50 research outputs found

    Families of sequences with good family complexity and cross-correlation measure

    Full text link
    In this paper we study pseudorandomness of a family of sequences in terms of two measures, the family complexity (ff-complexity) and the cross-correlation measure of order \ell. We consider sequences not only on binary alphabet but also on kk-symbols (kk-ary) alphabet. We first generalize some known methods on construction of the family of binary pseudorandom sequences. We prove a bound on the ff-complexity of a large family of binary sequences of Legendre-symbols of certain irreducible polynomials. We show that this family as well as its dual family have both a large family complexity and a small cross-correlation measure up to a rather large order. Next, we present another family of binary sequences having high ff-complexity and low cross-correlation measure. Then we extend the results to the family of sequences on kk-symbols alphabet.Comment: 13 pages. Comments are welcome

    Comparison of Randomized Solutions for Constrained Vehicle Routing Problem

    Full text link
    In this short paper, we study the capacity-constrained vehicle routing problem (CVRP) and its solution by randomized Monte Carlo methods. For solving CVRP we use some pseudorandom number generators commonly used in practice. We use linear, multiple-recursive, inversive, and explicit inversive congruential generators and obtain random numbers from each to provide a route for CVRP. Then we compare the performance of pseudorandom number generators with respect to the total time the random route takes. We also constructed an open-source library github.com/iedmrc/binary-cws-mcs on solving CVRP by Monte-Carlo based heuristic methods.Comment: 6 pages, 2nd International Conference on Electrical, Communication and Computer Engineering (ICECCE), 12-13 June 2020, Istanbul, Turke

    Codes on Subgroups of Weighted Projective Tori

    Full text link
    We obtain certain algebraic invariants relevant to study codes on subgroups of weighted projective tori inside an nn-dimensional weighted projective space. As application, we compute all the main parameters of generalized toric codes on these subgroups of tori lying inside a weighted projective plane of the form \Pp(1,1,a).Comment: supported by TUBITAK Project No:119F17

    Verifiable Timed Proxy Signatures and Multi-signatures

    Get PDF
    Verifiable timed commitments serve as cryptographic tools that enable the binding of information to specific time intervals. By integrating these commitments into signature schemes, secure and tamper-evident digital signatures can be generated, ensuring the integrity of time-sensitive mechanisms. This article delves into the concept of verifiable timed commitments and explores their efficient applications in digital signature constructions. Specifically, it focuses on two important signature schemes: proxy signatures and multi-signatures. The idea of the timed proxy signature is to enable the delegation of signing rights for a specified period, allowing designated entities to sign messages on behalf of the original signer. On the other hand, multi-signatures allow multiple parties to collectively generate a single signature, ensuring enhanced security and accountability. The article presents an in-depth analysis of the underlying mechanisms, discussing their properties, strengths, and computational complexity. Through this exploration, the article aims to shed light on the potential of verifiable timed commitments and inspire further research in this evolving field of cryptography

    Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption

    Get PDF
    Secure and scalable data sharing is one of the main concerns of the Internet of Things (IoT) ecosystem. In this paper, we introduce a novel blockchain-based data-sharing construction designed to ensure full anonymity for both the users and the data. To share the encrypted IoT data stored on the cloud, users generate tokens, prove their ownership using zk-SNARKs, and anonymously target the destination address. To tackle the privacy concerns arising from uploading the data to the cloud, we use key-private re-encryption and share as little information as possible with the proxy. Furthermore, we provide security proof of our construction
    corecore