• Title/Summary/Keyword: Efficient Proof

Search Result 132, Processing Time 0.033 seconds

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

Flexible top emission organic light emitting diode on paper substrate

  • Lee, Chan-Jae;Moon, Dae-Gyu;Han, Jeong-In;Choi, Sung-Hoon;Oh, Myung-Hwan
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2005.07b
    • /
    • pp.1390-1393
    • /
    • 2005
  • We fabricated an efficient top emission organic light emitting diode (FTEOLED) on paper substrates. For water proof and surface planarization, parylene of 5mm thick has been coated on copy paper substrate by vapor polymerization. As use this coating layer, fabrication of device was possible by photolithography and wet etching. Because paper is not transparent, we adapted top emission structure with transparent cathode and reflective anode. The FTOLED on paper showed the excellent electrical characteristic, $109cd/m^2$, 2.3cd/A at 10V.

  • PDF

Barycentric Approximator for Reinforcement Learning Control

  • Whang Cho
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.3 no.1
    • /
    • pp.33-42
    • /
    • 2002
  • Recently, various experiments to apply reinforcement learning method to the self-learning intelligent control of continuous dynamic system have been reported in the machine learning related research community. The reports have produced mixed results of some successes and some failures, and show that the success of reinforcement learning method in application to the intelligent control of continuous control systems depends on the ability to combine proper function approximation method with temporal difference methods such as Q-learning and value iteration. One of the difficulties in using function approximation method in connection with temporal difference method is the absence of guarantee for the convergence of the algorithm. This paper provides a proof of convergence of a particular function approximation method based on \"barycentric interpolator\" which is known to be computationally more efficient than multilinear interpolation .

A CLASSIFICATION OF THE SECOND ORDER PROJECTION METHODS TO SOLVE THE NAVIER-STOKES EQUATIONS

  • Pyo, Jae-Hong
    • Korean Journal of Mathematics
    • /
    • v.22 no.4
    • /
    • pp.645-658
    • /
    • 2014
  • Many projection methods have been progressively constructed to find more accurate and efficient solution of the Navier-Stokes equations. In this paper, we consider most recently constructed projection methods: the pressure correction method, the gauge method, the consistent splitting method, the Gauge-Uzawa method, and the stabilized Gauge-Uzawa method. Each method has different background and theoretical proof. We prove equivalentness of the pressure correction method and the stabilized Gauge-Uzawa method. Also we will obtain that the Gauge-Uzawa method is equivalent to the gauge method and the consistent splitting method. We gather theoretical results of them and conclude that the results are also valid on other equivalent methods.

A Study on Brand Image and Consumer Attitude Influenced on Products Choice Focusing on Cosmetic - (소비자의 태도와 브랜드 이미지가 제품 선택에 미치는 영향에 관한 연구 국내 화장품 시장을 중심으로-)

  • Kim Jung-Wook;Cho Jai-Rip
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2004.04a
    • /
    • pp.25-30
    • /
    • 2004
  • This study analyzes a change and an effect that brand image gets in product choose. Purpose of this study present the suggestion under the influence of degree that brand image gets in product purchase to cosmetic customer. Consumers investigate the product or trademark when purchase goods. They purchase goods through the comparison and analysis and evaluate the satisfaction and dissatisfaction with the contentment. Consumers complicate while compare the products and the consumer's choose the products. The purpose of this study is find various requirement of consumers and present efficient marketing activity through theoretical verification and actual proof analysis.

  • PDF

Development of Water Supply System for Water Demand (물수요중심 용수공급 시스템 개발)

  • Chung, Kwang-Kun;Lee, Kwang-Ya;Kim, Hea-Do;Lee, Jong-Nam
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2005.10a
    • /
    • pp.85-90
    • /
    • 2005
  • A Water Level gauge which composes a water supply system for water demand, information transmission system and the solar storehouse electromotive floodgate, regarding the structure plan and a production of the nothing power automatic floodgate it described. The important point must solve but urgently will compare the water amount used from system establishment place or not one. and It must give proof the efficient characteristic of system, must solve the technical problem portion against revision of the accuracy of upper downstream canal which is information transmission system of the Self-controlled check gate. The solar floodgate is more economic with the base which will reach and the system construction which is accurate.

  • PDF

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

소형 장기체공형 무인기 날개의 구조 개량 설계

  • Lee, Jung-Jin
    • Aerospace Engineering and Technology
    • /
    • v.1 no.2
    • /
    • pp.179-185
    • /
    • 2002
  • In this study, the structural design method for the modified long-endurance UAV is presented. Composite materials using room temperature curing method and wet lay up procedure is applied to all wing structures. The modified wing is composed of 3-piece component for improvement of ground handling. As the sandwich structure is efficient for light weight and high stiffness, all skin is used the sandwich consisting of glass/ epoxy fabric and balsa wood. The proof test is performed up to limit load corresponding to 4g load condition for the modified wing structure.

  • PDF

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

Some efficient ratio-type exponential estimators using the Robust regression's Huber M-estimation function

  • Vinay Kumar Yadav;Shakti Prasad
    • Communications for Statistical Applications and Methods
    • /
    • v.31 no.3
    • /
    • pp.291-308
    • /
    • 2024
  • The current article discusses ratio type exponential estimators for estimating the mean of a finite population in sample surveys. The estimators uses robust regression's Huber M-estimation function, and their bias as well as mean squared error expressions are derived. It was campared with Kadilar, Candan, and Cingi (Hacet J Math Stat, 36, 181-188, 2007) estimators. The circumstances under which the suggested estimators perform better than competing estimators are discussed. Five different population datasets with a well recognized outlier have been widely used in numerical and simulation-based research. These thorough studies seek to provide strong proof to back up our claims by carefully assessing and validating the theoretical results reported in our study. The estimators that have been proposed are intended to significantly improve both the efficiency and accuracy of estimating the mean of a finite population. As a result, the results that are obtained from statistical analyses will be more reliable and precise.