pairing function
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 1)

H-INDEX

5
(FIVE YEARS 0)

The potential disadvantage of ElGamal cryptosystem is the ciphertext produced is always twice as long as the plaintext i.e., the message expansion by a factor of two takes place during encryption. When the message is too long the ciphertext produced by the ElGamal cryptosystem is also too long. i.e., when the ciphertexts are transmitted through the communication channel which lead to provide less security because if anyone of the ciphertext from two ciphertexts for each character of the plaintext is intercepted by the adversary, the other may be retrieved easily because there is a relationship between the two ciphertexts. If two ciphertexts are reduced to one, the adversary may not be able to predict the two ciphertexts from one. To enhance the security of ElGamal cryptosystem, the binary Cantor function , Rosenberg pairing function and Elegant pairing functions are used in this paper. When the said functions are used, the two ciphertexts produced by each plaintext character are reduced to one, so that the adversary cannot easily be recovered the plaintext. Experimental results clearly revealed enhancing the security of ElGamal cryptosystem after incorporating the pairing functions into it.


Symmetry ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 175
Author(s):  
Yasuaki Sera ◽  
Takahiro Ueda ◽  
Hiroto Adachi ◽  
Masanori Ichioka

Non-magnetic impurity scattering effects on the vortex core states are theoretically studied to clarify the contributions from the sign-change of the pairing function in anisotropic superconductors. The vortex states are calculated by the Eilenberger theory in superconductors with p x -wave pairing symmetry, as well as the corresponding anisotropic s-wave symmetry. From the spatial structure of the pair potential and the local electronic states around a vortex, we examine the differences between anisotropic superconductors with and without sign-change of the pairing function, and estimate how twofold symmetric vortex core images change with increasing the impurity scattering rate both in the Born and the unitary limits. We found that twofold symmetric vortex core image of zero-energy local density of states changes the orientation of the twofold symmetry with increasing the scattering rate when the sign change occurs in the pairing function. Without the sign change, the vortex core shape reduces to circular one with approaching dirty cases. These results of the impurity effects are valuable for identifying the pairing symmetry by observation of the vortex core image by the STM observation.


Author(s):  
Jianhua He ◽  
Siqi Tao ◽  
Yang Deng ◽  
Libin Chen ◽  
Zhiying Mou

This paper designs a multi-sensor resource dynamic allocation method based on auction algorithm. Tasks are prioritized according to the needs of the engineering field. Task priority is used as the basis for multi-sensor resource allocation order, taking into account the target's threat value and information needs. The sensor and task pairing function is established and used to measure the sensor resource dynamic allocation, we also use Analytic Hierarchy Process to determine the weight of each performance parameter in the pairing function (such as detection probability, intercept probability, positioning accuracy, tracking accuracy, recognition probability, etc.). The auction algorithm is improved by adding resource dynamic allocation constraints, which not only ensures the continuous execution of the target task, but also improves the dynamic allocation efficiency of multi-sensor resources. The simulation results show that the allocation method in this paper is scientific and reasonable.


Genetics ◽  
2016 ◽  
Vol 205 (2) ◽  
pp. 657-671 ◽  
Author(s):  
Emily L. Kurdzo ◽  
David Obeso ◽  
Hoa Chuong ◽  
Dean S. Dawson

2016 ◽  
Vol 27 (01) ◽  
pp. 85-100 ◽  
Author(s):  
Lunzhi Deng ◽  
Jiwen Zeng ◽  
Huawei Huang

A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design cryptosystem with less pairing operations. Taken into account the computational costs, our scheme only requires 2 pairing operations in delegation and signing, respectively.


2015 ◽  
Vol 121 (8) ◽  
pp. 30-35
Author(s):  
B. Reddaiah ◽  
R. Pradeep Kumar Reddy ◽  
S. Hari Krishna

Sign in / Sign up

Export Citation Format

Share Document