با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022 Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent
breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing
public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with
quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or
cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity
verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security.
DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server.
Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set.
Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures.
We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that
DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security |
مقاله انگلیسی |
2 |
Grover on KATAN: Quantum Resource Estimation
گروور در کاتان: برآورد منابع کوانتومی-2022 This article presents the cost analysis of mounting Grover’s key search attack on the family of
KATAN block cipher. Several designs of the reversible quantum circuit of KATAN are proposed. Owing
to the National Insitute of Standards and Technology’s (NIST) proposal for postquantum cryptography
standardization, the circuits are designed focusing on minimizing the overall depth. We observe that the
reversible quantum circuits designed using and gates and T-depth one Toffoli gate give more shallow
circuits. Grover oracle for KATAN is designed based on the reversible circuits, which are used further to
mount Grover’s key search attack on KATAN. The designs are implemented using the software framework
ProjectQ, which provides a resource estimation tool to perform an appropriate cost analysis in an automated
way. While estimating the resources, NIST’s depth restrictions are also respected.
INDEX TERMS: Grover’s algorithm | KATAN | postquantum cryptography (PQC) | ProjectQ implementation | quantum cryptanalysis. |
مقاله انگلیسی |
3 |
Quantum Algorithm for Fidelity Estimation
الگوریتم کوانتومی برای برآورد وفاداری-2022 For two unknown mixed quantum states ρ and σ in
an N-dimensional Hilbert space, computing their fidelity F (ρ, σ)
is a basic problem with many important applications in quantum
computing and quantum information, for example verification
and characterization of the outputs of a quantum computer,
and design and analysis of quantum algorithms. In this paper,
we propose a quantum algorithm that solves this problem in
poly(log(N ), r, 1/ε) time, where r is the lower rank of ρ and
σ, and ε is the desired precision, provided that the purifications
of ρ and σ are prepared by quantum oracles. This algorithm
exhibits an exponential speedup over the best known algorithm
(based on quantum state tomography) which has time complexity
polynomial in N. keywords: Quantum computing | quantum algorithms | quantum fidelity | quantum states. |
مقاله انگلیسی |
4 |
Alternative Tower Field Construction for Quantum Implementation of the AES S-Box
ساخت میدان برج جایگزین برای اجرای کوانتومی AES S-Box-2022 Grover’s search algorithm allows a quantum adversary to find a k-bit secret key of a block cipher by making O(2k=2) block
cipher queries. Resistance of a block cipher to such an attack is evaluated by quantum resources required to implement Grover’s
oracle for the target cipher. The quantum resources are typically estimated by the T-depth of its circuit implementation and the number
of qubits used by the circuit (width). Since the AES S-box is the only component which requires T-gates in a quantum implementation of
AES, recent research has put its focus on efficient implementation of the AES S-box. However, any efficient implementation with low
T-depth will not be practical in the real world without considering qubit consumption of the implementation. In this work, we propose
three methods of trade-off between time and space for the quantum implementation of the AES S-box. In particular, one of our methods
turns out to use the smallest number of qubits among the existing methods, significantly reducing its T-depth.
Index Terms: Quantum implementation | quantum cryptanalysis | Grover’s algorithm | AES | multiplicative inversion |
مقاله انگلیسی |
5 |
Provably secure biometric-based client–server secure communication over unreliable networks
ارتباطات امن مشتری و سرور مبتنی بر بیومتریک به طور قابل اطمینان در شبکه های غیرقابل اعتماد-2021 Due to rapid advancement in internet technologies, remote client access has become much more comfortable than in previous days. The responsibility of the system does not limit even after providing access to resources. In every system, there is a possibility that an adversary may use the resources of the system without prior authentication. This will create interruption, and the clients of the system will ultimately be affected, so the system must provide some authentication mechanism. Therefore, an authentication scheme needs to be introduced, which provides security against different attacks. Consequently, in this article, we propose a reliable and secure three factor authentication scheme that prevents various security attacks. The provable security of the proposed scheme is proved through a widely used random oracle model. We implemented the cryptographic operations of proposed and related schemes on a desktop system having good specifications to get the experimental results. Moreover, the presented scheme is compared with the existing schemes to compare its performance. The performance evaluation shows that our scheme is lightweight and efficient in terms of computation and communication costs as compared to related competing schemes. Keywords: Anonymity | Authentication | Impersonation attack | Session key | Smartcard |
مقاله انگلیسی |
6 |
Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map
تجزیه و تحلیل و افزایش احراز هویت کاربر سه عامل امن با استفاده از نقشه آشفته Chebyshev-2021 The most popular solution for a variety of business applications such as e-banking and e-healthcare is the multi-server environment. The user registration of individual servers is not the primary concern in such an environment. Here, the user can get various services from different servers by registering him/her under one server. To get secure services through this environment, the authenticity of users and servers are crucial. In this observation, the smart card based biometric authentication system is well popular and easy to use. This paper delineates that the security flaws can be found in a trusted authentication scheme proposed by Chatterjee et al. (2018). Besides, this work proposes an enhanced authentication scheme namely, asymmetric encryption based secure user authentication (ASESUA) to eliminate the drawbacks of Chatterjee et al.’s scheme. The formal security analysis of ASESUA has been done with the help of random oracle model and verified by the well popular AVISPA tool. The analysis shows that ASESUA performs better concerning security, communication cost, and computation cost than other related existing schemes. Keywords: Attack | Authentication | Biometric | Smart card | Security |
