A Novel ID-based Electronic Cash System from Pairings

Size: px
Start display at page:

Download "A Novel ID-based Electronic Cash System from Pairings"

Transcription

1 A Novel ID-based Electronc ash System from Parngs Jue-Sam hou, Yaln hen, Mng-Hsun ho, Hung-Mn Sun 4 Department of Informaton Management, Nanhua Unversty, Tawan R.O. : correspondng author: schou@mal.nhu.edu.tw Tel: 886+ ( ext.5656 Insttute of nformaton systems and applcatons, Natonal Tsng Hua Unversty d94970@oz.nthu.edu.tw Department of Informaton Management, Nanhua Unversty,, hung eng L, Daln hay 6 Tawan, RO Abstract dsshng@gmal.com 4 Insttute of nformaton systems and applcatons, Natonal Tsng Hua Unversty cs.nthu.edu.tw Recently, hen et al. and Juang et al. each proposed one and two e-cash payment systems respectvely. They clamed that ther schemes are secure. However, n ths paper, we wll present the shortcomngs of ther schemes and then propose a novel one from parngs. After securty analyss and comparson, we conclude that our scheme not only s more secure but also possesses more functons that a secure electronc cash system should encompass than all of the proposed protocols. eywords: Electronc cash, e-cash, Off-lne, lnear parng, lnd sgnature, ID-based. Introducton Nowadays, electronc commerce s becomng more and more popular on the Internet. Many knds of nternet servces are therefore developed. Among them, electronc payment system s one of the most mportant technology. In 98, haum [] frst proposed an untraceable electronc cash system based on blnd sgnature whch allows the reuester to obtan a message sgnature from a sgner wthout revealng the message content and makes the sgner cannot lnk any sgned message to ts sgnature. In 984, Shamr [] ntroduced the concept of ID-based cryptography to smplfy key management procedures for lc key nfrastructures. It reures no key exchange. In t, a user s lc key can be derved from hs dentty, and hs prvate key s generated by a trusted thrd party called Prvate ey Generator (PG. oneh and Frankln [] proposed a practcal ID-based encrypton scheme n 00 and Zhang and m [4] proposed the frst ID-based blnd sgnature scheme n 00, respectvely. In the systems, data encrypton and sgnature verfcaton

2 proceses reure only usng user s dentty along wth some lc system parameters. Subseuently, many blnd sgnature schemes [5-0] and many electronc cash systems [5-4] employng blnd sgnature technology based on ether tradtonal DLP or ID-based cryptosystem have been proposed. In 00, H.Wang et al. [8] proposed an untraceable off-lne electronc cash scheme. They clamed that n ther scheme, the user remans anonymous from the wthdrawal phase, payment phase to the depost phase. However, we found ther scheme not only can t satsfy the anonymous property but also can t prevent an adversary from usng the con for shoppng. We wll demonstrate the weaknesses n Appendx A.( and (4 respectvely. In 004, Juang et al. [5] proposed a practcal anonymous mult-authorty e-cash scheme to acheve the goal of anonymty, securty and verfablty. However, ther scheme does not satsfy the unforgeable property because an adversary can fake an e-con for shoppng over the nternet. In 005, hen et al. [7] proposed a RSA based depost delegaton scheme. They clamed that ther scheme s smple and secure. Yet, we found t s nsecure for that an adversary can easly make the system confused by masueradng as other merchant. Moreover, ther scheme sn t a complete soluton for an electronc cash system snce t only concerns about the depost functon. In 007, Juang [6] proposed a D-cash system. They clamed that ther scheme s practcal and flexble. However, after analyss, we found Juang s scheme does not satsfy the unforgeable property because an adversary can easly fake a sgnature for the customer durng the wthdrawal phase (Later, we wll demonstrate the weaknesses n schemes [5, 6, 7] n ths artcle.. Also n 007, Popescu et al. [9] proposed an off-lne electronc cash based on parngs. They clamed ther scheme s secure. However, t has a serous drawback that the e-con n the wthdrawal phase s dfferent from the one n the payment phase. Ths volates the basc rule of an e-cash system. In 008, Shangpng Wang et al. [0] proposed a certfcateless electronc cash scheme wth multple banks based on group sgnatures. They clamed that ther scheme can satsfy varous securty reurements. ut we found t has a shortcomng that an adversary can successfully pass the dentty verfcaton to wthdraw an e-con from the wthdrawal phase. We wll demonstrate the weaknesses n Appendx A. (4. Also n 008, Alfredo De Sants et al. [] showed an attack on Wang et al. sflexble payment scheme [4]. Ther attack uses only lc nformaton to construct a faked proof for the ownershp of a con. In 009, Fan et al. [] proposed a far anonymous rewardng based on electronc cash and Ashraf et al. [] proposed a prvacy-preservng e-payments usng one-tme payment. However, the former emphaszes on far rewardng, not on the e-cash mechansm tself and the latter ust focuses on the payment phase. That s, there stll lacks a secure complete system nowadays. Hence, n ths paper, we propose

3 such a system. We wll frst revew the shortcomngs of three e-cash schemes [5-7] and then propose a secure ID-based electronc cash system from parngs. The remander of ths paper s organzed as follows. In Secton, we descrbe the roles and functons n a secure electronc cash system, the background concepts of blnear parngs, and some related mathematcal problems. In Secton, we analyze the schemes of Juang et al. s[5], Juang s[6], and hen et al. s [7],respectvely. After that, we present our ID-based blnear parng electronc cash system n Secton 4 and analyze ts securty n Secton 5. Then, we make comparsons wth other schemes n Secton 6. Fnally, a concluson s gven n Secton 7.. ackground In ths secton, we brefly revew the roles and functons n a secure complete electronc cash system, the basc knowledge of blnear parngs, and some related mathematcal problems on whch the securty of our scheme s based... Roles and functons n a secure complete electronc cash system A smple electronc cash system [8] conssts of three partes (a customer, a bank, and a merchant M and three man procedures (wthdrawal, payment and depost. In an e-con s lfe-cycle, the customer frst opens an account n a bank. To obtan an e-con, performs a wthdrawal protocol wth. then performs a payment protocol for shoppng n a merchant by usng the wthdrawn e-con. After recevng the e-con, M sends t to the bank and transfers the correspondng money to M s account. Moreover, From [6, 8, 9, 0, 4, 5], we summarze fve mportant reurements for a secure complete electronc cash system. They are: (mutual authentcaton, (verfablty, (anonymty, (4unforgeablty, and (5traceablty. mutual authentcaton means that two partes can authentcate each other correctly. verfablty ponts out that one can ensure the correctness and ntegrty of messages transmtted by the other desgnated party. anonymty sgnfes that no e-con can be lnked by the bank to ts correspondng wthdrawal. unforgeablty ndcates that no adversary can create a vald e-con wthout havng to wthdraw from a bank. And traceablty means that we can reveal the dentty of customer f the same e-con s spent twce... lnear Parngs Let G be a cyclc addtve group of order generated by a base pont P, G be a cyclc multplcatve group of the same order. It s assumed that solvng the dscrete logarthm problem (DLP n both G and G s dffcult []. A

4 cryptographc blnear map e s defned as e : G G G followng propertes []: ( lnear: e P, Q G and all ab (ˆ ap, bq ˆ P, Q,where whch has the a., b Z ( Non-degeneracy: There exsts P, Q G such that e (ˆ P, Q, n other words, the map does not send all pars n G G to the dentty n G. ( omputable: There s an effcent algorthm to compute ˆ P, Q for all P, Q G... omputatonal Problems on Ellptc curve Here, we ntroduce some mathematcal problems whch form the securty bass of our scheme. ( Ellptc curve Dscrete logarthm problem (EDLP: Gven two elements P, Q G, fnd an nteger a Z, such that Q ap. ( omputatonal Dffe-Hellman problem (DHP: For any a, b, gven P, ap, bp, compute abp. ( Decsonal Dffe-Hellman problem (DDHP: For any a, b, c, gven P, ap, bp, cp, decde whether c ab mod. (4 lnear computatonal Dffe-Hellman problem (DHP: For any gven P, ap, bp, cp, compute e abc ( P, P. Z Z a,, b, c Z. Revews and attacks on three e-cash schemes In ths secton, we revew and show our attacks on Juang et al. s e-cash scheme [5] n Secton., Juang s D-cash scheme [6] n Secton., and hen et al. s depost delegaton scheme [7] n Secton., respectvely... Revew and attack on Juang et al. s scheme In 004, Juang et al. proposed an anonymous mult-authorty e-cash scheme [5] concernng only the wthdrawng phase and payng phase. They clamed that ther scheme s secure. However, we found that t does not satsfy the unforgeable property. ecause that an adversary can fake a vald e-con for shoppng over the nternet. In the followng, we wll demonstrate ths by frst revew ther scheme n part (A, then show the weakness n part (. (A Revew of Juang et al. s scheme In the followng, we frst lst the defntons of used notatons then show the four phases n ther scheme. (a Defntons of used notatons 4

