7 research outputs found

    Review of Community Detection in Complex Brain Networks

    Get PDF
    The brain network community detection algorithm has become a highly regarded topic in recent years within the fields of neuroscience and network science, widely employed to unveil patterns of structural and functional connectivity in the brain. Due to the complexity of the brain networks and the need to handle multiple subjects and various task scenarios, it significantly increases the difficulty of community detection in this field. This paper focuses on functional magnetic resonance imaging (fMRI) technology and comprehensively reviews the advancements in research regarding algorithms for detecting communities within brain functional networks. Firstly, the basic process, task categories, and method types of brain network community detection algorithms are described. Next, various brain network community detection algorithms are classified in different task scenarios, including separate communities, overlapping communities, hierarchical communities, and dynamic community detection algorithms. A detailed analysis of the advantages and disadvantages of different methods is provided, along with their applicable scopes. Finally, the future directions of brain network community detection algorithms are discussed, including the problem of community detection in multi-subject networks, robustness issues in brain network community detection, and studies on brain network community detection algorithms for multimodal imaging data. This paper can serve as a methodological guide for future research on brain network community structures

    Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme

    No full text

    Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme

    No full text
    In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator (PKG)) is able to calculate and issue any user’s private key, which makes it completely trusted, which severely influences the applications of the ABE scheme. To mitigate this problem, we propose the black box traceable ciphertext policy attribute-based encryption (T-CP-ABE) scheme in which if the PKG re-distributes the users’ private keys for malicious uses, it might be caught and sued. We provide a construction to realize the T-CP-ABE scheme in a black box model. Our scheme is based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model. In our scheme, we employ a pair (ID, S) to identify a user, where ID denotes the identity of a user and S denotes the attribute set associated with her

    Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method

    No full text
    Part 1: Modern CryptographyInternational audiencePiece in Hand method is a security enhancement method for Multivariate Public Key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece in Hand method as proposed by Tsuji et al. in 2009. The key point of this method is to introduce an invertible quadratic polynomial map on the plaintext variables to construct perturbation of the original MPKC. Through our analysis, we find that the security of the enhanced scheme is mainly relying on the quadratic polynomials of this auxiliary map. The two examples proposed by Tsuji et al. for this map can not resist the Linearization Equation attack. Given a valid ciphertext, we can easily get a public key which is equivalent to the original MPKC. If there is an algorithm that can recover the plaintext corresponding to a valid ciphertext of the original MPKC, we can construct an algorithm that can recover the plaintext corresponding to a valid ciphertext of the enhanced MPKC

    Cryptanalysis of Two New Instances of TTM

    No full text
    Abstract. In 2006, Nie et al proposed an attack to break an instance of TTM cryptosystems. However, the inventor of TTM disputed this attack and he proposed two new instances of TTM to support his viewpoint. At this time, he did not give the detail of key construction — the construction of the lock polynomials in these instances which would be used in decryption. The two instances are claimed to achieve a security of 2 109 against Nie et al attack. In this paper, we show that these instances are both still insecure, and in fact, they do not achieve a better design in the sense that we can find a ciphertext-only attack utilizing the First Order Linearization Equations while for the previous version of TTM, only Second Order Linearization Equations can be used in the beginning stage of the previous attack. Different from previous attacks, we use an iterated linearization method to break these two instances. For any given valid ciphertext, we can find its corresponding plaintext within 2 31 F 2 8computations after performing once for any public key a computation of complexity less than 2 44. Our experiment result shows we have unlocked the lock polynomials after several iterations, though we do not know the detailed construction of lock polynomials

    High Order Linearization Equation (HOLE)

    No full text
    In the CT-track of the 2006 RSA conference, a new multivariate public key cryptosystem, which is called the Medium Field Equation (MFE) multivariate public key cryptosystem, is proposed by Wang, Yang, Hu and Lai. We use the second order linearization equation attack method by Patarin to break MFE. Given a ciphertext, we can derive the plaintext within 2 F 2 16-operations, after performing once for any public key a computation of complexity less than 2 . We also propose a high order linearization equation (HOLE) attack on multivariate public key cryptosystems, which is a further generalization of the (first and second order) linearization equation (LE). This method can be used to attack extensions of the current MFE
    corecore