Open Topics

Vol. 70, n° 9-10, September-October 2015
Content available on Springerlink

Efficient and provable secure scheme for delegation of signing rights between the groups

Rajeev Anand Sahu1, Sahadeo Padhye2, Navaneet Ojha3
1 University of Hyderabad, India
2 Mothilal Nehru National Institute fo Technology, Allahabad, India
3 Galgotias College of Engineering and Technology, Greater Noida, India

Abstract Multi-proxy multi-signature scheme is one of the useful primitives of proxy signature scheme which enables a group of signers to delegate their signing rights to another group of their proxy signers. In literatures, only a few schemes of identity (ID)-based multi-proxy multi-signature (IBMPMS) from bilinear pairings are available but those schemes cannot be considered practical for implementations because either those are insecure or cost inefficient. Whereas due to numerous applications of IBMPMS scheme in distributed systems, grid computing, global distribution networks, etc., construction of an efficient and secure IBMPMS scheme is desired. In this paper, we propose a new construction of IBMPMS scheme from bilinear pairings. We also discuss a security model for IBMPMS schemes and prove that the proposed scheme is existential unforgeable against adaptive chosen-message and adaptive chosen-ID attacks under the computational Diffie–Hellman (CDH) assumption. Moreover, the proposed scheme is more efficient in the view of computation and operation time than the existing schemes. In particular, our scheme is up to 40 % more efficient and faster than the existing similar schemes.

Keywords ID-based cryptographyDigital signatureBilinear pairings – Delegation of signing rightsMulti-proxy multi-signature schemeCDHP – Provable securityRandom oracle

Performance analysis of semi-blind two-way AF relaying over generalized-k fading channels

Wided Hadj Alouane, Noureddine Hamdi
El Manar University, Tunis, Tunisia

Abstract In this paper, we present analytical expressions for the outage probability, average symbol error rate (SER), and average sum-rate of two-way dual-hop opportunistic amplify-and-forward (AF) relaying over independent and not necessarily identical generalized-k (KG) fading channels. New closed-form expression for the gain of non-regenerative semi-blind relays is derived. This expression is used to obtain the equivalent signal-to-noise ratio (SNR). Based on the above mentioned formulas, tight bounds of some performance metrics, the outage probability, average SER, and average sum-rate, are derived for the semi-blind and channel state information (CSI) relaying. In order to prove the exactness of the proposed mathematical analysis, a selection of numerical results is provided.

Keywords Two-wayOpportunisticAFSelectionRelayingSemi-blindSum-rateOutage probabilitySER

Strongly secure certificateless key-insulated signature secure in the standard model

Yanan Chen1,2, Weixiang Xu1, Hu Xiong3
1 Beijing Jiaotong University, China
2 JianXi University of Science and Technology, Nanchang, China
3 University of Electronic Science and Technology of China, Chengdu, China

Abstract To protect signing rights against the compromise of secret key, the key-insulated signature (KIS) has attracted a lot of attention from the industry and academia. It would be interesting to investigate the notion of KIS in the certificateless public key cryptography (CL-PKC) environment to solve the problem of certificate management and key escrow simultaneously. To capture the seeming neglected attack mounted by the malicious key generation center (KGC), a stronger security model for the CL-PKC should be considered. In this paper, we first show that the only known CL-KIS scheme is vulnerable against malicious KGC attack, and then propose the first CL-KIS scheme secure against malicious KGC attack, with security proof in the standard model.

Keywords Certificateless cryptosystemKey-insulated signatureMalicious-but-passive KGC attackStandard model

Conversion from mono-axial to isotropic measurements for assessing human exposure to electromagnetic fields of GSM/DCS/UMTS base stations

Mladen Koprivica, Aleksandar Nešković, Nataša Nešković
University of Belgrade, Serbia

Abstract This paper proposes a way to assess total electric field strength by using mono-axial probe (instead of isotropic, tri-axial probe). When mono-axial probe is used, additional conversion factor should be applied. Consequently, the usage of mono-axial probe causes additional uncertainty in measurement results that should be taken into account. Measurement results for seven different environments show that the additional multiplicative conversion factor value of 1.95 should be applied and additional uncertainty in measurement results of 33.07 % should be taken into account.

Keywords Mono-axial antenna measurementsTri-axial probeIsotropic measurementsHuman exposureBase stationMeasurement uncertainty

Performance of adaptive modulation with optimal switching thresholds for distributed antenna system in composite channels

Binbin Wu1, Xiangbin Yu1,2, Ying Wang1, Wenting Tan1, Ming Chen
1 Nanjing University of Aeronautics and Asronautics, China
2 Southeast University, Nanjing, China

Abstract In this paper, the performance of distributed antenna system (DAS) with adaptive modulation (AM) over a composite fading channel which takes path loss, Rayleigh fading, and log-normal shadowing into account is studied. Based on target bit error rate (BER), the AM scheme for DAS with average BER constraints is presented. The optimum switching thresholds (STs) for attaining maximum spectrum efficiency (SE) are derived by using Lagrange optimization method. An effective iterative algorithm based on Newton method for finding the optimal STs is proposed. With these thresholds, the closed-form expression of SE and average BER are derived for performance evaluation. Simulation results for SE and BER are in good agreement with the theoretical analysis. The results show that DAS-AM with optimal STs has higher SE than that with conventional fixed thresholds. Moreover, the proposed AM can fulfill the target BER for different signal-to-noise ratios (SNRs).

Keywords Distributed antenna systemsAdaptive modulationThresholds optimizationSpectrum efficiencyComposite fading channel

A novel hybrid prediction algorithm to network traffic

Dingde Jiang1, Zhengzheng Xu2, Hongwei Xu1
1 Northeastern University, Shenyang, China
2 Anqing Normal University, China

Abstract Network traffic describes the characteristics and users’ behaviors of communication networks. It is a crucial input parameter of network management and network traffic engineering. This paper proposes a new prediction algorithm to network traffic in the large-scale communication network. First, we use signal analysis theory to transform network traffic from time domain to time-frequency domain. In the time-frequency domain, the network traffic signal is decomposed into the low-frequency and high-frequency components. Second, the gray model is exploited to model the low-frequency component of network traffic. The white Gaussian noise model is utilized to describe its high-frequency component. This is reasonable because the low-frequency and high-frequency components, respectively, represent the trend and fluctuation properties of network traffic, while the gray model and white Gaussian noise model can well capture the characteristics. Third, the prediction models of low-frequency and high-frequency components are built. The hybrid prediction algorithm is proposed to overcome the problem of network traffic prediction in the communication network. Finally, network traffic data from the real network is used to validate our approach. Simulation results indicate that our algorithm holds much lower prediction error than previous methods.

Keywords Network trafficTraffic predictionTraffic modelingTime-frequency analysisPrediction error

STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost

Jean-François Couchot, Raphael Couturier, Christophe Guyeux
University of Franche-Comté, Besançon, France

Abstract A new steganographic method called STABYLO is introduced in this research work. Its main advantage is to be much lighter than the so-called HUGO, WOW, and UNIWARD schemes, the state of the art steganographic processes. To achieve the proposed goal, famous experimented components of signal processing, coding theory, and cryptography are combined together, leading to a scheme that can reasonably face up-to-date steganalysers.

Keywords SteganographyLeast-significant-bit (LSB)-based steganographyEdge detectionCanny filterSecuritySyndrome trellis codes