该文提出了一种基于LWE(Learning With Errors)算法的密文域可逆隐写方案,利用LWE公钥密码算法对数据加密,用户在密文中嵌入隐藏信息,对于嵌入信息后的密文,用户使用隐写密钥可以有效提取隐藏信息,使用解密密钥可以无差错恢复出加密前...该文提出了一种基于LWE(Learning With Errors)算法的密文域可逆隐写方案,利用LWE公钥密码算法对数据加密,用户在密文中嵌入隐藏信息,对于嵌入信息后的密文,用户使用隐写密钥可以有效提取隐藏信息,使用解密密钥可以无差错恢复出加密前数据实现了提取过程与解密过程的可分离。通过推导方案在解密与提取信息过程中出错的概率,得到直接影响方案正确性的参数为所选噪声的标准差,实验获得并验证了标准差的合理取值区间;通过推导嵌入后密文的分布函数,分析密文统计特征的变化情况,论证了嵌入密文的隐藏信息的不可感知性。该方案是在密文域进行的可逆隐写,与原始载体无关,适用于文本、图片、音频等各类载体。实验仿真结果表明该方案不仅能够保证可逆隐写的可靠性与安全性,而且1 bit明文在密文域最大可负载1 bit隐藏信息。展开更多
There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition ...There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented, and the role is assigned a logical location domain to specify the spatial boundary. Roles are activated based on the current physical position of the user which obtsined from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, con- strained SC-RBAC allows express various spatial separations of duty constraints, location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 in- variants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.展开更多
Reciprocity may be understood as relation of action and reaction in the sense of Hegel’s philosophical definition. Quoting Kant, freedom and ethical necessities are reciprocally limited. In this contribution, a more ...Reciprocity may be understood as relation of action and reaction in the sense of Hegel’s philosophical definition. Quoting Kant, freedom and ethical necessities are reciprocally limited. In this contribution, a more mathematical than philosophical reflection about reciprocity as an ever-present dual property of everything was given. As a crystallographer, the author is familiar with the action of Fourier transforms and the relation between a crystal lattice and its reciprocal lattice, already pointing to the duality between particles and waves. A generalization of the reciprocity term was stimulated by results of the famous Information Relativity (IR) theory of Suleiman with its proven physical manifestation of matter-wave duality, compared to the set-theoretical E-Infinity theory developed by El Naschie, where the zero set represents the pre-quantum particle, and the pre-quantum wave is assigned to the empty set boundary surrounding the pre-particle. Expectedly, the most irrational number of the golden mean is involved in these thoughts, because this number is intimately connected with its inverse. An important role plays further Hardy’s maximum quantum entanglement probability as the fifth power of φand its connection to the dark matter. Remembering, the eleven dimensions in Witten’s M-theory may be decomposed into the Lucas number L5 = 11 = φ−5 – φ5. Reciprocity is indeed omnipresent in our world as piloting waves that accompany all observable earthen and cosmic matter. As a side effect of the IR theory some fundamental constants such as the gyromagnetic factor of the electron, Sommerfeld’s fine-structure constant as well as the charge of the electron must be marginally changed caused by altered relativistic corrections. Consequences also arise for our vision about the evolution of life and consciousness.展开更多
In this paper, the lattice model is presented, incorporating not only site information about preceding cars but also relative currents in front. We derive the stability condition of the extended model by considering a...In this paper, the lattice model is presented, incorporating not only site information about preceding cars but also relative currents in front. We derive the stability condition of the extended model by considering a small perturbation around the homogeneous flow solution and find that the improvement in the stability of traffic flow is obtained by taking into account preceding mixture traffic information. Direct simulations also confirm that the traffic jam can be suppressed efficiently by considering the relative currents ahead, just like incorporating site information in front. Moreover, from the nonlinear analysis of the extended models, the preceding mixture traffic information dependence of the propagating kink solutions for traffic jams is obtained by deriving the modified KdV equation near the critical point using the reductive perturbation method.展开更多
文摘该文提出了一种基于LWE(Learning With Errors)算法的密文域可逆隐写方案,利用LWE公钥密码算法对数据加密,用户在密文中嵌入隐藏信息,对于嵌入信息后的密文,用户使用隐写密钥可以有效提取隐藏信息,使用解密密钥可以无差错恢复出加密前数据实现了提取过程与解密过程的可分离。通过推导方案在解密与提取信息过程中出错的概率,得到直接影响方案正确性的参数为所选噪声的标准差,实验获得并验证了标准差的合理取值区间;通过推导嵌入后密文的分布函数,分析密文统计特征的变化情况,论证了嵌入密文的隐藏信息的不可感知性。该方案是在密文域进行的可逆隐写,与原始载体无关,适用于文本、图片、音频等各类载体。实验仿真结果表明该方案不仅能够保证可逆隐写的可靠性与安全性,而且1 bit明文在密文域最大可负载1 bit隐藏信息。
文摘There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented, and the role is assigned a logical location domain to specify the spatial boundary. Roles are activated based on the current physical position of the user which obtsined from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, con- strained SC-RBAC allows express various spatial separations of duty constraints, location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 in- variants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.
文摘Reciprocity may be understood as relation of action and reaction in the sense of Hegel’s philosophical definition. Quoting Kant, freedom and ethical necessities are reciprocally limited. In this contribution, a more mathematical than philosophical reflection about reciprocity as an ever-present dual property of everything was given. As a crystallographer, the author is familiar with the action of Fourier transforms and the relation between a crystal lattice and its reciprocal lattice, already pointing to the duality between particles and waves. A generalization of the reciprocity term was stimulated by results of the famous Information Relativity (IR) theory of Suleiman with its proven physical manifestation of matter-wave duality, compared to the set-theoretical E-Infinity theory developed by El Naschie, where the zero set represents the pre-quantum particle, and the pre-quantum wave is assigned to the empty set boundary surrounding the pre-particle. Expectedly, the most irrational number of the golden mean is involved in these thoughts, because this number is intimately connected with its inverse. An important role plays further Hardy’s maximum quantum entanglement probability as the fifth power of φand its connection to the dark matter. Remembering, the eleven dimensions in Witten’s M-theory may be decomposed into the Lucas number L5 = 11 = φ−5 – φ5. Reciprocity is indeed omnipresent in our world as piloting waves that accompany all observable earthen and cosmic matter. As a side effect of the IR theory some fundamental constants such as the gyromagnetic factor of the electron, Sommerfeld’s fine-structure constant as well as the charge of the electron must be marginally changed caused by altered relativistic corrections. Consequences also arise for our vision about the evolution of life and consciousness.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 60904068,10902076,11072117,and 61004113)
文摘In this paper, the lattice model is presented, incorporating not only site information about preceding cars but also relative currents in front. We derive the stability condition of the extended model by considering a small perturbation around the homogeneous flow solution and find that the improvement in the stability of traffic flow is obtained by taking into account preceding mixture traffic information. Direct simulations also confirm that the traffic jam can be suppressed efficiently by considering the relative currents ahead, just like incorporating site information in front. Moreover, from the nonlinear analysis of the extended models, the preceding mixture traffic information dependence of the propagating kink solutions for traffic jams is obtained by deriving the modified KdV equation near the critical point using the reductive perturbation method.