3,133 research outputs found

    Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption

    Get PDF
    In this paper, we present a new authenticated key exchange(AKE) protocol and prove its security under the random oracle assumption and the computational Diffie-Hellman(CDH) assumption. In the extended Canetti-Krawczyk model, there has been no known AKE protocol based on the CDH assumption. Our protocol, called NAXOS+, is obtained by slightly modifying the NAXOS protocol proposed by LaMacchia, Lauter and Mityagin. We establish a formal security proof of NAXOS+ in the extended Canetti-Krawczyk model using as a main tool the trapdoor test presented by Cash, Kiltz and Shoup

    Is it possible to have CBE from CL-PKE?

    Get PDF
    Recently, Al-Riyami and Paterson proposed a generic conversion from CL-PKE (Certificateless Public Key Encryption) to CBE (Certificate Based Encryption) and claimed that the derived CBE scheme is secure and even more efficient than the original scheme of Gentry. In this paper, we show that their conversion is wrong due to the flaw of the security proof. It leads the new concrete CBE scheme by Al-Riyami and Paterson to be invalidated. In addition, our result supports the impossibility to relate both notions in any directions

    On the relationship between squared pairings and plain pairings

    Get PDF
    In this paper, we investigate the relationship between the squared Weil/Tate pairing and the plain Weil/Tate pairing. Along these lines, we first show that the squared pairing for arbitrary chosen point can be transformed into a plain pairing for the trace zero point which has a special form to compute them more efficiently. This transformation requires only a cost of some Frobenius actions. Additionally, we show that the squared Weil pairing can be computed more efficiently for trace zero point and derive an explicit formula for the 4th powered Weil pairing as an optimized version of the Weil pairing

    Development of a Chaff Dispense Program for Target Tracking Radar Deception

    Get PDF
    This study aims to develop an appropriate chaff dispensing program to deceive the target tracking radar (TTR) effectively. Chaff is a countermeasure commonly used by fighter aircraft to deceive TTR. However, there has been a lack of methodology for calculating chaff dispense programs that take into account the specific characteristics of the fighter, chaff, and TTR. This study proposes a methodology that considers these variables to calculate chaff dispense programs and addresses this gap. The proposed method is demonstrated through TESS engagement, which shows its effectiveness in various engagement situations

    Relationship between the Retinal Thickness Analyzer and the GDx VCC Scanning Laser Polarimeter, Stratus OCT Optical Coherence Tomograph, and Heidelberg Retina Tomograph II Confocal Scanning Laser Ophthalmoscopy

    Get PDF
    PURPOSE: To assess the relationship between the retinal thickness analyzer (RTA) parameters, and those of the GDx VCC scanning laser polarimeter (GDx VCC), Stratus OCT optical coherence tomography (Stratus OCT), and Heidelberg retinal tomograph II confocal scanning laser ophthalmoscopy (HRT II). METHODS: Twenty-nine primary open-angle glaucoma patients were retrospectively included in this study. Measurements were obtained using the RTA, GDx VCC, Stratus OCT, and HRT II. We calculated the correlation coefficients between the parameters of RTA and those of the other studies. RESULTS: Among the optic disc parameters of RTA, the cup volume was best correlated with Stratus OCT (R=0.780, p<0.001) and HRT II (R=0.896, p<0.001). Among the posterior pole retinal thickness parameters, the posterior pole abnormally thin area (PPAT) of the RTA and the inferior average of the GDx VCC were best correlated (R=-0.596, p=0.001). The PPAT of the RTA and the inferior maximum of the Stratus OCT were best correlated (R=-0.489, p=0.006). The perifoveal minimum thickness (PFMT) of the RTA and the cup shape measurement of the HRT II were best correlated (R=-0.565, p=0.004). CONCLUSIONS: Many RTA optic disc parameters were significantly correlated with those of the Stratus OCT and HRT II. The RTA posterior pole retinal thickness parameters were significantly correlated with those of the GDx VCC, Stratus OCT and HRT II. The RTA optic disc and posterior pole retinal thickness parameters may be valuable in the diagnosis of glaucomaope

    A New Forward Secure Signature Scheme

    Get PDF
    In this paper, we present two forward secure signature schemes based on gap Diffie-Hellman groups and prove these schemes to be secure in the sense of slightly stronger security notion than that by Bellare and Miner in the random oracle model. Both schemes use the same key update strategy as the encryption scheme presented by Canetti, Halevi and Katz. Hence, our schemes outperform the previous tree-based forward secure signature scheme by Bellare and Miner in the key generation and key update time, which are only constant in the number of time periods. Specifically, we describe a straightforward scheme following from the encryption scheme, and then improve its efficiency for signature verification algorithm which needs only 3 pairing computations independent of the total time periods
    • โ€ฆ
    corecore