• Title/Summary/Keyword: Bilinear

Search Result 682, Processing Time 0.025 seconds

Provably Secure Certificate-Based Signcryption Scheme without Pairings

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2554-2571
    • /
    • 2014
  • Certificate-based cryptography is a new cryptographic paradigm that provides an interesting balance between identity-based cryptography and traditional public key cryptography. It not only simplifies the complicated certificate management problem in traditional public key cryptography, but also eliminates the key escrow problem in identity-based cryptography. As an extension of the signcryption in certificate-based cryptography, certificate-based signcryption provides the functionalities of certificate-based encryption and certificate-based signature simultaneously. However, to the best of our knowledge, all constructions of certificate-based signcryption in the literature so far have to be based on the costly bilinear pairings. In this paper, we propose a certificate-based signcryption scheme that does not depend on the bilinear pairings. The proposed scheme is provably secure in the random oracle model. Due to avoiding the computationally-heavy paring operations, the proposed scheme significantly reduces the cost of computation and outperforms the previous certificate-based signcryption schemes.

Steam Temperature Controller Design of Power Plant Superheater (발전기 과열기의 증기 온도 제어기 설계)

  • Hong, Hyun-Mun;Lee, Bong-Seob
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.9 no.3
    • /
    • pp.179-181
    • /
    • 2006
  • In this paper, we present a method of fuzzy controller design for the power plant superheater in the form of bilinear system. For the steam temperature control, the input variables are constructed by the area of difference between the profiles estimated from bilinear observer and reference profiles, and the time rate of change. We estimate the control rules by T. Takagi and M. Sugeno's fuzzy model. The feasibilities of the suggested method are illustrated via the computer simulation result.

  • PDF

Efficient Identity-Based Generalized Ring Signcryption Scheme

  • Zhou, Caixue;Cui, Zongmin;Gao, Guangyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5553-5571
    • /
    • 2016
  • In this paper, we introduce a new concept called generalized ring signcryption (GRSC), which can achieve ring signature and ring signcryption functions with only one key pair and one algorithm. It is very useful for a system which has a large number of users, or has limited storage space, or whose function requirements may be changed later. We give a formal definition and a security model of GRSC and propose a concrete scheme based on bilinear pairings. In the random oracle model, the scheme's confidentiality can be proved under the GBDH assumption, and its unforgeability can be proved under GDH' assumption, and what is more, this scheme also allows unconditional anonymity. Compared with other identity-based ring signcryption schemes that use bilinear pairings as well, our scheme is a highly efficient one.

Robust $H_{\infty}$ Control for Bilinear Systems via State Feedback (상태 피드백에 의한 쌍일차 계통의 강인 $H_{\infty}$ 제어)

  • Kim, Young-Joong;Kim, Beom-Soo;Lim, Myo-Taeg
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2037-2039
    • /
    • 2002
  • This paper focuses on robust $H_{\infty}$ control for bilinear systems with time-varying parameter uncertainties via state feedback. The suitable robustly stabilizing feedback control law can be constructed in term of solution to a state variable x-dependent quadratic Riccati equation using successive approximation technique. Also, the state feedback control law robustly stabilizes the plant and guarantees a robust $H_{\infty}$ performance for the closed-loop bilinear system with parameter uncertainties and exogenous disturbance.

  • PDF

A Study on the Algebraic Analysis of FDI(failure detection and isolation) in Bilinear System (쌍일차계에 대한 FDI(고장검출 및 분리)의 대수적인 해석에 관한 연구)

  • In, Don-Gi;Cho, Young-Ho;Oh, Min-Hwan;Kim, Jae-Il;Chae, Young-Mu;Ahn, Doo-Soo
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2627-2629
    • /
    • 2000
  • This paper introduces the design of a reduced order observer with unknown inputs for the purpose of fault detection and isolation(FDI) in a class of bilinear systems. To Analyze the observer and FDI, this paper uses BPF(block-pulse functions). The operational properties of BPF are much applied to the analysis of bilinear systems. The integral operational matrix BPF converts the form of the differential equation into the algebraic problems.

  • PDF

Adaptive Bilinear Lattice Filter(II)-Least Squares Lattice Algorithm (적응 쌍선형 격자필터 (II) - 최소자승 격자 알고리즘)

  • Heung Ki Baik
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.1
    • /
    • pp.34-42
    • /
    • 1992
  • This paper presents two fast least-squares lattice algorithms for adaptive nonlinear filters equipped with bilinear system models. The lattice filters perform a Gram-Schmidt orthogonalization of the input data and have very good numerical properties. Furthermore, the computational complexity of the algorithms is an order of magnitude snaller than previously algorithm is an order of magnitude smaller than previously available methods. The first of the two approaches is an equation error algorithm that uses the measured desired response signal directly to comprte the adaptive filter outputs. This method is conceptually very simple`however, it will result in biased system models in the presence of measurement noise. The second approach is an approximate least-squares output error solution. In this case, the past samples of the output of the adaptive system itself are used to produce the filter output at the current time. Results of several experiments that demonstrate and compare the properties of the adaptive bilinear filters are also presented in this paper. These results indicate that the output error algorithm is less sensitive to output measurement noise than the squation error method.

