or too inefficient designs of pairing-based protocols. We observed that one reason is not being aware of the recent advancements on solving the discrete logarithm problems in some groups. The main purpose of this article is to give an understandable, informative, and the most up-to-date criteria for the correct use of pairing-based cryptography. We thereby deliberately avoid most of the technical details and rather give special emphasis on the importance of the correct use of bilinear maps by realizing secure cryptographic protocols. We list a collection of some recent papers having wrong security assumptions or realizability/efficiency issues. Finally, we give a compact and an up-to-date recipe of the correct use of pairings.Comment: 25 page

    Memoryless relay strategies for two-way relay channels

    Get PDF
    We propose relaying strategies for uncoded two-way relay channels, where two terminals transmit simultaneously to each other with the help of a relay. In particular, we consider a memoryless system, where the signal transmitted by the relay is obtained by applying an instantaneous relay function to the previously received signal. For binary antipodal signaling, a class of so called absolute (abs)-based schemes is proposed in which the processing at the relay is solely based on the absolute value of the received signal. We analyze and optimize the symbol-error performance of existing and new abs-based and non-abs-based strategies under an average power constraint, including abs-based and non-abs-based versions of amplify and forward (AF), detect and forward (DF), and estimate and forward (EF). Additionally, we optimize the relay function via functional analysis such that the average probability of error is minimized at the high signal-to-noise ratio (SNR) regime. The optimized relay function is shown to be a Lambert W function parameterized on the noise power and the transmission energy. The optimized function behaves like abs-AF at low SNR and like abs-DF at high SNR, respectively; EF behaves similarly to the optimized function over the whole SNR range. We find the conditions under which each class of strategies is preferred. Finally, we show that all these results can also be generalized to higher order constellations

    Sum Throughput Maximization in Multi-Tag Backscattering to Multiantenna Reader

    Full text link
    Backscatter communication (BSC) is being realized as the core technology for pervasive sustainable Internet-of-Things applications. However, owing to the resource-limitations of passive tags, the efficient usage of multiple antennas at the reader is essential for both downlink excitation and uplink detection. This work targets at maximizing the achievable sum-backscattered-throughput by jointly optimizing the transceiver (TRX) design at the reader and backscattering coefficients (BC) at the tags. Since, this joint problem is nonconvex, we first present individually-optimal designs for the TRX and BC. We show that with precoder and {combiner} designs at the reader respectively targeting downlink energy beamforming and uplink Wiener filtering operations, the BC optimization at tags can be reduced to a binary power control problem. Next, the asymptotically-optimal joint-TRX-BC designs are proposed for both low and high signal-to-noise-ratio regimes. Based on these developments, an iterative low-complexity algorithm is proposed to yield an efficient jointly-suboptimal design. Thereafter, we discuss the practical utility of the proposed designs to other application settings like wireless powered communication networks and BSC with imperfect channel state information. Lastly, selected numerical results, validating the analysis and shedding novel insights, demonstrate that the proposed designs can yield significant enhancement in the sum-backscattered throughput over existing benchmarks.Comment: 17 pages, 5 figures, accepted for publication in IEEE Transactions on Communication
    corecore