• Title/Summary/Keyword: Quadratic Scheme

Search Result 165, Processing Time 0.026 seconds

A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

  • Barakat, Tamer Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3231-3249
    • /
    • 2014
  • Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the real message. Sender - side deniable encryption scheme is considered to be one of the classification of deniable encryption technique which defined as resilient against coercing the sender. M. H. Ibrahim presented a sender - side deniable encryption scheme which based on public key and uncertainty of Jacobi Symbol [6]. This scheme has several problems; (1) it can't be able to derive the fake message $M_f$ that belongs to a valid message set, (2) it is not secure against Quadratic Residue Problem (QRP), and (3) the decryption process is very slow because it is based dramatically on square root computation until reach the message as a Quadratic Non Residue (QNR). The first problem is solved by J. Howlader and S. Basu's scheme [7]; they presented a sender side encryption scheme that allows the sender to present a fake message $M_f$ from a valid message set, but it still suffers from the last two mentioned problems. In this paper we present a new sender-side deniable public-key encryption scheme with fast decryption by which the sender is able to lie about the encrypted message to a coercer and hence escape coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which, when verified, gives the same ciphertext as the true message. Compared with both Ibrahim's scheme and J. Howlader and S. Basu's scheme, our scheme enjoys nice two features which solved the mentioned problems: (1) It is semantically secure against Quadratic Residue Problem; (2) It is as fast, in the decryption process, as other schemes. Finally, applying the proposed deniable encryption, we originally give a coercion resistant internet voting model without physical assumptions.

Error and Correction Schemes of Control Volume Radiative Energy with the Discrete Ordinates Interpolation Method (제어체적 복사열정산을 위한 구분종좌표보간법의 오차 및 보정방안)

  • Cha, Ho-Jin;Song, Tae-Ho
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.27 no.6
    • /
    • pp.796-803
    • /
    • 2003
  • The discrete ordinates interpolation method (DOIM) has shown good accuracy and versatile applicability for the radiation $problems^{(1,2)}$. The DOIM is a nonconservative method in that the intensity and temperature are computed only at grid points without considering control volumes. However, when the DOIM is used together with a finite volume algorithm such as $SIMPLER^{(3)}$, intensities at the control surfaces need to be calculated. For this reason, a 'quadratic' and a 'decoration' schemes are proposed and examined. They are applied to two kinds of radiation problem in one-dimensional geometries. In one problem, the intensity and temperature are calculated while the radiative heat source is given, and in the other, the intensity and the radiative heat source are computed with a given temperature field. The quadratic and the decoration schemes show very successful results. The quadratic scheme gives especially accurate results so that further decoration may not be needed. It is recommended that the quadratic and the decoration schemes may be used together, or, one of them may be applied for control volume radiative energy balance.

INTERNAL FEEDBACK CONTROL OF THE BENJAMIN-BONA-MAHONY-BURGERS EQUATION

  • Piao, Guang-Ri;Lee, Hyung-Chen
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.18 no.3
    • /
    • pp.269-277
    • /
    • 2014
  • A numerical scheme is proposed to control the BBMB (Benjamin-Bona-Mahony-Burgers) equation, and the scheme consists of three steps. Firstly, BBMB equation is converted to a finite set of nonlinear ordinary differential equations by the quadratic B-spline finite element method in spatial. Secondly, the controller is designed based on the linear quadratic regulator (LQR) theory; Finally, the system of the closed loop compensator obtained on the basis of the previous two steps is solved by the backward Euler method. The controlled numerical solutions are obtained for various values of parameters and different initial conditions. Numerical simulations show that the scheme is efficient and feasible.

Construction of Block-LDPC Codes based on Quadratic Permutation Polynomials

  • Guan, Wu;Liang, Liping
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.157-161
    • /
    • 2015
  • A new block low-density parity-check (Block-LDPC) code based on quadratic permutation polynomials (QPPs) is proposed. The parity-check matrix of the Block-LDPC code is composed of a group of permutation submatrices that correspond to QPPs. The scheme provides a large range of implementable LDPC codes. Indeed, the most popular quasi-cyclic LDPC (QC-LDPC) codes are just a subset of this scheme. Simulation results indicate that the proposed scheme can offer similar error performance and implementation complexity as the popular QC-LDPC codes.

QUADRATIC B-SPLINE GALERKIN SCHEME FOR THE SOLUTION OF A SPACE-FRACTIONAL BURGERS' EQUATION

  • Khadidja Bouabid;Nasserdine Kechkar
    • Journal of the Korean Mathematical Society
    • /
    • v.61 no.4
    • /
    • pp.621-657
    • /
    • 2024
  • In this study, the numerical solution of a space-fractional Burgers' equation with initial and boundary conditions is considered. This equation is the simplest nonlinear model for diffusive waves in fluid dynamics. It occurs in a variety of physical phenomena, including viscous sound waves, waves in fluid-filled viscous elastic pipes, magneto-hydrodynamic waves in a medium with finite electrical conductivity, and one-dimensional turbulence. The proposed QBS/CNG technique consists of the Galerkin method with a function basis of quadratic B-splines for the spatial discretization of the space-fractional Burgers' equation. This is then followed by the Crank-Nicolson approach for time-stepping. A linearized scheme is fully constructed to reduce computational costs. Stability analysis, error estimates, and convergence rates are studied. Finally, some test problems are used to confirm the theoretical results and the proposed method's effectiveness, with the results displayed in tables, 2D, and 3D graphs.