  • PDF

Design of a Controller Using Successive Approximation for Weakly Copled Bilinear Systems (연속적 근사화 방법을 이용한 쌍일차 정규섭동 시스템의 최적제어기 설계)

  • Chang, Jae-Won;Lee, Sang-Yup;Kim, Beom-Soo;Lim, Myo-Taeg
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.1999-2001
    • /
    • 2001
  • The infinite time optimum to regulate the problem of weakly coupled bilinear systems with a quadratic performance criterion is obtained by a sequence of algebraic Lyapunov equations. The new approach is based on the successive approximations. In particular, the order reduction is achieved by using suitable state transformation so that the original Lyapunov equations are decomposed into the reduced-order local Lyapunov equations. The proposed algorithms not only solve optimal control problems in the weakly coupled bilinear system but also reduce the computation time. This paper also includes an example to demonstrate the procedures.

  • PDF

Composite Control for Weakly Coupled Bilinear Systems with Successive Galerkin Approximation (연속적 Galerkin 근사를 이용한 정규 섭동 쌍일차 시스템에 대한 합성 제어)

  • Kim, Young-Joong;Kim, Beom-Soo;Lim, Myo-Taeg
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.1996-1998
    • /
    • 2001
  • This paper presents the closed-loop composite control for weakly coupled bilinear systems with a quadratic performance criterion. The Riccati equation for weakly coupled bilinear system is decomposed into three reduced Riccati equations by the weak coupling theory, and we obtain optimal solutions of each reduced Riccati equation using successive Galerkin approximation(SGA). We design the composite control law that consists of optimal solutions of each reduced Riccati equation. The proposed algorithm reduces the disadvantages of SGA method.

  • PDF

An Efficient Authentication Scheme using Bilinear Pairing in NFC-enabled Mobile Payment System (NFC 모바일 결제 시스템에서 Bilinear Pairing을 이용한 효율적인 인증 메커니즘)

  • Chen, Xinyi;Choi, Kyong;Chae, Kijoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.961-964
    • /
    • 2012
  • NFC(Near Field Communication)는 10cm 이내의 거리에서 무선기기 간의 통신을 가능케 해주는 기술로 13.56 Mhz RF(Radio Frequency) 주파수 대역을 이용한 비접촉식 근거리 무선통신의 한 종류이다. 올해 출시되는 대부분의 스마트 폰에서 NFC 기능을 탑재하며, NFC기반의 모바일 결제 서비스가 가장 유망한 결제 방식으로 주목 받고 있다. 소비자는 NFC 모바일 단말기를 가지고 판매자의 POS(Point of Sale) 단말기와 근접 통신을 통해 결제를 진행하는 방식으로 다른 무선 통신 방식 (RFID, Bluetooth 등)보다 보안 취약성이 높지 않지만, 기존의 RFID 환경에서 일어날 수 있는 기술적 취약점과 비슷한 유형의 위협이 충분히 발생할 수 있으므로 유효한 보안 기술이 필요하다. 본 논문은 안전한 NFC 모바일 결제 환경을 구축하기 위한 공개키 알고리즘인 타원곡선 암호ECC(Elliptic Curve Cryptosystem)를 적용한 Bilinear Pairing을 활용해서 효율적이고 보안성도 강력한 인증 메커니즘을 제안한다.

A Secure User Authentication Scheme using ID-based Bilinear Pairing based on Smart Card (스마트카드 기반 ID-based Bilinear Pairing을 이용한 안전한 사용자 인증 스킴)

  • Chen, Xinyi;Choi, Kyong;Chae, Kijoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.679-682
    • /
    • 2013
  • 스마트카드는 편리성과 안전성의 특성으로 인해 원격 시스템 인증에 다양하게 사용된다. 카드를 사용해서 통신하는 분야에서는 스마트카드에 대한 보안과 카드 소지자의 인증이 매우 중요하다. 기존 패스워드와 스마트카드를 이용한 원격 사용자 인증 기법은 공격자에 의해서 정당한 아이디와 패스워드 쌍을 쉽게 만들 수 있게 됨으로써 위장 공격이 가능한 취약점이 존재한다. 본 연구에서는 카드 보안 기술의 특징을 기반으로 하여 안전하고 편리한 사용자 인증 서비스를 제공하기 위해 키 생성 알고리즘인 ID-based Bilinear Pairing 암호방식을 이용해서 스마트카드 사용자와 서버 사이에 인증 스킴을 제안한다.