261 research outputs found
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA
Yet another insecure group key distribution scheme using secret sharing
A recently proposed group key distribution scheme known as UMKESS, based on
secret sharing, is shown to be insecure. Not only is it insecure, but it does
not always work, and the rationale for its design is unsound. UMKESS is the
latest in a long line of flawed group key distribution schemes based on secret
sharing techniques.Comment: Minor modifications to provide extra backgroun
Multi-exponentiation
In several cryptographic protocols the product of a small number of exponentiations is required, but the separate exponentiation results are not needed. A simultaneous exponentiation algorithm that takes advantage of this situation and that is substantially faster than the ordinary approach using separate exponentiations is presented
Tradable credit scheme for rush hour travel choice with heterogeneous commuters
This article proposes a tradable credit scheme for managing commuters travel choices. The scheme considers bottleneck congestion and modal split in a competitive highway-transit network with heterogeneous commuters who are distinguished by their valuation of travel time. The scheme charges all auto travelers who pass the bottleneck during a peak-time window in the form of mobility credits. Those who avoid the peak-time window, by either traveling outside the peak-time window or switching to the transit mode, may be rewarded credits. An artificial market is created so that the travelers may trade these credits with each other. We formulate the credit price and the rewarded and charged credits under tradable credit scheme. Our analyses indicate that the optimal tradable credit scheme can achieve nearly 40% efficiency gains depending on the level of commuters heterogeneity. In addition, this scheme distributes the benefits among all the commuters directly through the credit trading. Our results suggest that in assessing the efficiency of tradable credit scheme, it is important to take into account the commuters heterogeneity. Numerical experiments are conducted to examine the sensitivity of tradable credit scheme designs to various system parameters
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles
Achieving fairness and soundness in non-simultaneous rational secret sharing schemes has proved to be challenging.
On the one hand, soundness can be ensured by providing side information related to the secret as a check, but on the other, this can be used by deviant players to compromise fairness.
To overcome this, the idea of incorporating a time delay was suggested in the literature: in particular, time-delay encryption based on memory-bound functions has been put forth as a solution.
In this paper, we propose a different approach to achieve such delay, namely using homomorphic time-lock puzzles (HTLPs), introduced at CRYPTO 2019, and construct a fair and sound rational secret sharing scheme in the non-simultaneous setting from HTLPs.
HTLPs are used to embed sub-shares of the secret for a predetermined time. This allows to restore fairness of the secret reconstruction phase, despite players having access to information related to the secret which is required to ensure soundness of the scheme. Key to our construction is the fact that the time-lock puzzles are homomorphic so that players can compactly evaluate sub-shares. Without this efficiency improvement, players would have to independently solve each puzzle sent from the other players to obtain a share of the secret, which would be computationally inefficient.
We argue that achieving both fairness and soundness in a non-simultaneous scheme using a time delay based on CPU-bound functions rather than memory-bound functions is more cost effective and realistic in relation to the implementation of the construction
The effect of herd formation among healthcare investors on health sector growth in China
Maximizing Efficiency in the Suez Canal: A New Approach to Evaluate the Impact of Optimal Time-Varying Tolls on Ship Arrival Times
In the existing literature, an optimal time-varying toll scheme has been proposed for the Suez Canal to address the inefficiency of numerous ships queuing and waiting at the anchorage area to enter the canal. The primary objective of this tolling strategy is to alleviate the significant issue of ships queuing at the canal’s anchorage area. This stands in contrast to the current tolling system employed by the Suez Canal, which primarily aims to recover the management and operational costs associated with ship passage through the canal. However, the existing literature has yet to explore how the arrival times of ships at the anchorage area will change after implementing the optimal time-varying toll scheme. The goal is to ensure that the equilibrium cost of each tolled ship does not result in losses and achieve maximum efficiency in eliminating queueing at the anchorage area. To address this gap, this paper adopts the principle of cost equilibrium conservation and utilizes the Point-Slope Form to derive two mathematical formulas representing all ships’ post-toll arrival times at the anchorage area of the Suez Canal. These formulas are specifically derived for two categories of tolled ships: those that enter the canal earlier than the latest entry time regulated by the canal authorities and those that enter later. The derived formulas are concise and comparative, strengthening the theoretical underpinnings of the current pricing model for a queuing canal. Furthermore, they serve as valuable references for canal authorities in devising pertinent measures, such as organizing the scheduling of canal pilots, to facilitate the implementation of the optimal time-varying toll scheme
Do Experts in Financial Magazines Exhibit the Representativeness Heuristic? Evidence from Taiwan
Measuring rank correlation coefficients between financial time series: A GARCH-copula based sequence alignment algorithm
- …