5 : a lc one-way permutaton functon H:: a lc one-way hash functon n : the number of money ssuers before the preparaton phase QUAL: the set of non-dsualfed money ssuers after the preparaton phase n : the number of non-dsualfed money ssuers n QUAL I, n : the dentty of money ssuer before the preparaton phase I, n : the dentty of non-dsualfed money ssuer after the preparaton phase d c : the secret key chosen by customer d I : the secret key chosen by I e : customer s correspondng lc key c e : I s correspondng lc key I p, : two large strong prme numbers satsfyng dvdes ( p : a generators of Z P : a random value generated by a generc dstrbuted con flppng protocol, also a generators of Z P (b The four phases Juang et al. s scheme conssts of four phases: (ntalzaton phase, (preparaton phase, (wthdrawal phase, and (4payng phase. We descrbe them as follows. ( Intalzaton phase The bank lshes all lc parameters n, t, p,, g, and h, all dentfcatons of e-cons ssuers I, n lc one-way hash functon H. ( Preparaton phase (as shown n Fg.. All I, n, the lc one-way permutaton, and the, must cooperate to dstrbute ther secret shadows to each other. They carry out the followng steps: Step: I chooses a secret key z Z and two secret polynomals t f (x k t k 0 a, k x, f ( x k k 0 a, k x such that a, 0 z. He computes a and sends, k a, k G g h, 0 k t to I, n,., k p Step: Upon recevng G k, n, 0 k t, from all other ssuers,, I secretly sends f ( x and f ( x to every other I, where Step: When I receves all,, x s a unue lc number for I., he verfes f the shares, and,,, and n, from other ssuers,,, receved from I s consstent wth the certfed values G,, 0 l t, by checkng whether or not,, l x 0, l t g h p l ( G He lshes,,, l. If t fals, I broadcasts that an error has occurred. and the authentcaton nformaton for I. Each 5

6 ssuer, except for the dshonest ssuer I, then marks I as a dsualfed ssuer and excludes I from the set of non-dsualfed ssuers QUAL. Step4: Every ssuer I, QUAL, broadcasts A a l, l p g,, 0 l t. Step5: When I, QUAL, receves all A, l, n,, from other ssuers n QUAL, he verfes whether g, l t x p l 0 ( A, l. If ths check fals for an ndex, I broadcasts that an error has been found. He lshes,,, and the authentcaton nformaton for,,., I and any t ssuers n QUAL can cooperate to compute z, (x, and A,, 0 k t. Anyone then can compute the lc shadows k l, l 0,, t x p g p ( A l and the group lc key y p QUAL y p QUAL A, 0, where, QUAL. The group lc key y, all lc z shadows,, and the personal lc key y p A, 0 p g, where and f Step : I choose a sec ret key z t k t two polynomals f ( x a, k x, f ( x a, k k 0 k 0 a,0 z, 0 k t a, k a compute G, k p g h Step :, f ( x, f ( x, k G, k G, k,,, I Step : choose a sec ret key z t k two polynomals f ( x a, k x, k 0 t k f ( x a, k x k 0 a,0 z, 0 k t a, k a compute G, k p g h Step :, k Step :, f ( x,,,, f ( x g, h,? l t x ( G, l l 0 Step : If fal, lshes,,,, I and,,? l t x g h ( G, l marks I as a dsualfed ssuer. l 0 Step 4: a, l A, l p g,0 l t A, l If fal, lshes,,,, I and Step 5: marks I as a dsualfed ssuer. Step 4: a, l A, l, n, A, l p g,0 l t QUAL, can then be lshed by each ssuer I. They assume that the n non-dsualfed ssuers n QUAL are I, n. Fg.. The preparaton phase of mult-authorty e-cash scheme. ( Wthdrawal phase (as shown n Fg.. In ths phase, customer IDc employs a threshold blnd sgnature scheme to get a blnd e-con from t honest ssuers. Wthout loss of generalty, they assume 6

7 that the t out of n ssuers reuested by and I, Step: Each IDc are I, t. ustomer IDc t, then together perform the followng protocol. I randomly chooses a number Z k k, computes rˆ p g, and sends rˆ to the customer. Step: After recevng all rˆ, the customer does the followng: omputes the value m H ID RD H x (, where H 0(, H ( H ( H (, x, RD s the redundancy nformaton for verfcaton, and are two random numbers, and H ID ( ( ID c s an unue header. hooses two random numbers, Z and computes r p g rˆ, t r p m k rk, and mˆ r. hecks to see f m ˆ 0. If so, he sends the strng mˆ to all I, t ; otherwse, goes back to step. Step: Upon recevng message mˆ, I, ( t, checks to see f the customer has enough money n the bank. If so, he nforms the bank to deduct x dollars from the customer s account, computes ŝ n t m(ˆ z l t ( fl ( x ( k, k ( x k ( x x k k, and sends ŝ back to the customer. Else, I reects the money wthdrawng of the customer. ustomer Step :, are random numbers, Z H m H r ID ( ID g mˆ r p Step 4: s g s ID c RD H ( s s rˆ, r sˆ r t p p n x m l t t r k k y r? ( ( l, t x k ( ( ( r k, k x x k rˆ mˆ 7 ŝ Step 5: Step : randomly hecks f the customer has enough money n the bank. Deducts x dollars from the customer s account. n t mˆ( z ( f l ( x ( ( l t k, k sˆ I chooses computes rˆ g Step : p t k k Z After t ssuers nform the bank to deduct x dollars from the customer s account, the bank performs the deducton operaton. x k k x x k

8 Fg.. The wthdrawal phase of mult-authorty e-cash scheme. Step4: After recevng all ŝ, ( t, the customer computes s ˆ s, s r and checks to see f g y r t x k n ( ( ( r k, k x x k p ( l t ( l,, ( t, holds. If t doesn t hold, s not vald. The customer then has to ask ŝ the correspondng ssuer to send t agan. Otherwse, he computes t s s. Step5: After exactly t ssuers nform the bank to deduct x dollars from the customer s account, the bank performs the deducton operaton. (4 Payng phase (as shown n Fg.. Assume that a customer has accumulatvely spent l dollars l n some shops for an e-con ( r,s,, H (, where l denotes the amount of l l x l l dollars that are spent at the l th transacton and l < l x. In ths phase, f the customer wants to pay the shop dollars, then the customer and the shop should cooperate to do the followng steps: ustomer ank Step : Step : r, s,,, H l l r, s,,, H l l heck f the prevous e-con s stored n the x l l x l l ( ( Shop Step : computes g H (? H x s r y r? m ( l l ( H x l l ( l l database. If yes or 0, the e-con s not double-spent. The shop accepts ths e-con and deposts t to the bank. Fg.. The payng phase of mult-authorty e-cash scheme. Step: If l l x, then the customer sends the e-con ( r,s,, l l, H x l l ( representng dollars to the shop. Otherwse, he stops. Step: After recevng the e-con, the shop verfes whether the e-con s vald by computng g s r y r m p 8 and checks to see f both H x( H ( l l ( H x l l ( and RD contans some redundancy nformaton hold. If both hold, the shop calls the bank to check f the e-con s double-spent by sendng hm the e-con

