Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (95)
  • Open Access


    Evaluation of Codebook Design Using SCMA Scheme Based on An and Dn Lattices

    G. Rajamanickam1,*, G. Ravi2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3037-3048, 2023, DOI:10.32604/iasc.2023.029996

    Abstract The sparse code multiple access (SCMA) scheme is a Non-Orthogonal Multiple Access (NOMA) type of scheme that is used to handle the uplink component of mobile communication in the current generation. A need of the 5G mobile network is the ability to handle more users. To accommodate this, the SCMA allows each user to deploy a variety of sub-carrier broadcasts, and several consumers may contribute to the same frequency using superposition coding. The SCMA approach, together with codebook design for each user, is used to improve channel efficiency through better management of the available spectrum.… More >

  • Open Access


    Some Properties of Degenerate r-Dowling Polynomials and Numbers of the Second Kind

    Hye Kyung Kim1,*, Dae Sik Lee2

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 825-842, 2022, DOI:10.32604/cmes.2022.022103

    Abstract The generating functions of special numbers and polynomials have various applications in many fields as well as mathematics and physics. In recent years, some mathematicians have studied degenerate version of them and obtained many interesting results. With this in mind, in this paper, we introduce the degenerate r-Dowling polynomials and numbers associated with the degenerate r-Whitney numbers of the second kind. We derive many interesting properties and identities for them including generating functions, Dobinski-like formula, integral representations, recurrence relations, differential equation and various explicit expressions. In addition, we explore some expressions for them that can be More >

  • Open Access


    A Certificateless Homomorphic Encryption Scheme for Protecting Transaction Data Privacy of Post-Quantum Blockchain

    Meng-Wei Zhang1, Xiu-Bo Chen1, Haseeb Ahmad2, Gang Xu3,4,*, Yi-Xian Yang1

    Journal of Cyber Security, Vol.4, No.1, pp. 29-39, 2022, DOI:10.32604/jcs.2022.027693

    Abstract Blockchain has a profound impact on all areas of society by virtue of its immutability, decentralization and other characteristics. However, blockchain faces the problem of data privacy leakage during the application process, and the rapid development of quantum computing also brings the threat of quantum attack to blockchain. In this paper, we propose a lattice-based certificateless fully homomorphic encryption (LCFHE) algorithm based on approximate eigenvector firstly. And we use the lattice-based delegate algorithm and preimage sampling algorithm to extract part of the private key based on certificateless scheme, which is composed of the private key More >

  • Open Access


    A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain

    Gang Xu1, Yibo Cao1, Shiyuan Xu1, Xin Liu2,*, Xiu-Bo Chen3, Yiying Yu1, Xiaojun Wang4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5429-5441, 2022, DOI:10.32604/cmc.2022.028562

    Abstract With the increasing popularity of cloud storage, data security on the cloud has become increasingly visible. Searchable encryption has the ability to realize the privacy protection and security of data in the cloud. However, with the continuous development of quantum computing, the standard Public-key Encryption with Keyword Search (PEKS) scheme cannot resist quantum-based keyword guessing attacks. Further, the credibility of the server also poses a significant threat to the security of the retrieval process. This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems. Firstly, we design More >

  • Open Access


    Policy-Based Group Signature Scheme from Lattice

    Yongli Tang1, Yuanhong Li1, Qing Ye1,*, Ying Li1, Xiaojun Wang2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4069-4085, 2022, DOI:10.32604/cmc.2022.026820

    Abstract Although the existing group signature schemes from lattice have been optimized for efficiency, the signing abilities of each member in the group are relatively single. It may not be suitable for complex applications. Inspired by the pioneering work of Bellare and Fuchsbauer, we present a primitive called policy-based group signature. In policy-based group signatures, group members can on behalf of the group to sign documents that meet their own policies, and the generated signatures will not leak the identity and policies of the signer. Moreover, the group administrator is allowed to reveal the identity of… More >

  • Open Access


    Multi-Material and Multiscale Topology Design Optimization of Thermoelastic Lattice Structures

    Jun Yan1,2, Qianqian Sui1, Zhirui Fan1, Zunyi Duan3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.2, pp. 967-986, 2022, DOI:10.32604/cmes.2022.017708

    Abstract This study establishes a multiscale and multi-material topology optimization model for thermoelastic lattice structures (TLSs) considering mechanical and thermal loading based on the Extended Multiscale Finite Element Method (EMsFEM). The corresponding multi-material and multiscale mathematical formulation have been established with minimizing strain energy and structural mass as the objective function and constraint, respectively. The Solid Isotropic Material with Penalization (SIMP) interpolation scheme has been adopted to realize micro-scale multi-material selection of truss microstructure. The modified volume preserving Heaviside function (VPHF) is utilized to obtain a clear 0/1 material of truss microstructure. Compared with the classic More >

  • Open Access


    A Novel Post-Quantum Blind Signature for Log System in Blockchain

    Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100

    Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of… More >

  • Open Access


    Novel Quantum Algorithms to Minimize Switching Functions Based on Graph Partitions

    Peng Gao*, Marek Perkowski, Yiwei Li, Xiaoyu Song

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4545-4561, 2022, DOI:10.32604/cmc.2022.020483

    Abstract After Google reported its realization of quantum supremacy, Solving the classical problems with quantum computing is becoming a valuable research topic. Switching function minimization is an important problem in Electronic Design Automation (EDA) and logic synthesis, most of the solutions are based on heuristic algorithms with a classical computer, it is a good practice to solve this problem with a quantum processer. In this paper, we introduce a new hybrid classic quantum algorithm using Grover’s algorithm and symmetric functions to minimize small Disjoint Sum of Product (DSOP) and Sum of Product (SOP) for Boolean switching More >

  • Open Access


    Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice

    Lin Mei1, Chungen Xu1,*, Lei Xu1, Xiaoling Yu2, Cong Zuo3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2299-2314, 2021, DOI:10.32604/cmc.2021.017216

    Abstract Internet of Things (IoT), which provides the solution of connecting things and devices, has increasingly developed as vital tools to realize intelligent life. Generally, source-limited IoT sensors outsource their data to the cloud, which arises the concerns that the transmission of IoT data is happening without appropriate consideration of the profound security challenges involved. Though encryption technology can guarantee the confidentiality of private data, it hinders the usability of data. Searchable encryption (SE) has been proposed to achieve secure data sharing and searching. However, most of existing SE schemes are designed under conventional hardness assumptions… More >

  • Open Access


    Lattice Boltzmann Simulation of Nanoparticle Transport and Attachment in a Microchannel Heat Sink

    Xiaokang Tian1, Kai Yue1,2,*, Yu You1,2, Yongjian Niu1, Xinxin Zhang1,2

    FDMP-Fluid Dynamics & Materials Processing, Vol.17, No.2, pp. 301-317, 2021, DOI:10.32604/fdmp.2021.013521

    Abstract The heat transfer performances of a microchannel heat sink in the presence of a nanofluid can be affected by the attachment of nanoparticle (NP) on the microchannel wall. In this study, the mechanisms underlying NP transport and attachment are comprehensively analyzed by means of a coupled double-distribution-function lattice Boltzmann model combined with lattice-gas automata. Using this approach, the temperature distribution and the two-phase flow pattern are obtained for different values of the influential parameters. The results indicate that the number of attached NPs decrease exponentially as their diameter and the fluid velocity grow. An increase… More >

Displaying 21-30 on page 3 of 95. Per Page