k-time Proxy Signature: Formal Definition and Efficient Construction

Author(s):  
Weiwei Liu ◽  
Guomin Yang ◽  
Yi Mu ◽  
Jiannan Wei
2020 ◽  
Vol 35 (24) ◽  
pp. 2050197
Author(s):  
Xiangjun Xin ◽  
Qinglan Yang ◽  
Fagen Li

A quantum proxy signature scheme makes the proxy signer can generate a quantum signature on behalf of the original signer. Although many quantum proxy signature schemes have been proposed, none of them can be formally proved to be secure. There is not even security model for the quantum proxy signatures. Some quantum proxy signature schemes have been proved to be insecure against forgery attacks. In this paper, first, the formal definition and the corresponding security model for the quantum proxy signatures are proposed. Second, based on the Hadamard operator and the controlled NOT operation, a new quantum proxy signature scheme is proposed. The security of our quantum proxy signature scheme can be formally proved under security model. The security model of the quantum proxy signatures is helpful for analyzing and improving the security of the quantum proxy signature schemes. On the other hand, compared with the other quantum proxy signatures, the new one proposed in this paper is the first that can be formally proved to be secure under security model.


2015 ◽  
Vol E98.B (7) ◽  
pp. 1276-1283 ◽  
Author(s):  
Nam-Su JHO ◽  
Ku-Young CHANG ◽  
Do-Won HONG

Author(s):  
Vasyl Zelenko ◽  
Yaryna Ferenchak ◽  
Nataliya Zelenko

The paper outlines major preconditions of development of energy efficiency programs and the process of their introduction from the perspective of sustainable development concept. Energy saving measures of European Union are examined, its experience and results, like green books and Thermie programs, etc are analyzed. The paper also specifies relevant activities and responsibilities undertaken by Member States by 2030 and the rates planned to be achieved. The experience of neighboring Poland in energy efficiency promotion is analyzed, as far as the country most closely resembles Ukraine by the initial rates in 1990. We calculated conditional losses of Ukraine in 2017 as the gap between the rates of energy efficiency of Ukraine and Poland (similarity of climate conditions and the state of housing funds allowed us to assume that the comparison will be the most correct regarding Ukraine). The results of calculations make us conclude that the funds are used most efficiently if the money designated, for example, for subsidizing of population are directed at strengthening of energy efficiency (at least up to the level of neighboring country). It will result in saving of about 40 billion. This is the amount defined as Ukrainian capacity in terms of improvement of energy saving and possible results of its realization. The paper determines the stage Ukraine is at in introduction of energy efficiency measures and programs: “warm loans” program; conditions regarding energy saving in Ukraine enshrined in the EU-Ukraine Association Agreement; creation of legal basis, namely the Law of Ukraine “On Energy Efficiency Fund” as of 8 June 2017. The role of newly created Energy Efficiency Fund is analyzed. Special attention is paid to the fact that energy efficient construction is one of international liabilities undertaken by Ukraine. The presence of The Active House Alliance at Ukrainian market is an important achievement in this sphere as it is the non-profit association aiming at creation of housing concept corresponding to the sustainable development principles.


Author(s):  
Mathias Konrath ◽  
Thomas Gottron ◽  
Steffen Staab ◽  
Ansgar Scherp

2018 ◽  
pp. 89-94
Author(s):  
V. A. Minaev ◽  
I. D. Korolev ◽  
V. V. Mukhortov

The article deals with the issues of integrated assessment of complex technical systems stability functioning in techno sphere and info sphere. It is shown that the concept of cyber stability, including its components such as cyber reliability, noise immunity and cyber survivability are insufficiently investigated and defined. The formal definition is given and the scale with various gradation of cyber survivability is entered. On the example of robotic systems in form of drones two variants of mathematical models of cyber survivability estimation are considered. The first variant is related to the description of drones functioning in the conditions of computer attacks without impact protection systems. The second variant reflects the functioning of drones under the conditions of impacts in the presence of adaptive combined cybernetic protection system. In both variants, two strategies are considered - with minimal and maximum intensity of effects on the drone. It is concluded that proposed in the paper approach enables to evaluate the integrated stability of complex technical systems in the techno sphere and info sphere at the same time.


Sign in / Sign up

Export Citation Format

Share Document