9 ( r, s,, l l, H x ( l l. Step: The bank checks to see f the prevous spent e-con ( r,s,, H ( was stored n the database. If so or 0, l l x l l l l the bank confrms that the e-con s not double-spent. Then the shop accepts the e-con and deposts dollars nto the bank. The bank ncreases the shop s account by dollars and stores the e-con ( r, s,, H x l l ( l l checkng. n hs database for subseuent double-spent ( Attack on Juang et al. s scheme It s obvous that Juang et al. s e-cash scheme suffers from man-n-the-mddle attack n the payng phase. For example, f the customer has one hundred dollars and wants to spend 0 dollars for a commodty, he sends r, s, 0, 0, H 60 ( to the shop, the adversary can smply ntercept and change ths e-con to r, s, 0, 0, H 70 (. He then can send ths faked e-con to the shop or another for purchasng hs wanted commodty whch costs 0 dollars. The shop wll verfy t as legal unconscously... Revew and attack on Juang s D-cash scheme In 007, Juang proposed a flexble pre-pad e-cash scheme for date-attachment [6]. Hs scheme manly concerns wth wthdrawng phase and date-attachng phase. He clamed that hs scheme s secure. However, we found that the scheme does not satsfy the unforgeable property snce an adversary can fake a sgnature for the customer durng the wthdrawal phase. In the followng, we wll do: (A brefly revew hs scheme, and ( show our attack. (A Revew of Juang s D-cash scheme Juang s scheme conssts of four phases: ( ntalzng phase, ( wthdrawng phase, ( date-attachng phase, and (4 depostng phase. In the followng, we wll do: (a show the defntons of used notatons, and (b descrbe the four phases. (a Defntons of used notatons h, h : two secure one-way hash functons p, : two large strong prme numbers satsfyng dvdes ( p : a generator of Z p c, c : the wthdrawng date and the effectve date, respectvely g : a generator of a subgroup of wth order Z p ( x, y, c : a lc polynomal defned as h c x h ( c y mod (b The four phases ( 9

10 ( Intalzng phase The bank generates hs prvate keys to be hs correspondng lc keys. z z Z z z, and sets y p g, y p g ( Wthdrawng phase (as shown n Fg. 4. When a customer wthdraws an e-con from a bank, he and the bank together perform the followng steps. Here, the bank s lc key s h ( c z h ( c z ( h ( c ( h ( c y c g g y y ( ( z, z, c p p p whch contans the wthdrawng date c, and t s correspondng prvate key s ( z, z, c h ( c z h ( c. ( z y ustomer Step :,, z Z g r Mg z mˆ r rˆ M ( m y Step 4: s s ˆ e-con s r, s, c ( rˆ mˆ ŝ c rˆ g ank Step : y g p k Z k Step : ( z, z, c s mˆ ( z, z, c k ˆ Fg. 4. The wthdrawng phase of D-ash. Step: The bank randomly chooses a number k Z, computes and sends k r ˆ g to the customer. Step: After recevng rˆ, the customer does the followng. Randomly chooses a prvate key z Z as hs pseudonym and z sets y to be the correspondng lc key for the p g pseudonym. He then computes 0 M m y, where m s the blnd ( message contanng a predefned message pattern for the e-con. hooses two random numbers, Z and computes r Mg r p ˆ, mˆ r. hecks to see f m ˆ 0. If so, sends mˆ to the bank; otherwse, goes back to. Step: Upon recevng mˆ, the bank computes and sends sˆ mˆ ( z, z, c k back to the customer. It then deducts w dolars from the customer s bank account.

11 Step4: After recevng ŝ, the customer computes s e-con r, s, c. ( ˆ s and obtans the ( Date-attachng phase (as shown n Fg. 5. When the customer wants to spend the e-con n a merchant, he and the merchant together perform the followng steps. Step: The customer sgns the effectve date c on the e-con ( r, s, c by computng r ( g k mod p and s k ( h ( r s c c z r, where k Z s randomly chosen by the customer. He then sends the result r, s, r, s, c, c to the merchant. ( Step: After recevng r, s, r, s, c, c, the merchant wll verfy the valdty of ( ths e-con by computng M s r g y r m y, and checkng f m p c ( contans the predefned message pattern. If so, he computes u h ( r s c c s mod, u r s mod and checks to see whether both g u y u mod r and c c hold. If both hold, the merchant calls the bank to check the freshness of the e-con. If t s fresh, the merchant wll pay the customer the nterest generated durng the wthdrawal date c and the effectve date c. ustomer Step : k Z r g k s k [ h ( r s c c z r ] ( r, s, r, s, c, c Merchant Step : M g u u g h ( r s c u y u s c? c y r s r c r? r c s Fg. 5. The date-attachng phase of D-ash. (4 Depostng phase After the effectve date c of the e-con, the merchant can depost t to hs bank account. The bank wl add w dolars to the merchant s account,pay the merchant nterest generated durng the wthdrawal date c of ths e-con, and store ths transacton n hs database. and the depost date

12 ( Attack on Juang s D-cash scheme Although Juang clamed that hs scheme s secure, we found that t has a serous weakness. We descrbe t as follows. In the wthdrawng phase, when the bank sends rˆto the customer, an adversary can ntercept rˆ, compute ~ k ~ k k rˆ rg ˆ ( g, where k ~ s a randomly chosen number by the adversary. The adversary then sends r ˆ to the customer. Upon recevng r ˆ, the customer computes ~ r Mg rˆ, m ˆ r ~ and sends m ˆ back to the bank. Upon recevng m ˆ, the bank computes and sends s ˆ mˆ ( z, z, c k to the ~ customer. The adversary can ntercept s ˆ, replace t wth s ˆ sˆ k, and send t to the customer. Upon recevng s ˆ, the customer computes ~ s ŝ. Then the faked e-con for the message m s ( ~ r, ~ s, c. When the customer pay the faked e-con ( ~ r, ~ s, r, s, c, c to the merchant n the date-attachng phase, where k r g, s k h ( ~ r ~ s c c z r ], and k Z s the random number [ chosen by the customer, the merchant frst computes g ~ s r y ~ c r~ ( s ˆ ( z, z, c ~ r ~ = g g r = g = g = g = g = g ~ [( sˆ k ] g ( z, z, c ~ r ~ {[ mˆ ( z, z, c k k ] } g ~ {[ ~ r ( z, z, c k k ] } ( k k ~ ( k k ~ Mg Mg ˆ r ~ ( k k g r~ ( z, z, c ~ r g r~ ( z, z, c ~ r = M, where M ( m y, to obtan y. He then computes u h ~ r ~ s c s mod, ( c u r s mod r~ to verfy the valdty of the e-con by checkng whether or not u g y u = r holds. The merchant performs the verfcaton process as follows: g u y u h ( ~ r ~ s c c s = g = g = g g s [ h ( ~ ~ r s c c z r ] ( s s k = g k zr s = r Hence, the faked e-con ~ r, ~ s, c ( can be verfed successfully by the merchant n the date-attachng phase. esdes, Juang clamed that hs scheme also satsfes the anonymous property. However, we found that n the wthdrawng phase, although the values of r and s n the e-con r, s, c ( are only known to the customer, the bank can know the e-con owner s dentty by the wthdrawng date c wth non-neglgble probablty snce the bank needs to deduct w dollars from the customer s bank account

13 n step of the wthdrawng phase (as shown n Fg Revew and attack on hen et al. s RSA based depost delegaton scheme hen et al. proposed a RSA based depost delegaton scheme n [7]. They clamed that ther scheme s secure. However, we found that t has a securty weakness. In the followng, we wll frst descrbe ther RSA based depost delegaton scheme (as shown n Fg. 6. n part (A, then show the weakness found n part (. (A Revew of hen et al. s scheme (as shown n Fg.6 hen et al. s scheme contans fve steps. In the followng, we wll do: (a lst the defntons of used notatons, and (b show the four steps. (a Defntons of used notatons ( px, x : a par of large prme numbers N x : a large number, where N x p x x ( N x : ( p x ( R, R Sg Acurer : two cphertexts x : the acurer s sgnature (b The four steps Step: Intally, each bank X chooses a par of prme numbers p, ( x x computes the product as N x. He then generates the lc key P x and the correspondng secret key Sx as the RSA encrypton/decrypton key such that P S (mod ( N. efore the merchant delegates ts x x x receved electronc cash to the acurer, the merchant randomly selects a blndng factor and computes the followng parameters: Mcash cash ID, ( Merchant P Acurer R ( Mcash mod N Acurer, P Issuer R ( IDAcurer Mcash mod ( R, R N. The merchant then sends Issuer to the acurer. Step: After recevng the above message, the acurer computes R S Acurer ( mod N Mcash mod N, Sg Acurer Acurer S Acurer ( Mcash mod N. He then sends hs sgnature Acurer Sg Acurer non-repudaton proof and forwards R depost money to hs account. Step: The ssuer uses ts secret key Acurer and back to the merchant as the to the ssuer for the ssuer to S Issuer to decrypt R, obtanng, SIssuer ID Acurer, cash, and ID Merchant. He then computes ( R mod N Issuer Mcash and Mcash cash ID. The ssuer ID Acurer ( Merchant

