نتایج جستجو برای: identification scheme
تعداد نتایج: 625502 فیلتر نتایج به سال:
In this paper, we describe two serious weaknesses of an identity-based identification scheme proposed by Girault (presented at Eurocrypt ’90) that enables adversaries to forge identity, key pairs for a large group of users. We also show how to modify the scheme to make the attacks ineffective.
In 1989, (Shamir, 1989) proposed a new zero-knowledge identification scheme based on a NP-complete problem called PKP for Permuted Kernel Problem. For a given prime p, a given matrix A and a given vector V , the problem is to find a permutation π such that the permuted vector Vπ verifies A ·Vπ = 0 mod p. This scheme is still in 2011 known as one of the most efficient identification scheme based...
In the wake of rising energy costs, there is a critical need for sustainable energy management of commercial and residential buildings. Buildings consume approximately 40% of total energy consumed in the US, and current methods to reduce this level of consumption include energy monitoring, smart sensing, and advanced integrated building control. However, the building industry has been slow to r...
Recognition and classification of Power Quality Distorted Signals (PQDSs) in power systems is an essential duty. One of the noteworthy issues in Power Quality Analysis (PQA) is identification of distorted signals using an efficient scheme. This paper recommends a Time–Frequency Analysis (TFA), for extracting features, so-called "hybrid approach", using incorporation of Multi Resolution Analysis...
This paper focuses on parameter identification of a target tracker robot possessing flexible joints using particle swarm optimization (PSO) algorithm. Since, belt and pulley mechanisms are known as flexible joints in robotic systems, their elastic behavior affecting a tracker robot is investigated in this work. First, dynamic equations governing the robot behavior are extracted taking into acco...
Time-delay identification is one of the most important parameters in designing controllers. In the cases where the number of inputs and outputs in a system are more than one, this identification is of great concern. In this paper, a novel autocorrelation-based scheme for the state variable time-delay identification for multi-input multi-output (MIMO) system has been presented. This method is ba...
We propose a new identification scheme from a newly introduced lattice problem. Our scheme is a provable identification problem based on a lattice problem. This affirmatively answers the question raised by Hoffstein and others on the possibility to construct a provable identification/signature scheme from lattice problems. We give a concrete realization of the identification scheme using the NT...
We present a practical three-move interactive identification scheme, ID-DL, and prove it to be as secure as the discrete logarithm problem. ID-DL is almost as efficient as the Schnorr identification scheme, which is not provably secure. We also present another practical identification scheme, ID-RSA, which is proven to be as secure as the RSA problem and almost as efficient as the Guillou-Quisq...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید