3,103 research outputs found
Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption
In this paper, we present a new authenticated key exchange(AKE)
protocol and prove its security under the random oracle assumption
and the computational Diffie-Hellman(CDH) assumption. In the
extended Canetti-Krawczyk model, there has been no known AKE
protocol based on the CDH assumption. Our protocol, called NAXOS+,
is obtained by slightly modifying the NAXOS protocol proposed by
LaMacchia, Lauter and Mityagin. We establish a formal security proof
of NAXOS+ in the extended Canetti-Krawczyk model using as a main
tool the trapdoor test presented by Cash, Kiltz and Shoup
On the relationship between squared pairings and plain pairings
In this paper, we investigate the relationship between the squared Weil/Tate pairing and the plain Weil/Tate pairing. Along these lines, we first show that the squared pairing for arbitrary chosen point can be transformed into a plain pairing for the trace zero point which has a special form to compute them more efficiently. This transformation requires only a cost of some Frobenius actions. Additionally, we show that the squared Weil pairing can be computed more efficiently for trace zero point and derive an explicit formula for the 4th powered Weil pairing as an optimized version of the Weil pairing
Is it possible to have CBE from CL-PKE?
Recently, Al-Riyami and Paterson proposed a generic conversion from
CL-PKE (Certificateless Public Key Encryption) to CBE (Certificate
Based Encryption) and claimed that the derived CBE scheme is secure
and even more efficient than the original scheme of Gentry. In this
paper, we show that their conversion is wrong due to the flaw of the
security proof. It leads the new concrete CBE scheme by Al-Riyami
and Paterson to be invalidated. In addition, our result supports the
impossibility to relate both notions in any directions
Development of a Chaff Dispense Program for Target Tracking Radar Deception
This study aims to develop an appropriate chaff dispensing program to deceive the target tracking radar (TTR) effectively. Chaff is a countermeasure commonly used by fighter aircraft to deceive TTR. However, there has been a lack of methodology for calculating chaff dispense programs that take into account the specific characteristics of the fighter, chaff, and TTR. This study proposes a methodology that considers these variables to calculate chaff dispense programs and addresses this gap. The proposed method is demonstrated through TESS engagement, which shows its effectiveness in various engagement situations
Relationship between the Retinal Thickness Analyzer and the GDx VCC Scanning Laser Polarimeter, Stratus OCT Optical Coherence Tomograph, and Heidelberg Retina Tomograph II Confocal Scanning Laser Ophthalmoscopy
PURPOSE: To assess the relationship between the retinal thickness analyzer (RTA) parameters, and those of the GDx VCC scanning laser polarimeter (GDx VCC), Stratus OCT optical coherence tomography (Stratus OCT), and Heidelberg retinal tomograph II confocal scanning laser ophthalmoscopy (HRT II).
METHODS: Twenty-nine primary open-angle glaucoma patients were retrospectively included in this study. Measurements were obtained using the RTA, GDx VCC, Stratus OCT, and HRT II. We calculated the correlation coefficients between the parameters of RTA and those of the other studies.
RESULTS: Among the optic disc parameters of RTA, the cup volume was best correlated with Stratus OCT (R=0.780, p<0.001) and HRT II (R=0.896, p<0.001). Among the posterior pole retinal thickness parameters, the posterior pole abnormally thin area (PPAT) of the RTA and the inferior average of the GDx VCC were best correlated (R=-0.596, p=0.001). The PPAT of the RTA and the inferior maximum of the Stratus OCT were best correlated (R=-0.489, p=0.006). The perifoveal minimum thickness (PFMT) of the RTA and the cup shape measurement of the HRT II were best correlated (R=-0.565, p=0.004).
CONCLUSIONS: Many RTA optic disc parameters were significantly correlated with those of the Stratus OCT and HRT II. The RTA posterior pole retinal thickness parameters were significantly correlated with those of the GDx VCC, Stratus OCT and HRT II. The RTA optic disc and posterior pole retinal thickness parameters may be valuable in the diagnosis of glaucomaope
A New Forward Secure Signature Scheme
In this paper, we present two forward secure signature schemes
based on gap Diffie-Hellman groups and prove these schemes to be
secure in the sense of slightly stronger security notion than that
by Bellare and Miner in the random oracle model. Both schemes use
the same key update strategy as the encryption scheme presented by
Canetti, Halevi and Katz. Hence, our schemes outperform the
previous tree-based forward secure signature scheme by Bellare and
Miner in the key generation and key update time, which are only
constant in the number of time periods. Specifically, we describe
a straightforward scheme following from the encryption scheme, and
then improve its efficiency for signature verification algorithm
which needs only 3 pairing computations independent of the total
time periods
- โฆ