14 then verfes the cash to see f t s vald. If t s, he records these parameters cash, ID Acurer, and IDMerchant for the necessty of double depost checkng. Step4: Fnally, the ssuer transfers the correspondng funds to the desgnated Merchant ank (Acurer Step : Mcash ( cash ID R R ( Mcash ( ID Acurer P Acurer Merchant mod N Mcash Acurer P Issuer ( R, R mod N Issuer ank (Issuer Step : ( R Sg S Acurer Acurer mod N ( Mcash Acurer S Acurer Mcash mod N mod N Acurer Acurer P Sg Acurer acurer Mcash? ( Sg Acurer mod N Acurer Step : ( R ID R S Issuer Acurer (mod N Issuer Mcash Mcash ( cash ID Merchant verfes the cash s true or not Records cash, ID acurer,and IDMerchant Step 4: Transfers the funds nto the ( ID Acurer, IDMerchant acurer IDAcurer for IDAcurer to transfer t to ID Merchant s account. Fg. 6. hen et al. s RSA based depost delegaton scheme. ( Attack on hen et al. s scheme We found that, n hen et al. s scheme, f an adversary ntercepts cash from the wthdrawal or the payment phase, he can masuerade as a merchant, Merchant, to make the system confused. We llustrate our attack as follows (also shown n Fg.7: Step : Assume that an adversary ntercepts cash from the wthdrawal or the payment phase. He can compute Mcas h ( cash ID Merchan t, P Acurer ( Mcash mod N R Acurer, and P Issuer R ( IDAcurer Mcash mod N Issuer, where s a randomly blndng factor chosen by Merchant. He then sends ( R, R to the 4

15 acurer. Step : After recevng ( R, R, the acurer computes S Acurer ( R mod N Acurer Mcash mod N Acurer and S Acurer Sg ( Mcash mod N. Acurer Acurer He then sends the sgnature Sg Acurer back to the merchant as the non-repudaton proof and sends R to the ssuer for depostng money to hs account. Step : After recevng, R the ssuer can obtan cash, ID Merchan t, and IDAcurer computng SIssuer ( (mod N ID Mcash and R Mcash Issuer Acurer ( cash ID Merchan t. Step4: Fnally, the ssuer transfers the correspondng funds to the desgnated acurer IDAcurer for IDAcurer to transfer t to the adversary IDMerchant s account. by Merchant ank (Acurer Step : Mcash ( cash ID ( Mcash R ( ID R Acurer P Acurer Merchant mod N Mcash Acurer P Issuer, ( R R mod N Issuer ank (Issuer Step : ( R Sg S Acurer Acurer Sg Acurer mod N ( Mcash Acurer S Acurer Mcash mod N mod N Acurer R Acurer P acurer Mcash? ( Sg Acurer mod N Acurer Step : ( R ID S Issuer Acurer (mod N Issuer Mcash Mcash ( cash ID verfes the cash s true or not Records cash, ID acurer,and IDMerchan t Step 4: Transfers the funds nto the ( IDAcurer, ID Merchan t Merchant Fg. 7. The attack on hen et al. s RSA based depost delegaton scheme. It s obvous that the ssuer can verfy the cash successfully as ndcated n step of Fg.7. The ssuer then transfers the money from the customer account to the bank account of Merchant n the acurer. ut when the true merchant, the real cash 5

16 owner, wants to send the cash to the acurer, the ssuer wll fnd that the cash s double-spendng. However, t s dffcult for the ssuer to fnd out whch merchant should be the real owner of the cash. ecause Merchant can also provde the Sg Acurer to prove that he s the legal owner of the cash. So, an adversary can easly make the system confused by masueradng as any other merchant. 4. Our proposed scheme Due to that most of the proposed e-cash protocols are ether nsecure or ncomplete, n ths secton, we present a novel secure and complete e-cash scheme. Our protocol conssts of sx phases. They are: (setup phase, (regster phase, (wthdrawal phase, (4payment phase, (5depost phase, and (6tracng phase. 4. Setup phase Let G be a cyclc addtve group, generated by the generator P, whose order s a prme, G be a cyclc multplcatve group of the same order. A blnear parng s a map e : G G G. We defne three hash functons, H, H, and H, to be n H :{0, } G, H : G {0, }, and H : Z G Z respectvely. The lc key generator ( PG chooses a random number s and sets P sp. PG keeps s as hs prvate key and lshes the system parameters set { H G, G, e,, P, P, H, H, }. ustomer submts hs dentty ID to PG over a secure channel. PG computes s lc key as Q H ( ID and the matchng prvate key as S Q s. Smlarly, PG also generates the lc/prvate key pars Q, S, ( Q, S, and Q, S respectvely. ( M M Z ( T T for the Trusted Thrd Party (TTP, bank, and merchant 4. Regster phase After the customer obtans a key par Q, S ( 6 from PG, he has to regster to TTP to obtan a certfcate u. Our scheme permts a customer to regster over the nternet wthout the necessty of face-to-face or through secure channel regstraton. Ths can greatly reduce our system s cost ether n traffc overhead or n settng the secure channel. We descrbe the detals as follows and also llustrate t n Fg.8. Step: The customer chooses a random number a Z and computes the sesson key shared wth TTP as H ( e ( S, aq. He then sends T T E T ( AuthT, aq to TTP, where AuthT { ID, IDT, Ts, a}, Ts s a tmestamp, and E T Auth s the encrypton of AuthT by sesson key T. ( T Step: On recevng the messages from, TTP wll run the followng steps:

17 ( computes H ( e ( S, aq and decrypts Auth to obtan T T E T ( T AuthT { ID, IDT, Ts, a}. ( checks to see f T Ts s less than T (Assume that TTP s current system tmestamp s T, where T s the tolerant tme for transmsson delay. If t sn t, the reuest s reected. ( uses a and ID n AuthT to compute ah( ID and checks to see f ths computed value s eual to the receved aq. If t sn t, the reuest s reected. (4 chooses three random numbers x and computes, y, v Z u E ( ID x, where H ( S s only known by TTP. T T T ( v u, W (5 computes W yp, z H, V yp zs T, and sends E T ( v, u, W, V to. (6 stores the entry ( u, x n the database. Step: After recevng the message from TTP, verfes f V, P W, P H ( v reects the message. Step : a Z Auth T T H Step : ustomer { ID ( e ( S V, P? e ( W, P, ID u, W Q, P T T, T, aq T s, a} H ( v E T ( Auth, aq E T u, W QT, P The certfcate of the customer s u s eual to. If t s, the certfcate of s u. Otherwse, T ( v, u, W, V T TTP Fg. 8. The regster phase of our proposed scheme. Step : D aq T T T T u E H ( E s T W yp V yp T T x, y, v Z z H ( v T ( ID ( e ( S zs T T ( Auth H ( S u, W T x, aq? ah ( ID Stores (u, x n the database 4. Wthdrawal phase In ths phase, customer employs a blnd sgnature technue to wthdraw an e-con from bank. We descrbe the detals as follows and also llustrate t n Fg.9. 7

18 Step : b Z Auth D H Step : { ID ( E U vu ustomer ( e ( S R v R, ID U, P? e ( H, T, bq s econ ( U, R, c, u ( R, U s ( c Q, b, v H ( c, v, R uq E ( Auth, bq, P The blnd sgnature of the con c E u, W, V} ( R, U ank Step : D bq T T r Z ( E s W, P H V, P? R rp T? bh ( ID ( e ( S ( Auth H ( v, bq U ( rv H ( c v u, W Q, P u S T Fg. 9. The wthdrawal phase of our proposed scheme. Step: ustomer chooses a random number b Z and computes the sesson key H ( e ( S, bq. Let Auth { ID, ID, T, b, v H ( c, v u, W, V}. The customer sends E ( Auth, bq to bank, where Ts s a tmestamp, c s a seral number of a con, and Auth s encrypted by. Step: After recevng the messages from, wll run the followng: ( computes H ( e ( S, bq and decrypts Auth to obtan Auth { ID, ID, T, b, v H ( c, v u, W, V}. s E ( ( generates a tmestamp T and checks to see f T Ts T,where T reuest s reected. s less than s the tolerant tme for transmsson delay. If t sn t, the ( takes b and ID from Auth and computes bh( ID to check f t s eual to bq. If t sn t, he reects the reuest. (4 verfes f V, P s eual to W, P H ( v u, W Q, P. If t s, the data ( v u, W, V n Auth reuest. (5 chooses a random numbers ( rv H ( c uv. S T s actually from TTP. Else, he reects the R rp, U r Z and computes 8