Monte Carlo burnup and its uncertainty propagation analyses for VERA depletion benchmarks by McCARD

  • Park, Ho Jin;Lee, Dong Hyuk;Jeon, Byoung Kyu;Shim, Hyung Jin
    • Nuclear Engineering and Technology
    • /
    • v.50 no.7
    • /
    • pp.1043-1050
    • /
    • 2018
  • For an efficient Monte Carlo (MC) burnup analysis, an accurate high-order depletion scheme to consider the nonlinear flux variation in a coarse burnup-step interval is crucial accompanied with an accurate depletion equation solver. In a Seoul National University MC code, McCARD, the high-order depletion schemes of the quadratic depletion method (QDM) and the linear extrapolation/quadratic interpolation (LEQI) method and a depletion equation solver by the Chebyshev rational approximation method (CRAM) have been newly implemented in addition to the existing constant extrapolation/backward extrapolation (CEBE) method using the matrix exponential method (MEM) solver with substeps. In this paper, the quadratic extrapolation/quadratic interpolation (QEQI) method is proposed as a new high-order depletion scheme. In order to examine the effectiveness of the newly-implemented depletion modules in McCARD, four problems in the VERA depletion benchmarks are solved by CEBE/MEM, CEBE/CRAM, LEQI/MEM, QEQI/MEM, and QDM for gadolinium isotopes. From the comparisons, it is shown that the QEQI/MEM predicts ${k_{inf}}^{\prime}s$ most accurately among the test cases. In addition, statistical uncertainty propagation analyses for a VERA pin cell problem are conducted by the sensitivity and uncertainty and the stochastic sampling methods.

Geometric Correction for Uneven Quadric Projection Surfaces Using Recursive Subdivision of B$\acute{e}$zier Patches

  • Ahmed, Atif;Hafiz, Rehan;Khan, Muhammad Murtaza;Cho, Yongju;Cha, Jihun
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1115-1125
    • /
    • 2013
  • This paper presents a scheme for geometric correction of projected content for planar and quadratic projection surfaces. The scheme does not require the projection surface to be perfectly quadratic or planar and is therefore suitable for uneven low-cost commercial and home projection surfaces. An approach based on the recursive subdivision of second-order B$\acute{e}$zier patches is proposed for the estimation of projection distortion owing to surface imperfections. Unlike existing schemes, the proposed scheme is completely automatic, requires no prior knowledge of the projection surface, and uses a single uncalibrated camera without requiring any physical markers on the projection surface. Furthermore, the scheme is scalable for geometric calibration of multi-projector setups. The efficacy of the proposed scheme is demonstrated using simulations and via practical experiments on various surfaces. A relative distortion error metric is also introduced that provides a quantitative measure of the suppression of geometric distortions, which occurs as the result of an imperfect projection surface.

Unproved Mutual Authentication Scheme based on Quadratic Residue for RFID (RFID를 위한 이차잉여 기반의 개선된 상호인증 기법)

  • Park, Han-Nah;Kim, Se-Il;Chun, Ji-Young;Lee, Dong-Hoon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.425-429
    • /
    • 2009
  • Recently, Chen et al.'s proposed mutual authentication scheme based on the quadratic resiidue, finding the squaring root problem, for avoiding exhaustive search on the server. But, if a malicious reader sends same random value, the tag is traced by an adversary. Moreover, there is realization problem because of its limited ability to compute squaring and hash function. In this paper, we analyze Chen et al.'s scheme and its weakness. Furthermore we present an improved mutual authentication scheme based on the quadratic residue which solves the tracing problem by generating random value on the tag and uses only squaring. We also make the scheme satisfy to forward secrecy without updating and synchronizing and avoid exhaustive search.

QUADRATIC B-SPLINE FINITE ELEMENT METHOD FOR THE BENJAMIN-BONA-MAHONY-BURGERS EQUATION

  • Yin, Yong-Xue;Piao, Guang-Ri
    • East Asian mathematical journal
    • /
    • v.29 no.5
    • /
    • pp.503-510
    • /
    • 2013
  • A quadratic B-spline finite element method for the spatial variable combined with a Newton method for the time variable is proposed to approximate a solution of Benjamin-Bona-Mahony-Burgers (BBMB) equation. Two examples were considered to show the efficiency of the proposed scheme. The numerical solutions obtained for various viscosity were compared with the exact solutions. The numerical results show that the scheme is efficient and feasible.

Quadratic Kalman Filter Object Tracking with Moving Pictures (영상 기반의 이차 칼만 필터를 이용한 객체 추적)

  • Park, Sun-Bae;Yoo, Do-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.1
    • /
    • pp.53-58
    • /
    • 2016
  • In this paper, we propose a novel quadratic Kalman filter based object tracking algorithm using moving pictures. Quadratic Kalman filter, which is introduced recently, has not yet been applied to the problem of 3-dimensional (3-D) object tracking. Since the mapping of a position in 2-D moving pictures into a 3-D world involves non-linear transformation, appropriate algorithm must be chosen for object tracking. In this situation, the quadratic Kalman filter can achieve better accuracy than extended Kalman filter. Under the same conditions, we compare extended Kalman filter, unscented Kalman filter and sequential importance resampling particle filter together with the proposed scheme. In conculsion, the proposed scheme decreases the divergence rate by half compared with the scheme based on extended Kalman filter and improves the accuracy by about 1% in comparison with the one based on unscented Kalman filter.