Subjects: Psychology >> Cognitive Psychology submitted time 2021-07-30
Abstract: Auditory word recognition involves complex cognitive processing. Blind people have certain advantages of auditory compensatory in word processing. However, due to the lack of visual input, the blind suffer more challenges in auditory word processing related with visual perceptual experience (e.g., color terms). Future research should focus on (1) the word categorization based on the relationship with visual experience; (2) the multifaceted effects and neuropsychological mechanisms of factors in auditory word recognition, including phonology, orthography, and semantics, in order to develop the special model of spoken word processing conforming to the perceptual characteristics of the blind; (3) developmental studies in different ages. Finally, to reveal the overall mechanism of the effect of blindness on auditory word recognition of the blind.
Peer Review Status:Awaiting Review
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-12-13 Cooperative journals: 《计算机应用研究》
Abstract: Attribute-based encryption algorithm has the characteristics as flexibility, fine-grained and high security. This paper introduces an improved attribute-based outsourced encryption algorithm based on secure data access control attribute-based encryption, to reduce the resources consumed by computation, which outsources the complex bilinear pairings in the encryption computing to the fog node to reduce the user's computation overhead. By simplifying the system parameters, we reduce the random number generated by attribute authority for every attribute to shorten the length of ciphertext and the key, as well as the storage cost of the system. And the security proof of the scheme is given in the last part of this paper.
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-09-12 Cooperative journals: 《计算机应用研究》
Abstract: McEliece public-key cryptosystem is a public-key cryptosystem based on coding theory. Its security can be reduced to the general linear code decoding problem and it can resist quantum attack. This paper proposed an improved McEliece variant scheme based on quasi-cyclic medium density parity check (QC-MDPC) code and quasi-cyclic low density parity check (QC-LDPC) code. The main improvement was that the parity check matrices of QC-LDPC code and QC- MDPC code were combined as a private key, and the concatenated codewords generated were applied to the McEliece variant scheme, and an improved decoding algorithm was given. The analysis shows that under the 80-bit security, it has small system key and low-implement complexity. In addition, this system can resist the recently proposed key recovery attacks on QC-MDPC and QC-LDPC respectively.
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-06-19 Cooperative journals: 《计算机应用研究》
Abstract: Based on the characteristics and requirements of the consortium blockchain, this paper analyzed the protocol performance of the consensus mechanism and the spending of resources. Based on PBFT (practical byzantine fault tolerance) , this paper targeted the agreement in the consensus process for improvement. In the new consensus mechanism, it first introduced the credit evaluation, and used the simplified coherence protocol to promote the system to enter into a virtuous circle. It modified the checkpoint protocol that the nodes could dynamically join and leaved the system and improve the system flexibility. The experimental results show that the new consensus mechanism can shorten transaction confirmation time, reduce the use of communication resources, and improve system efficiency in the long running.
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-24 Cooperative journals: 《计算机应用研究》
Abstract: This paper proposed a new threshold secret sharing scheme based on the Shamir(n, t) threshold secret sharing scheme. Used the characteristic that the characteristic equation of the n-th order matrix has multiple roots, realized the secret sharing of participants in different sets. The secondary master key corresponding to the same participation set is the same, that is, the eigenvalue are the same. The algorithm firstly used the feature vector corresponding to the same eigenvalue as a subkey , then it distributed the subkey to the participating members of the same participating set. what's more, the members of the same collection could use the black box to verify the authenticity of the sub-keys in their own hands so as to achieve the purpose of fraud prevention. The analysis result shows that this scheme is safe and ideal .
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-20 Cooperative journals: 《计算机应用研究》
Abstract: Aiming at the differential power attack of the encryption scheme based on lattice, Reparaz proposed an additively homomorphic R-LWE masking scheme in PQC 2016. This scheme can against the differential power attack effectively, but the additively homomorphic algorithm between the ciphertexts makes the size of noise increase. It declines the rate of decryption correctness. In view of this problem, this paper proposed an improved R-LWE homomorphic masking scheme. By introducing the modular switching technology, it made a modular reduction with the cipher text of additively homomorphic. Under the premising that plaintext and the ciphertext were corresponding, it declined the size of noise in the ciphertext. And it could improve the decryption correctness of the scheme. In order to protect the sub keys, it introduced a the random matrix to mask the sub key. And it makes the correctness analysis and the safety proof. The proposed scheme has better security and efficiency compared to the original scheme.
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-18 Cooperative journals: 《计算机应用研究》
Abstract: Software-Defined Networking separates the control layer and the data layer. Data forwarding is unified management by the control layer in SDN. However, equipment integrity authentication mechanism is not consummate between the control layer and the data layer. If the falsified equipment tries to connect the network, the whole network will face serious security problems. For ensuring that the connection was established after proving the equipment credible and integrated and that network is available, this paper proposed a project of trusted connection based on SDN. Combing the trusted network remote device authentication technology and using the trusted platform module as trusted support, the project added integrity certification to linking process of data forwarding devices and controllers. According to the爀xperiment, the project is suitable for actual network environment.
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-19 Cooperative journals: 《计算机应用研究》
Abstract: The design of efficient and secure lattice-based post quantum key exchange protocols has certain practical and theoretical significance. In this paper, a scheme was proposed, which used straight-forward transformation LWE encryption mechanism and a ciphertext compression technology. This is a passively secure and practical key exchange protocol. Frodo was a key exchange scheme based on LWE problem proposed by Bos et al, which used the error reconciliation mechanism proposed by Peikert. The main advantage of the scheme over Frodo is simplicity. Compared with Frodo, the communications traffic merely increased by only 1.09%, the complexity of the scheme is reduced effectively. The scheme is proved to be passive security, Also, which can resist quantum computer attacks. Compared with existing key exchange protocol based on learning with error, this protocol is very competitive.
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-17 Cooperative journals: 《计算机应用研究》
Abstract: Software Defined Wireless Network (SDWN) is a wireless network architecture that separates control plane and forward plane. It can get global topology quickly and its programmable combined with resource virtualization technology can control network access dynamically. In order to solve the problem of unbalanced load in existing WLAN and handover problem caused by the hard association between mobile terminal and AP, this paper proposes a terminal multi-point association scheme based on load-aware in SDWN. This scheme improves the seamless handoff algorithm between AP based on traffic load perception. When sensing AP load, the terminal can connect multiple virtual APs to achieve dynamic diversion. Finally, this scheme is verified on an experimental platform. Experiments show that this scheme changes the relationship between the terminal and the AP one by one compared to seamlessly switching to another AP, which effectively improves the terminal network throughput.
Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-17 Cooperative journals: 《计算机应用研究》
Abstract: The current Attributa-based public encryption with keyword search(ATT-PEKS) , although it solves the problem that the keyword ciphertext can only be uniquely searched by the user to enable multi-user share of encrypted data, it does not hide the access structure. Once the access structure is obtained by unreliable servers attackers, it may be exposed to confidential information. Therefore, in order to solve this problem, this paper proposed an attributa-based public encryption scheme with keyword search that completely hides the access structure, which not only preserved the advantages of ATT-PEKS to realize multi-user data sharing, but also realized the complete concealment of the access structure that prevents the policy information leaking. And it analyzed the security and performance of the scheme. The simulation game proves that the scheme has the anti-attack security under the attribute set model, and also ensures the confidentiality of the index and the key words. The use of less computing power in terms of performance can be achieved hidden access policies and encrypted data sharing two functions.