19 (6 sends ( R, U to and deducts money, whose amount s negotated n E advance, from s account. Step: After recevng the message from, decrypts ( R, U to get R, U E and computes R v R, U vu. He then verfes f U, P s eual to e ( H( c Q, R uq, P. If so, the blnd sgnature of the con c s econ ( U, R, c, u. Otherwse, reects the message. 4.4 Payment phase In ths phase, we assume that there s a customer who wants to use hs econ for shoppng n merchant M. We descrbe the payment phase of our protocol as follows and also llustrate t as Fg.0. Step: frstly chooses a random number k Z and computes the sesson key M H ( kqm, P. He encrypts ( econ, Ts wth M and computes kp. Then sends E M ( econ, Ts, kp to merchant M, where Ts s s current tmestamp. Step: After recevng the message from, M computes H ( kq, P to M decrypt E M econ, T, obtanng econ, T. M checks to see f both ( s ( s T T s s less than T and U, P s eual to e H ( c Q, R uq, P, where T s M s system tmestamp and T M ( s the tolerant tme for transmsson delay. If both hold, M accepts the econ and sends goods to. Otherwse, M reects t. ustomer Step : k Z M H ( kq M, P E M ( econ, Ts, kp Merchant Step : H ( S, kp D M M T T ( E s M T U, P? e ( H M ( econ, T s ( c Q, R uq, P Fg. 0. The payment phase of our proposed scheme. 4.5 Depost phase In ths phase, assume that merchant M wants to depost an econ to bank. wll add the econ to the merchant s account. We descrbe the detals as follows and also llustrate t n Fg.. Step: Merchant M frstly chooses a random number 9 t Z and computes the

20 sesson key H ( tq, P. He encrypts econ, ID M, T M ( s wth M, computes tp, and then sends E M ( econ, IDM, Ts, tp to bank, where s M s system tmestamp. Ts Step: After recevng the message from M, computes M H ( S, tp to decrypt E M econ, ID, T, obtanng econ, ID M, T. checks to see f ( M s ( s T T s s less than T, where T s s current system tmestamp and s the tolerant tme for transmsson delay. If t sn t, the reuest s reected. Else, then verfes f U, P s eual to e H ( c Q, R uq, P. If t s, ( checks the econ to see f t s double-spendng. If so, reuests TTP to reveal the dentty of the dshonest customer. Else, he accepts the econ and adds t to M s bank account. T Merchant Step : t Z M H ( tq, P E M ( econ, IDM, Ts, tp ank Step : D M M T T H ( E s M T ( S, tp ( econ, ID U, P? e ( H ( c Q, R uq, P verfy f econ s double spendng from database M, T s Fg.. The depost phase of our proposed scheme. 4.6 Tracng phase In our scheme, f a customer ID uses the same econ twce, the bank can fnd out the llegal transacton by checkng the pad cons stored n the database. The bank then calls TTP for revealng the dentty of the dshonest customer usng the followng euatons: H ( S T ID T D ( u x T 5. Securty analyss: In ths secton, we wll show that our scheme s secure by examnng the followng reured propertes and demonstrate that our scheme satsfes the fve securty propertes (stated n Secton. as the followng. 5.. Mutual authentcaton We adopt the concept of an ID-parng-based cryptosystem n our scheme for the 0

21 advantage that t can establsh a sesson key between two communcatng partes wthout sharng any secret n advance. It not only can reduce the number of communcatonal passes but also can acheve mplct mutual authentcaton, f the two communcatng partes can use the establshed sesson key successfully. For example, n the wthdrawal phase, the customer and the bank each use hs own prvate key and the opposte s lc key to compute the sesson keys, H ( S, bq and H ( S, bq, respectvely. They can ( communcate secretly by usng ths sesson key wthout dong any key exchange n advance. If an adversary wants to masuerade as the customer to send an encrypted message to the bank, the bank wll reect t snce he can t decrypt the cphertext to obtan any meanngful nformaton. Up to date, only our scheme provdes a secure mutual authentcaton functon n the wthdrawal phase. The other proposed protocols [5-0] don t have ths functon. 5.. Verfablty We demonstrate the verfcaton processes of our scheme by usng the followng two euatons, ( and (. V, P e ( yp zs, P e ( yp, P zs, P T T e ( yp, P zqt, P W, P H ( v u, W Q, P......( and U, P e ( vu, P e ( v( rv H ( c uv e ( rv H( c u S e ( rv H ( c S e ( rv H( c Q e ( H ( c Q T S, P, P us, P, rv P uq uq, P, P, P, P H( c Q, R uq, P..( Euaton ( s used for two knds of verfcatons: the customer verfes whether the other party s the real TTP and whether the transmtted data ( v u, W, V from TTP s calculated n a specfed way snce z H ( v u, W (as shown n Fg. 8, and the bank verfes whether or not the other party s the real customer as clamed snce he needs to compute to obtan Auth (as shown n Fg. 9 and whether or not the data ( v u, W, V n Auth from the customer s actually from TTP. Ths s mpled by H ( v u, W Q T n the euaton.

22 Euaton ( s used for verfyng whether or not the econ ( U, R, c, u s vald and from the clamed bank as mpled n the euaton. (as shown n Fg. 9, 0 and. 5.. Anonymty Ths s a very mportant securty property especally for keepng the prvacy of a customer s dentty n an electronc cash system. To attan ths purpose n our scheme, we adopt the blnd sgnature technue. In the followng, we descrbe why our scheme possesses ths anonymous property by usng two reasons. Reason : In the wthdrawal phase, when customer wants to wthdraw an econ, he must provde both hs dentty ID and hs randomzed certfcate v u to the bank to deduct money from hs account. Although the bank knows the dentty of the customer, he can t get the customer s certfcate snce t has been randomzed by the customer blnds R,U by computng unable to know the dentty of the econ ( U, R, c, u when the bank receves the econ ( U, R, c, u v. esdes, R v R, U vu. Ths makes the bank owner. So, n the depost phase, from a merchant (as shown n Fg., wthout the knowledge of v, he doesn t know the dentty of the econ owner by comparng u wth the stored v u whch corresponds to ts owner ID n Auth (as shown n Fg. 9. Smlarly, the seral number c of the econ s embedded n value v H ( c n whch c s frst protected by a hash functon H, then randomzed by a random number v. It also corresponds to the dentty ID of ts owner. Therefore, n the depost phase, even f the bank, recevng the econ ( U, R, c, u from the merchant, can compute H (, he stll doesn t know the dentty of the econ owner by comparng H ( wth the stored v H c. c c Furthermore, our scheme can prevent the bank from knowng the dentty of the econ owner by some mathematc operatons. For example, f U, R = e ( U, R, the bank can fnd the econ owner by ths euaton. Although n our scheme, after recevng the econ ( U, R, c, u from the merchant, the bank can know e ( U, R = (, v 4 v e vu R = U, R. However, wthout the knowledge of v, he can t get the customer s dentty by usng the pont Reason : 4 v n G. U, R In the payment phase, when the merchant receves the econ ( U, R, c, u ( from a customer, he can t know the dentty of the econ owner by the certfcate u snce u E T ( ID x. That s to say, certfcate u s the result of the customer s dentty xor-ed by a random x and then encrypted by T whch s only known by TTP and PG. Hence, anyone who gets the certfcate u can t obtan any useful nformaton about the dentty of the customer.

23 5.4. Unforgeablty In our scheme, an adversary may try to fake an econ under the followng two possble cases. In each case, we show why our scheme possesses ths unforgeable property. ase. In the payment phase, the merchant can get the customer s certfcate u sent n E M ( econ, Ts as shown n Fg. 0. If the merchant gves u to an adversary, we must show whether or not the adversary can successfully embed the certfcate u n Auth A (see Fg. 9 to masuerade as ID for wthdrawng an econ and pass the bank s verfcaton. In the followng, we show why ths attack fals. Step: The adversary may get a certfcate u of customer from a compromsed merchant n whch had ever consumed. Step: The adversary randomly pcks W, P e ( W H ( v u, W Q v, W G, P Z T H ( v u, W Q T, P e ( s( W H ( v u, W QT, P e ( V, P. and computes If the adversary can fnd V = s( W H ( v u, W Q T to pass the bank s verfcaton (as shown n Fg. 9 and ndcated n euaton (, the attack succeeds. However, wthout the knowledge of s, the adversary s doomed to fal snce t s an EDLP problem. ase. Smlarly, n the payment phase, the merchant can get the certfcate u of the customer and the seral number c as well. If the merchant gves them to an adversary, we must know f the adversary can use them to fake an econ satsfyng the verfcaton of euaton ( (also shown n Fg. 9 wthout communcatng wth the bank. If so, the adversary can use the faked econ for shoppng and pass the verfcatons of: ( merchant verfes the econ from customer, and ( bank verfes the econ from the merchant as shown n Fg.0 and respectvely. We descrbe ths attack usng the followng steps and show why t can not succeed. Step: The adversary gets a certfcate u and the seral number c of an econ from a compromsed merchant n whch a legal customer consumes. Step: The adversary randomly chooses Step: He computes H ( c Q, R uq, P e ( H ( c Q, np suq, P n Z and lets R np.

