Entity

Time filter

Source Type


Cheng L.,Technical Assessment Research Laboratory | Cheng L.,Beijing University of Posts and Telecommunications | Wen Q.,Beijing University of Posts and Telecommunications
IET Information Security | Year: 2015

Partially blind signature is an important technique in secure electronic cash (e-cash) system. The first concrete certificateless partially blind signature (CLPBS) scheme for e-cash was constructed in 2011. Recently it was found that this construction had a security weakness and a rescued scheme was given. Unfortunately, the formal security proof was not given. In this study, the authors first give cryptanalysis of their rescued scheme. They demonstrate that a malicious user in their rescued scheme can forge a signature on any message by replacing the signer's public key. In an e-cash system, blind signatures issued by the bank are viewed as e-cash. Once they apply their scheme to an untraceable e-cash system, a malicious user can forge valid electronic coins (i.e. valid signatures) without being detected by the bank. It will result in loss of the bank. Then, they propose a newly improved CLPBS scheme which achieves the strongest security level and has higher computational efficiency than the rescued scheme published earlier. Finally, they give an example of potential application to e-cash systems using their scheme. © The Institution of Engineering and Technology 2015. Source


Li J.,Beijing University of Posts and Telecommunications | Guo X.,Beijing University of Posts and Telecommunications | Song D.,Beijing University of Posts and Telecommunications | Xie F.,Technical Assessment Research Laboratory | Peng Y.,Technical Assessment Research Laboratory
China Communications | Year: 2012

In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eave sdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all information, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50% ; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. Source


Gao H.,Technical Assessment Research Laboratory | Peng Y.,Technical Assessment Research Laboratory | Jia K.,Technical Assessment Research Laboratory | Dai Z.,Technical Assessment Research Laboratory | Wang T.,Beijing University of Technology
Proceedings - 2013 9th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2013 | Year: 2013

This paper begins with a discussion of the role and value of industrial control system (ICS) test bed which apply a universal, controllable, realistic, and repeatable experimental platform to SCADA control system cyber security research. According to ICS layered architecture, ICS test bed based on emulation, physical, and simulation (EPS-ICS Test bed) is designed and implemented. EPS-ICS Test bed enables experimenters to create experiments with varying levels of fidelity and is widely used in vulnerability digging, comprehensive security training, facilitate development of security standards, develop advanced control system architectures and technologies that are more secure and robust. © 2013 IEEE. Source


Li J.,Beijing University of Posts and Telecommunications | Song D.,Beijing University of Posts and Telecommunications | Guo X.,Beijing University of Posts and Telecommunications | Xie F.,Technical Assessment Research Laboratory | Peng Y.,Technical Assessment Research Laboratory
China Communications | Year: 2011

In order to solve the various privacy and security problems in RFID system, a new low-cost RFID mutual authentication protocol based on ID updating mechanics is proposed. Inthe proposed scheme, the backend server keeps both the current ID and potential next ID for each tag, thus to solve the possible problem of de-synchronization attack in the most ID updating-based schemes. In the security analysis section, comparing several protocols in property required and attacker resistances, the comparison results show that the proposed protocol provides strong authentication and strong integrity of the transmissions andcan withstand most the possible attacks that break the security of the previous schemes. In the performance evaluation section, the analysis results also indicate that, in terms of computational cost and storage requirement, the proposed scheme is safer, more efficient, more suitable for low-cost tag and more feasible in practice. Source


Gao H.,Technical Assessment Research Laboratory | Peng Y.,Technical Assessment Research Laboratory | Dai Z.,Technical Assessment Research Laboratory | Xie F.,Technical Assessment Research Laboratory
Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012 | Year: 2012

This paper begins with a discussion of the deficiency of current algorithms which use the number of the changing points of frame-difference as the threshold to determine a moving object. Based on human morphology, the feature of the human body in video surveillance is analyzed. Secondly, "the head and shoulder projection curve"," the proportion of head hair "and "height-width ratio "are extracted as three key parameters by mathematical methods. Finally, the two key parameters are used to detect the moving target, replacing the existing threshold. DSP-based experimental results show that this method can effectively distinguish a moving human object from the moving interferential object caused by environmental change, thus to avoid the false alarms by the improvement of movement tracking stability. © 2012 IEEE. Source

Discover hidden collaborations