• Title/Summary/Keyword: PVSS

Search Result 4, Processing Time 0.02 seconds

Efficient and General PVSS Based on ElGamal Encryption

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.375-388
    • /
    • 2012
  • PVSS stands for publicly verifiable secret sharing. In PVSS, a dealer shares a secret among multiple share holders. He encrypts the shares using the shareholders' encryption algorithms and publicly proves that the encrypted shares are valid. Most of the existing PVSS schemes do not employ an ElGamal encryption to encrypt the shares. Instead, they usually employ other encryption algorithms like a RSA encryption and Paillier encryption. Those encryption algorithms do not support the shareholders' encryption algorithms to employ the same decryption modulus. As a result, PVSS based on those encryption algorithms must employ additional range proofs to guarantee the validity of the shares obtained by the shareholders. Although the shareholders can employ ElGamal encryptions with the same decryption modulus in PVSS such that the range proof can be avoided, there are only two PVSS schemes based on ElGamal encryption. Moreover, the two schemes have their drawbacks. One of them employs a costly repeating-proof mechanism, which needs to repeat the dealer's proof at least scores of times to achieve satisfactory soundness. The other requires that the dealer must know the discrete logarithm of the secret to share and thus weakens the generality and it cannot be employed in many applications. A new PVSS scheme based on an ElGamal encryption is proposed in this paper. It employs the same decryption modulus for all the shareholders' ElGamal encryption algorithms, so it does not need any range proof. Moreover, it is a general PVSS technique without any special limitation. Finally, an encryption-improving technique is proposed to achieve very high efficiency in the new PVSS scheme. It only needs a number of exponentiations in large cyclic groups that are linear in the number of the shareholders, while all the existing PVSS schemes need at least a number of exponentiations in large cyclic groups that are linear in the square of the number of the shareholders.

Shock-Resistance Responses of Frigate Equipments by Underwater Explosion

  • Kim, Hyunwoo;Choung, Joonmo
    • Journal of Ocean Engineering and Technology
    • /
    • v.36 no.3
    • /
    • pp.161-167
    • /
    • 2022
  • Three-dimensional finite element analysis (3D-FEA) models have been used to evaluate the shock-resistance responses of various equipments, including armaments mounted on a warship caused by underwater explosion (UNDEX). This paper aims to check the possibility of using one-dimensional (1D) FEA models for the shock-resistance responses. A frigate was chosen for the evaluation of the shock-resistance responses by the UNDEX. The frigate was divided into the thirteen discrete segments along the length of the ship. The 1D Timoshenko beam elements were used to model the frigate. The explosive charge mass and the stand-off distance were determined based on the ship length and the keel shock factor (KSF), respectively. The UNDEX pressure fields were generated using the Geers-Hunter doubly asymptotic model. The pseudo-velocity shock response spectrum (PVSS) for the 1D-FEA model (1D-PVSS) was calculated using the acceleration history at a concerned equipment position where the digital recursive filtering algorithm was used. The 1D-PVSS was compared with the 3D-PVSS that was taken from a reference, and a relatively good agreement was found. In addition, the 1D-PVSS was compared with the design criteria specified by the German Federal Armed forces, which is called the BV043. The 1D-PVSS was proven to be relatively reasonable, reducing the computing cost dramatically.

Association of Type 2 Diabetes Mellitus With Perivascular Spaces and Cerebral Amyloid Angiopathy in Alzheimer's Disease: Insights From MRI Imaging

  • Ozlem Bizpinar Munis
    • Dementia and Neurocognitive Disorders
    • /
    • v.22 no.3
    • /
    • pp.87-99
    • /
    • 2023
  • Background and Purpose: According to the amyloid cascade hypothesis, fibrillary amyloid-beta load in the brain causes Alzheimer's disease (AD) with toxic effects. Recently, perivascular spaces (PVSs), fluid-filled cavities around small penetrating arterioles and venules in the brain, and the glymphatic system relationship with type 2 diabetes mellitus (DM2) and AD has been an important research topic from a physiopathological point of view. There are two types of PVSs that are associated with sporadic atherosclerosis and cerebral amyloid angiopathy. In this study, we evaluated the relationship between the number and localization of enlarged PVSs in AD. Methods: A total of 254 patients with AD and 125 healthy controls were included in this study All the patients were evaluated with neurological and cognitive examinations and magnetic resonance imaging (MRI). PVSs on MRI were graded by recording their number and location. The study was a retrospective study. Results: In our study, the number of white matter convexity-central semiovale localized PVSs was higher in patients than in the control group. In addition, the number of PVSs in this localization score was higher in patients with DM2. Cerebral PVS counts were higher in patients with AD than in the control group. Conclusions: These results suggest the important role of cerebral amyloid angiopathy, one of the vascular risk factors, and the glymphatic system in the pathogenesis of AD. In addition, the results of our study suggest that the evaluation of PVSs levels, especially at the (centrum semiovale), using imaging studies in AD is a potential diagnostic option.

A Secure Auction Protocol without Any Dispute

  • Ha, Jung-Hoon;Kwak, Dong-Jin;Moon, Sang-Jae
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.518-522
    • /
    • 2003
  • We propose a new auction protocol scheme that uses the publicly verifiable secret sharing (PVSS) scheme. Unlike the existing scheme where a verifiable encryption scheme is employed when there is a dispute between a bidder and the auctioneer, the proposed scheme essentially removes the potential of a dispute. In addition, it has a robust registration phase and any entities participating in or observing the auction can verify the correctness of the auction process. The manager does not directly chooses the private key for the bidders, but only verifies the correctness between the private key and the public key, thereby improving the security, such as a bid submission of a malicious manager using the private key of a bidder.

  • PDF