24 e ( nh( c Q usq, P e ( U, P The adversary must let U ( nh ( c us Q to pass the verfcatons as shown n Fg.9, 0, and respectvely and ndcated n euaton (. However, wthout the knowledge of PG s secret key s, he s doomed to fal snce t s an EDLP problem. Not to menton, the adversary doesn t have the sesson keys, M, and M n the three scenaros Traceablty If any customer uses the same con ( U, R, c, u twce, then wth the help of TTP, the bank can fnd out ths llegal transacton by checkng the double-spent econ stored n the database because TTP can easly reveal the dentty of the customer by usng the followng euatons. H ( S T ID Snce T D ( u x ST T s TTP s prvate key and u s a fxed value correspondng to each customer s dentty, they can be pre-computed. Therefore, our scheme only needs one xor operaton to reveal the dentty of the llegal customer. Hence, the double spendng tracng s very effcent n our scheme. 6. omparsons In ths secton, we compare our protocol wth prevously proposed schemes [5-0] by usng the above-mentoned securty propertes. After comparng wth those schemes, we can see that our scheme not only can provde mutual authentcaton, econ verfcaton, and customer s dentty protecton but also can resst aganst double spendng and econ forgng. We summarze the comparsons of each property n Table and lst the reasons for why the correspondng scheme n the table can t attan some securty features n Appendx A. Table. The securty comparsons between our proposed scheme and other schemes Juang et al. s [5] Juang s [6] hen s [7] H.Wang et al. s [8] Popescu et al. s [9] S.Wang et al. s [0] 0 On Off - Off Off Off Off No No - No No Yes Yes Yes No - No No Yes Yes Yes Yes - Yes Yes Yes Yes 4 Yes Yes Yes Yes - Yes Yes 5 Yes No - No Yes Yes Yes 6 No No No No Yes No Yes 7 - No No Yes Yes Yes Yes Ours 4

25 0 : On represents On-lne type; Off represents Off-lne type : Mutual authentcaton n wthdrawal phase (checkng the dentty to each other before communcaton : The customer verfes the econ receved from the bank : The merchant verfes the econ receved from the customer 4 : The bank verfes the econ receved from the merchant 5 : Anonymty (protectng the dentty of the customer 6 : Unforgeablty (preventng from forgng a vald econ 7 : Traceablty (revealng the dentty of a party who uses econ twce n off-lne type - : For an ncomplete protocol, t lacks the consderaton n the correspondng feature From Table, we can see that our protocol not only s the most secure among all of the proposed protocols but also possesses complete functons whch a secure electronc cash reures. 7. oncluson In ths paper, we have revewed and shown the attacks on schemes [5, 6, 7]. We also propose a secure ID-based e-cash scheme from parngs. After analyss, we conclude that our scheme can satsfy the propertes of mutual authentcaton, anonymty, unforgeablty, traceablty, and double-spendng protecton. After comparsons, we can see that our scheme s not only more secure but also more complete than all of the proposed schemes for electronc cash systems nowadays. Appendx A ( Why are they not mutual authentcaton n wthdrawal phase n [5, 6, 8, 9]? From schemes [5, 6, 8, 9], we can see that they don t authentcate each other n the wthdrawal phase. That s to say, the bank may gve a vald econ to an llegal customer. Therefore, ther schemes are not secure. ( Why are they not The customer verfes the econ receved from the bank n [6, 8, 9]? From schemes [6, 8, 9], we can see that the customer doesn t verfy the valdty of the econ receved from the bank n the wthdrawal phase. Hence, the customer may therefore obtan a forged econ from an adversary. ( Why are they not anonymty n [6, 8]? In [6], we have demonstrated ths n Secton.. As for [8], n the wthdrawal phase, the customer wthdraws an econ from the bank wthout employng a blnd sgnature technology. Hence, after the depost 5

26 phase, the bank can reveal the dentty of the econ owner by searchng for the prevously spent econs recorded n hs database. (4 Why are they not unforgeablty n [5, 6, 7, 8, 0]? x In [5, 6, 7], we have demonstrated ths n Secton.,., and. respectvely. As [8], n the wthdrawal phase, a user chooses a, c, k, g a, y g then sends all k /, a ( I c 6 u and computes H ( x, y, where I g s the user s account. He to the bank. Fnally, the bank computes and sends econ to the user. In payment phase, when the user sends an econ to the shop, an adversary can ntercept t and respond wth a bnary strng z, z,..., z } { 0,,..., 0} to { k / the user. After recevng the bnary strng, the user responds as follows, for all k / : If z, he sends ( a, y ; else, he sends ( x, a ( I c, c to the shop. At ths tme, the adversary smply ntercepts t to let the payment fal. He then stores these ntercepted data n hs storage. If the user fnds t fals and wants to shop usng the same later, he must send to a shop (ether the orgnal or another. Once seeng the same transmtted, the adversary ntercepts t and responds wth a complementary bnary strng z, z,..., z } {, 0,..., } to the { k / user agan. After recevng t, the user sends ( a, y or ( x, a ( I c, c, for all k / to the shop accordng to whether the bt s set or not. The adversary ntercepts and stores them n hs storage. Hence, the adversary can use the two sets of stored data to respond any shop s reuest to pass the shop s verfcaton k /. We demonstrate the detal as follows: Step : the adversary sends ntercepted to any shop for shoppng. Step : the shop chooses a random bnary strng z, z,..., z } { k / and sends to the user. Here, we suppose the bnary strng s { k / z, z,..., z } = {0,, 0,,..., 0, } Step : the adversary uses all stored data to respond the shop s random bnary strng. Accordng to the bnary strng { 0,, 0,,..., 0, }, the adversary sends {( x, a ( I c, c, ( a, y, ( x, a ( I c, c, ( a 4, y4.( a k /, yk / } to the shop. Step 4: After recevng the data from the adversary, the shop computes the followng for verfcaton. a ( I c a ak / H ( x, g H ( g, y... H ( g, yk / H x, y H ( x, y... H ( x k, y ( / k /... k / k /

27 Obvously, the adversary can pass the shop s verfcaton successfully. Even worse, the adversary can repeatedly use at any shop wthout beng found. Snce the embedded owner dentty n s I, not the adversary. In [0], n ther authentcaton protocol of wthdrawal protocol, an adversary can pretend to be any legal customer to ntalze a wthdrawal phase by choosng a random number x Z and sendng x P to the bank. Upon recevng x, P chooses and sends a random number Z to the adversary. Upon recevng, the adversary chooses a random number k Z and computes t k P, c H( P x P t, s k c x. He then sends ( c, s to. Upon recevng ( c, s, computes c H( P x P s P c x P and verfes to see f c c. Eventually, accordng to ther authentcaton protocol, the euaton s doomed to hold. The adversary therefore proves that x P belongs to hm successfully. Hence, the adversary can get a vald E-cash ( m, U, V, W, t, rb P from the bank. (5 Why are they not traceablty n [6, 7]? In [6], we have demonstrated ths n Secton.. As for [7], ther scheme ust mentons the cash verfcaton n the depost phase wthout gvng a detaled method. Hence, ther scheme can t prevent from double spendng. Thereby, t lacks the traceablty mechansm. References [] A. Shamr. Identty-based cryptosystems and sgnature schemes, RYPTO 84, volume 96 of LNS, Sprnger-Verlag, 984, pp [] D. oneh and M. Frankln. Identty-based encrypton from the Wel parng, RYPTO 0, volume 9 of LNS, Sprnger-Verlag, 00, pp. -9. [] D.haum, lnd sgnatures for untraceable payments, rypt 8, Plenum, NY, 98, pp [4] F. Zhang and. m. Effcent ID-based blnd sgnature and proxy sgnature from blnear parngs, AISP 00, volume 77 of LNS, pp. -, 00. [5] Wen-Shen Juang, Horng-Twu Law, A practcal anonymous mult-authorty e-cash scheme, Appled Mathematcs and omputaton, Vol. 47, No., 6 January 004, pp [6] Wen-Shen Juang, D-cash: A flexble pre-pad e-cash scheme for date-attachment, Electronc ommerce Research and Applcatons, Vol. 6, No., Sprng 007, pp [7] Yu Y hen, Jnn e Jan, hn-lng hen, A novel proxy depost protocol for e-cash systems, Appled Mathematcs and omputaton, Vol. 6, 005, pp [8] H. Wang, Y. Zhang, Untraceable off-lne electronc cash flow n e-commerce, omputer Scence onference, 00. AS 00. Proceedngs. 4th Australasan 9 Jan-4 Feb 00 pp. 7