مقاله انگلیسی |
7 |
Exploring smart construction objects as blockchain oracles in construction supply chain management
کاوش اشیا ساخت هوشمند به عنوان اوراکل بلاکچین در مدیریت زنجیره تأمین ساخت و ساز-2021 Blockchain technology has attracted the interest of the global construction industry for its potential to enhance the transparency, traceability, and immutability of construction data and enables collaboration and trust throughout the supply chain. However, such potential cannot be achieved without blockchain “oracles” needed to bridge the on-chain (i.e., blockchain system) and off-chain (i.e., real-life physical project) worlds. This study presents an innovative solution that exploits smart construction objects (SCOs). It develops a SCOs-enabled blockchain oracles (SCOs-BOs) framework. To instantiate this framework, the system architecture of a blockchain-enabled construction supply chain management (BCSCM) system is developed and validated using a case study, whereby four primary smart contracts are examined in the context of off-site logistics and on-site assembly services. The validation results show that accurate data is retrieved against malicious data in each request, and the corresponding reputation scores are successfully recorded. The innovativeness of the research lies in two aspects. In addition to mobilizing SCOs as blockchain oracles to bridge the on-chain and off-chain worlds, it develops a decentralized SCO network to avoid the single point of failure (SPoF) problem widely existing in blockchain systems. This study contributes to existing research and practice to harness the power of blockchain in construction. Keywords: Blockchain | Oracles | Smart contract | Supply chain management | Smart construction objects | Prefabricated construction |
مقاله انگلیسی |
8 |
Learning to run a power network challenge for training topology controllers
یادگیری اجرای چالش شبکه برق برای آموزش کنترل کننده های توپولوژی-2020 For power grid operations, a large body of research focuses on using generation redispatching, load shedding or
demand side management flexibilities. However, a less costly and potentially more flexible option would be grid
topology reconfiguration, as already partially exploited by Coreso (European RSC) and RTE (French TSO) operations.
Beyond previous work on branch switching, bus reconfigurations are a broader class of actions and
could provide some substantial benefits to route electricity and optimize the grid capacity to keep it within safety
margins. Because of its non-linear and combinatorial nature, no existing optimal power flow solver can yet tackle
this problem. We here propose a new framework to learn topology controllers through imitation and reinforcement
learning. We present the design and the results of the first “Learning to Run a Power Network”
challenge released with this framework. We finally develop a method providing performance upper-bounds
(oracle), which highlights remaining unsolved challenges and suggests future directions of improvement. Keywords: Artificial intelligence | Control | Power flow | Reinforcement learning | Competition |
مقاله انگلیسی |
9 |
ECG AI-Guided Screening for Low Ejection Fraction (EAGLE): Rationale and design of a pragmatic cluster randomized trial
غربالگری هدایت شده با هوش مصنوعی ECG برای کسر کم دفع (EAGLE): منطق و طراحی یک آزمایش تصادفی خوشه عملی-2020 Background A deep learning algorithm to detect low ejection fraction (EF) using routine 12-lead electrocardiogram
(ECG) has recently been developed and validated. The algorithm was incorporated into the electronic health record (EHR) to
automatically screen for low EF, encouraging clinicians to obtain a confirmatory transthoracic echocardiogram (TTE) for
previously undiagnosed patients, thereby facilitating early diagnosis and treatment.
Objectives To prospectively evaluate a novel artificial intelligence (AI) screening tool for detecting low EF in primary
care practices.
Design The EAGLE trial is a pragmatic two-arm cluster randomized trial (NCT04000087) that will randomize N100
clinical teams (i.e., clusters) to either intervention (access to the new AI screening tool) or control (usual care) at 48 primary care
practices across Minnesota and Wisconsin. The trial is expected to involve approximately 400 clinicians and 20,000 patients.
The primary endpoint is newly discovered EF ≤50%. Eligible patients will include adults who undergo ECG for any reason and
have not been previously diagnosed with low EF. Data will be pulled from the EHR, and no contact will be made with patients.
A positive deviance qualitative study and a post-implementation survey will be conducted among select clinicians to identify
facilitators and barriers to using the new screening report.
Summary This trial will examine the effectiveness of the AI-enabled ECG for detection of asymptomatic low EF in routine
primary care practices and will be among the first to prospectively evaluate the value of AI in real-world practice. Its findings
will inform future implementation strategies for the translation of other AI-enabled algorithms. (Am Heart J 2020;219:31-6.) |
مقاله انگلیسی |
10 |
AI Chest 4 All
AI Chest 4 All-2020 AIChest4All is the name of the model used to
label and screening diseases in our area of focus, Thailand,
including heart disease, lung cancer, and tuberculosis. This
is aimed to aid radiologist in Thailand especially in rural
areas, where there is immense staff shortages. Deep learning
is used in our methodology to classify the chest X-ray images
from datasets namely, NIH set, which is separated into 14
observations, and the Montgomery and Shenzhen set, which
contains chest X-ray images of patients with tuberculosis,
further supplemented by the dataset from Udonthani Cancer
hospital and the National Chest Institute of Thailand. The
images are classified into six categories: no finding, suspected
active tuberculosis, suspected lung malignancy, abnormal
heart and great vessels, Intrathoracic abnormal findings, and
Extrathroacic abnormal findings. A total of 201,527 images
were used. Results from testing showed that the accuracy
values of the categories heart disease, lung cancer, and
tuberculosis were 94.11%, 93.28%, and 92.32%, respectively
with sensitivity values of 90.07%, 81.02%, and 82.33%,
respectively and the specificity values were 94.65%, 94.04%,
and 93.54%, respectively. In conclusion, the results acquired
have sufficient accuracy, sensitivity, and specificity values to
be used. Currently, AIChest4All is being used to help several
of Thailand’s government funded hospitals, free of charge. |
مقاله انگلیسی |