The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different re...The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different requirements from the traditional security protocols.In order to solve this problem,first,we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle(MITM) attacks in some cases based on the extended SSM.Then,we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.展开更多
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro...In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
To provide an optimal alternative to traditional Transmission Control Protocol(TCP)-based transport technologies,Aspera's Fast and Secure Protocol(FASP)is proposed as an innovative bulky data transport technology....To provide an optimal alternative to traditional Transmission Control Protocol(TCP)-based transport technologies,Aspera's Fast and Secure Protocol(FASP)is proposed as an innovative bulky data transport technology.To accurately analyse the reliability and rapidness of FASP,an automated formal technique - probabilistic model checking - is used for formally analysing FASP in this paper.First,FASP's transmission process is decomposed into three modules:the Sender,the Receiver and the transmission Channel.Each module is then modelled as a Continuous-Time Markov Chain(CTMC).Second,the reward structure for CTMC is introduced so that the reliability and rapidness can be specified with the Continuous-time Stochastic Logic(CSL).Finally,the probabilistic model checker,PRISM is used for analysing the impact of different parameters on the reliability and rapidness of FASP.The probability that the Sender finishes sending data and the Receiver successfully receives data is always 1,which indicates that FASP can transport data reliably.The result that FASP takes approximately 10 s to complete transferring the file of 1 G irrespective of the network configuration shows that FASP can transport data very quickly.Further,by the comparison of throughput between FASP and TCP under various latency and packet loss conditions,FASP's throughput is shown to be perfectly independent of network delays and robust to extreme packet loss.展开更多
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing....The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.展开更多
基金supported in part by the National Natural Science Foundation of China under Grants No.60473072,No.60803151the Joint Fund of Natural Science Foundation of China with the Guangdong Provincial Government under Grant No.U0632004
文摘The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different requirements from the traditional security protocols.In order to solve this problem,first,we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle(MITM) attacks in some cases based on the extended SSM.Then,we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.
基金Acknowledgements The project was supported by the Specialized Research Found for the Doctoral Program of Higher Education of China under Grant No. 20060013007 the National Natural Science Foundation of Beijing under Caant No. 4092029 and the National Natural Science Foundation of China under Grant No. 61100205, No. 60873001.
文摘In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
基金supported by the National Natural Science Foundation of China under Grants No. 60773049,No. 61003288,No.61111130184the Ph.D. Programs Foundation of Ministry of Education of China under Grant No. 20093227110005the Natural Science Foundation of Jiangsu Province under Grant No.BK2010192
文摘To provide an optimal alternative to traditional Transmission Control Protocol(TCP)-based transport technologies,Aspera's Fast and Secure Protocol(FASP)is proposed as an innovative bulky data transport technology.To accurately analyse the reliability and rapidness of FASP,an automated formal technique - probabilistic model checking - is used for formally analysing FASP in this paper.First,FASP's transmission process is decomposed into three modules:the Sender,the Receiver and the transmission Channel.Each module is then modelled as a Continuous-Time Markov Chain(CTMC).Second,the reward structure for CTMC is introduced so that the reliability and rapidness can be specified with the Continuous-time Stochastic Logic(CSL).Finally,the probabilistic model checker,PRISM is used for analysing the impact of different parameters on the reliability and rapidness of FASP.The probability that the Sender finishes sending data and the Receiver successfully receives data is always 1,which indicates that FASP can transport data reliably.The result that FASP takes approximately 10 s to complete transferring the file of 1 G irrespective of the network configuration shows that FASP can transport data very quickly.Further,by the comparison of throughput between FASP and TCP under various latency and packet loss conditions,FASP's throughput is shown to be perfectly independent of network delays and robust to extreme packet loss.
基金supported by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386)the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004)+2 种基金the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008)Major State Basic Research Development Program of China(973 Program)(No.2014CB340600)the Hubei Natural Science Foundation of China(Grant No.2011CDB453,2014CFB440)
文摘The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.