28 9 98. [9]. Popescu, H. Oros, An Off-lne Electronc ash System ased on lnear Parngs, Systems, Sgnals and Image Processng, 007 and 6th EURASIP onference focused on Speech and Image Processng, Multmeda ommuncatons and Servces. 4th Internatonal Workshop on 7-0 June 007, pp [0] Shangpng Wang, Zhang hen, Xaofeng Wang, A new certfcateless electronc cash scheme wth multple banks based on group sgnatures, IEEE Internatonal Symposum on Electronc ommerce and Securty, 008. [] Yun Lng, Ymng Xang, Xun Wang, RSA-based Secure Electronc ash Payment system, IEEE Internatonal onference, -4 December 007, pp [] Mattheu Gaud, Jacues Traore, On the Anonymty of Far Offlne E-cash Systems, LNS 74, 00, pp [] Alfredo De Sants, Anna Lsa Ferrara, arbara Masucc, An attack on a payment scheme, Informaton Scences, Vol. 78, No. 5, March 008, pp [4] Hua Wang, Jnl ao, Yanchun Zhang, A flexble payment scheme ant ts role-based access control, IEEE Trans. nowl. Data Eng, 7 March 005, pp [5] Ln-huan Wu, Y-Shung Yeh, omment on traceablty on RSA-based partally sgnature wth low computaton, Appled Mathematcs and omputaton, Vol. 70, No., 5 November 005, pp [6] Hsang-An Wen, uo-hang Lee, Sheng-Yu Hwang, Tzonelh Hwang, On the traceablty on RSA-based partally sgnature wth low computaton, Appled Mathematcs and omputaton, Vol. 6, No., 4 March 005, pp [7] Mn-Shang Hwang, heng-h Lee, Yan-h La, Traceablty on RSA-based partally sgnature wth low computaton, Appled Mathematcs and omputaton, Vol. 45, No. -, 5 December 00, pp [8] Wedong Qu, onvertng normal DLP-based sgnatures nto blnd, Appled Mathematcs and omputaton, Vol. 70, No., November 005, pp [9] Xaofeng hen, Fangguo Zhang, Shengl Lu, ID-based restrctve partally blnd sgnatures and applcatons, Journal of Systems and Software, Vol. 80, No., February 007, pp [0] Xaomng Hu, Shangteng Huang, Analyss of ID-based restrctve partally blnd sgnatures and applcatons, Journal of Systems and Software, Vol. 8, No., November 008, pp [] A. Menezes, T. Okamoto, S. Vanston, Reducng ellptc curve logarthms to logarthms n a fnte feld, IEEE Transacton on Informaton Theory, Vol. 9, ssue 5, 99, pp [] hun-i Fan, Sh-Yuan Huang, Pe-Hsu Ho, hn-laung Le, Far anonymous rewardng based on electronc cash, Journal of Systems and Software, n press, orrected Proof, Avalable onlne February 009. [] Mafruz Zaman Ashraf, See ong Ng, Prvacy-preservng e-payments usng one-tme payment detals, omputer Standards & Interfaces, Vol., Issue, February 009, pp

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

Cryptanalysis of Threshold Proxy Signature Schemes 1)

Cryptanalysis of Threshold Proxy Signature Schemes 1) MM Research Preprnts, 226 233 MMRC, AMSS, Academa Snca No. 23, December 24 Cryptanalyss of Threshold Proxy Sgnature Schemes 1) Zuo-Wen Tan and Zhuo-Jun Lu Key Laboratory of Mathematcs Mechanzaton Insttute

More information

A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme*

A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme* A Model of Blnear-Parngs Based Desgnated-Verfer Proxy Sgnatue Scheme Fengyng L,, Qngshu Xue, Jpng Zhang, Zhenfu Cao Department of Educaton Informaton Technology, East Chna Normal Unversty, 0006, Shangha,

More information

Comment on An arbitrated quantum signature scheme. with fast signing and verifying

Comment on An arbitrated quantum signature scheme. with fast signing and verifying Comment on n arbtrated quantum sgnature scheme wth fast sgnng and verfyng Y-Png Luo and Tzonelh Hwang * Department of Computer cence and Informaton Engneerng, Natonal Cheng ung Unversty, No, Unversty Rd,

More information

A Threshold Digital Signature Issuing Scheme without Secret Communication

A Threshold Digital Signature Issuing Scheme without Secret Communication A Threshold Dgtal Sgnature Issung Scheme wthout Secret Communcaton Kazuo Takarag, Kunhko Myazak, Masash Takahash Systems Development Laboratory, Htach, Ltd e-mal: {takara, kunhko, takahas}@sdlhtachcop

More information

Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings

Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings Internatonal Journal of Informaton and Educaton Technology Vol No 4 August 0 Securty Vulnerablty n Identty-Based ublc Key Cryptosystems from arngs Jyh-aw Yeh Abstract Many dentty-based lc key cryptosystems

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 CHALMERS GÖTEBORGS UNIVERSITET CRYPTOGRAPHY TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 No extra materal s allowed durng the exam except for pens and a smple calculator (not smartphones).

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

A secure anonymous communication scheme in vehicular ad hoc. networks from pairings

A secure anonymous communication scheme in vehicular ad hoc. networks from pairings A secure anonymous communcaton scheme n vehcular ad hoc networks from parngs * Jue-Sam Chou 1, Yaln Chen 2 1 Department of Informaton Management, Nanhua Unversty Chay 622 Tawan,.O.C * : correspondng author

More information

G /G Advanced Cryptography 12/9/2009. Lecture 14

G /G Advanced Cryptography 12/9/2009. Lecture 14 G22.3220-001/G63.2180 Advanced Cryptography 12/9/2009 Lecturer: Yevgeny Dods Lecture 14 Scrbe: Arsteds Tentes In ths lecture we covered the Ideal/Real paradgm and the noton of UC securty. Moreover, we

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

On the Repeating Group Finding Problem

On the Repeating Group Finding Problem The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Finding Malleability in NTRUSign

Finding Malleability in NTRUSign Fndng Malleablty n TRUSgn SungJun Mn, Go Yamamoto, and Kwangjo Km Auto-ID Labs Whte Paper WP-HARDWARE-33 Sungjun Mn Senor Researcher, atonal Computerzaton Agency Go Yamamoto Senor Researcher, Informaton

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Provable Security Signatures

Provable Security Signatures Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -

More information

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO., Nov. 204 4226 Copyrght 204 KSII An Effcent Provable Secure Publc Audtng Scheme for Cloud Storage Chunang Xu, Yuan Zhang, Yong Yu, Xaojun

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes

Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes Informaton-Theoretc Tmed-Release Securty: Key-Agreement, Encrypton, and Authentcaton Codes Yohe Watanabe, Takenobu Seto, Junj Shkata Graduate School of Envronment and Informaton Scences, Yokohama Natonal

More information

A Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function

A Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function A Local Varatonal Problem of Second Order for a Class of Optmal Control Problems wth Nonsmooth Objectve Functon Alexander P. Afanasev Insttute for Informaton Transmsson Problems, Russan Academy of Scences,

More information

RSA /2002/13(08) , ); , ) RSA RSA : RSA RSA [2] , [1,4]

RSA /2002/13(08) , ); , )     RSA RSA : RSA RSA [2] , [1,4] 1000-9825/2002/13(081729-06 2002 Journal of Software Vol13, No8 RSA 1,2 1, 1 (, 200433; 2 (, 200070 E-mal: yfhu@fudaneducn http://wwwfudaneducn : RSA RSA :, ; RSA,,, RSA,, : ; RSA ; ;RSA; : TP309 : A RSA

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

C/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1

C/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1 C/CS/Phy9 Problem Set 3 Solutons Out: Oct, 8 Suppose you have two qubts n some arbtrary entangled state ψ You apply the teleportaton protocol to each of the qubts separately What s the resultng state obtaned

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Section 3.6 Complex Zeros

Section 3.6 Complex Zeros 04 Chapter Secton 6 Comple Zeros When fndng the zeros of polynomals, at some pont you're faced wth the problem Whle there are clearly no real numbers that are solutons to ths equaton, leavng thngs there

More information

arxiv: v2 [cs.cr] 29 Sep 2016

arxiv: v2 [cs.cr] 29 Sep 2016 Internatonal Journal of Bfurcaton and Chaos c World Scentfc Publshng Company Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton arxv:107.6536v [cs.cr] 9 Sep 016 Chengqng L

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities

Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities Enhanced Prvacy ID: A Drect Anonymous Attestaton Scheme wth Enhanced Revocaton Capabltes Erne Brckell Intel Corporaton erne.brckell@ntel.com Jangtao L Intel Corporaton jangtao.l@ntel.com August 17, 2007

More information

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Smarandache-Zero Divisors in Group Rings

Smarandache-Zero Divisors in Group Rings Smarandache-Zero Dvsors n Group Rngs W.B. Vasantha and Moon K. Chetry Department of Mathematcs I.I.T Madras, Chenna The study of zero-dvsors n group rngs had become nterestng problem snce 1940 wth the

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Post-quantum Key Exchange Protocol Using High Dimensional Matrix

Post-quantum Key Exchange Protocol Using High Dimensional Matrix Post-quantum Key Exchange Protocol Usng Hgh Dmensonal Matrx Rchard Megrelshvl I. J. Tbls State Unversty rchard.megrelshvl@tsu.ge Melksadeg Jnkhadze Akak Tseretel State Unversty Kutas, Georga mn@yahoo.com

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

(1 ) (1 ) 0 (1 ) (1 ) 0

(1 ) (1 ) 0 (1 ) (1 ) 0 Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Subset Topological Spaces and Kakutani s Theorem

Subset Topological Spaces and Kakutani s Theorem MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

6.842 Randomness and Computation February 18, Lecture 4

6.842 Randomness and Computation February 18, Lecture 4 6.842 Randomness and Computaton February 18, 2014 Lecture 4 Lecturer: Rontt Rubnfeld Scrbe: Amartya Shankha Bswas Topcs 2-Pont Samplng Interactve Proofs Publc cons vs Prvate cons 1 Two Pont Samplng 1.1

More information

Hash functions : MAC / HMAC

Hash functions : MAC / HMAC Hash functons : MAC / HMAC Outlne Message Authentcaton Codes Keyed hash famly Uncondtonally Secure MACs Ref: D Stnson: Cryprography Theory and Practce (3 rd ed), Chap 4. Unversal hash famly Notatons: X

More information

An Efficient Certificate-based Verifiable Encrypted Signature Scheme Without Pairings

An Efficient Certificate-based Verifiable Encrypted Signature Scheme Without Pairings Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 014, 8, 39-47 39 Open ccess n Effcent Certfcate-based Verfable Encrypted Sgnature Scheme Wthout Parngs Rufen

More information

Cryptographic Protocols

Cryptographic Protocols Cryptographc Protocols Entty Authentcaton Key Agreement Fat-Shamr Identfcaton Schemes Zero-Knowledge Proof Systems Shnorr s Identfcaton/Sgnature Scheme Commtment Schemes Secret Sharng Electronc Electon

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Exercises of Chapter 2

Exercises of Chapter 2 Exercses of Chapter Chuang-Cheh Ln Department of Computer Scence and Informaton Engneerng, Natonal Chung Cheng Unversty, Mng-Hsung, Chay 61, Tawan. Exercse.6. Suppose that we ndependently roll two standard

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement

Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement Effcent many-party controlled teleportaton of mult-qut quantum nformaton va entanglement Chu-Png Yang, Shh-I Chu, Syuan Han Physcal Revew A, 24 Presentng: Vctora Tchoudakov Motvaton Teleportaton va the

More information

Section 8.3 Polar Form of Complex Numbers

Section 8.3 Polar Form of Complex Numbers 80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Valuated Binary Tree: A New Approach in Study of Integers

Valuated Binary Tree: A New Approach in Study of Integers Internatonal Journal of Scentfc Innovatve Mathematcal Research (IJSIMR) Volume 4, Issue 3, March 6, PP 63-67 ISS 347-37X (Prnt) & ISS 347-34 (Onlne) wwwarcournalsorg Valuated Bnary Tree: A ew Approach

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

The Pseudoblocks of Endomorphism Algebras

The Pseudoblocks of Endomorphism Algebras Internatonal Mathematcal Forum, 4, 009, no. 48, 363-368 The Pseudoblocks of Endomorphsm Algebras Ahmed A. Khammash Department of Mathematcal Scences, Umm Al-Qura Unversty P.O.Box 796, Makkah, Saud Araba

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs

More information

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable

More information

Secure and practical identity-based encryption

Secure and practical identity-based encryption Secure and practcal dentty-based encrypton D. Naccache Abstract: A varant of Waters dentty-based encrypton scheme wth a much smaller system parameters sze (only a few klobytes) s presented. It s shown

More information

Quantum secure circuit evaluation

Quantum secure circuit evaluation Scence n Chna Ser. F Informaton Scences 2004 Vol.47 No.6 717 727 717 Quantum secure crcut evaluaton CHEN Huanhuan, LI Bn & ZHUANG Zhenquan Department of Electronc Scence and Technology, Unversty of Scence

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Self-complementing permutations of k-uniform hypergraphs

Self-complementing permutations of k-uniform hypergraphs Dscrete Mathematcs Theoretcal Computer Scence DMTCS vol. 11:1, 2009, 117 124 Self-complementng permutatons of k-unform hypergraphs Artur Szymańsk A. Paweł Wojda Faculty of Appled Mathematcs, AGH Unversty

More information

Augmented Broadcaster Identity-based Broadcast Encryption

Augmented Broadcaster Identity-based Broadcast Encryption Augmented Broadcaster Identty-based Broadcast Encrypton Janhong Zhang Yuwe Xu Zhpeng Chen Insttuton of Image Processng and Pattern Recognton North Chna Unversty of Technology Bejng Chna 100144 ywxupaper@163com

More information

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing

Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing Anonymous Identty-Based Broadcast Encrypton wth Revocaton for Fle Sharng Janchang La, Y Mu, Fuchun Guo, Wlly Suslo, and Rongmao Chen Centre for Computer and Informaton Securty Research, School of Computng

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM Internatonal Conference on Ceramcs, Bkaner, Inda Internatonal Journal of Modern Physcs: Conference Seres Vol. 22 (2013) 757 761 World Scentfc Publshng Company DOI: 10.1142/S2010194513010982 FUZZY GOAL

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

829. An adaptive method for inertia force identification in cantilever under moving mass

829. An adaptive method for inertia force identification in cantilever under moving mass 89. An adaptve method for nerta force dentfcaton n cantlever under movng mass Qang Chen 1, Mnzhuo Wang, Hao Yan 3, Haonan Ye 4, Guola Yang 5 1,, 3, 4 Department of Control and System Engneerng, Nanng Unversty,

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Applied Mathematics Letters

Applied Mathematics Letters Appled Matheatcs Letters 2 (2) 46 5 Contents lsts avalable at ScenceDrect Appled Matheatcs Letters journal hoepage: wwwelseverco/locate/al Calculaton of coeffcents of a cardnal B-splne Gradr V Mlovanovć

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

On quasiperfect numbers

On quasiperfect numbers Notes on Number Theory and Dscrete Mathematcs Prnt ISSN 1310 5132, Onlne ISSN 2367 8275 Vol. 23, 2017, No. 3, 73 78 On quasperfect numbers V. Sva Rama Prasad 1 and C. Suntha 2 1 Nalla Malla Reddy Engneerng

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

CS-433: Simulation and Modeling Modeling and Probability Review

CS-433: Simulation and Modeling Modeling and Probability Review CS-433: Smulaton and Modelng Modelng and Probablty Revew Exercse 1. (Probablty of Smple Events) Exercse 1.1 The owner of a camera shop receves a shpment of fve cameras from a camera manufacturer. Unknown

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

PHYS 705: Classical Mechanics. Canonical Transformation II

PHYS 705: Classical Mechanics. Canonical Transformation II 1 PHYS 705: Classcal Mechancs Canoncal Transformaton II Example: Harmonc Oscllator f ( x) x m 0 x U( x) x mx x LT U m Defne or L p p mx x x m mx x H px L px p m p x m m H p 1 x m p m 1 m H x p m x m m

More information

Beyond Zudilin s Conjectured q-analog of Schmidt s problem

Beyond Zudilin s Conjectured q-analog of Schmidt s problem Beyond Zudln s Conectured q-analog of Schmdt s problem Thotsaporn Ae Thanatpanonda thotsaporn@gmalcom Mathematcs Subect Classfcaton: 11B65 33B99 Abstract Usng the methodology of (rgorous expermental mathematcs

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information