Advanced Search
Submit & Review

2021 Vol.30 No.2

Published on 02 April 2021

Articles in press have been peer-reviewed and accepted, which are not yet assigned to volumes /issues, but are citable by Digital Object Identifier (DOI).
Display Method:
Request Merging Based Cross-User Deduplication for Cloud Storage with Resistance Against Appending Chunks Attack
TANG Xin, ZHANG Yi, ZHOU Linna, et al.
2021, 30(2): 199-209.   doi: 10.1049/cje.2021.01.004
Abstract(286) HTML(115) PDF(28)
Cross-user deduplication is an emerging technique to eliminate redundant uploading in cloud storage. Its deterministic response indicating the existence of data creates a side channel to attackers, which makes the privacy in the cloud at risk. Such kind of attack as well as further appending chunks attack, still cannot be well resisted in current solutions, thus is becoming a big obstacle in using this technique. We propose a secure cross-user deduplication, called Request merging based deduplication scheme (RMDS), which takes the lead to consider resistance against appending chunks attack in a lightweight way, let alone side channel attack. We utilize the proposed XOR based chunk-level server-side storage structure together with a request merging strategy to obfuscate attackers in minimized communication overhead. The experiment results show that, with security guaranteed, the proposed scheme is more efficient comparing with the state of the art.
Security Analysis of A Stream Cipher with Proven Properties
GAO Juntao, LI Xuelian
2021, 30(2): 210-218.   doi: 10.1049/cje.2021.01.002
Abstract(81) HTML(28) PDF(13)
Si and Ding proposed a stream cipher with two keys (the first and the second key) and an expected security strength. To further measure the security, we analyze the stream cipher by considering the selective discrete Fourier spectra attack and the fast selective discrete Fourier spectra attack. The two attacks reveal a fact that the second key is more important than the first key, that is, if the second key is leaked out, the first key can be obtained with a lower time complexity than that of the expected security. In addition, we analyze the ability of the stream cipher to resist the guess-anddetermine attack. The results show an attacker is able to gain the two keys with an exponentially improved time complexity and a polynomial data complexity. It implies that we need a securer permutation over finite fields to design a new binary additive stream cipher to achieve the expected security level.
P2HBT: Partially Policy Hidden E-Healthcare System with Black-Box Traceability
YING Zuobin, SI Yuanping, MA Jianfeng, et al.
2021, 30(2): 219-231.   doi: 10.1049/cje.2021.01.005
Abstract(70) HTML(34) PDF(7)
Electronic health record (EHR), as the core of the e-healthcare system, is an electronic version of patient medical history, which records personal healthrelated information. EHR embodies the value of disease monitoring through large-scale sharing via the Cloud service provider (CSP). However, the health data-centric feature makes EHR more preferable to the adversaries compared with other outsourcing data. Moreover, there may even be malicious users who deliberately leak their access privileges for benefits. An e-healthcare system with a black-box traceable and robust data security mechanism is presented for the first time. Specifically, we propose an effective P2HBT, which can perform fine-grained access control on encrypted EHRs, prevent the leakage of privacy contained in access policies, and support tracing of traitors. Under the standard model, the scheme is proved fully secure. Performance analysis demonstrates that P2HBT can achieve the design goals and outperform existing schemes in terms of storage and computation overhead.
Nonsingularity of Feedback Shift Registers of Degree at Most Three over a Finite Field
LIU Junying, JIANG Yupeng, ZHENG Qunxiong, et al.
2021, 30(2): 232-237.   doi: 10.1049/cje.2021.01.009
Abstract(39) HTML(17) PDF(12)
As a kind of generators of pseudorandom sequences, the Feedback shift register (FSR) is widely used in channel coding, cryptography and digital communication. A necessary and sufficient condition for the nonsingularity of a feedback shift register of degree at most three over a finite field is established. Using the above result, we can easily determine the nonsingularity of a feedback shift register from the algebraic normal form of the corresponding feedback function.
An Efficient Post-quantum Identity-Based Signature
YANG Zhichao, DUNG H. Duong, WILLY Susilo, et al.
2021, 30(2): 238-248.   doi: 10.1049/cje.2021.01.006
Abstract(57) HTML(26) PDF(11)
Digital signature is one of the most important cryptography primitives. Recently, more and more works have been done to construct signatures over lattice problems to keep them secure in the quantum age. Among them, a ring-based signature scheme named Dilithium is the most efficient one and a candidate in the third round of the National Institute of Standards and Technology's post-quantum cryptography project. To make those schemes work well in large network, we constructed the first ring-based Identity-based signature (IBS) scheme for light-weight authentication. The construction in this paper relies on the transformations introduced by Bellare et al. in Journal of Cryptology (Vol.22, No.1, pp.1–61, 2009) and its security can be proved under the hardness of ringlearning with errors problem in the random oracle model. Due to better trapdoor and polynomial ring setting, our proposed scheme are much better than the previous ones in terms of both computation and communication complexities.
Attribute-Based Worker Selection Scheme by Using Blockchain in Decentralized Crowdsourcing Scenario
YANG Qiliang, ZHANG Mingrui, ZHOU Yanwei, et al.
2021, 30(2): 249-257.   doi: 10.1049/cje.2021.01.007
Abstract(52) HTML(20) PDF(9)
Traditional crowdsourcing based on centralized management platform is vulnerable to Distributed denial of service (DDoS) attack and single point of failure. Combining blockchain technology with crowdsourcing can well solve the above problems, enabling users to realize peer-to-peer transactions and collaboration based on decentralized trust in distributed systems where nodes do not need to trust each other. Although the current methods have solved the above problems, task publishers select workers based on their reputation values, which has two disadvantages: subjectivity and difficulty in initial value setting. Due to the complexity of crowdsourcing network, there will be malicious users in the network. The requirement for anonymity protects both legitimate and malicious users. In order to solve these problems, we propose an attribute-based worker selection scheme using the private set intersection technology. Our scheme also realizes the malicious user identity disclosure function. A concrete example of our scheme is given.
Differential Fault Attack on Camellia
ZHOU Yongbin, WU Wenling, XU Nannan, FENG Dengguo
2009, 18(1): 13-19.  
[Abstract](602) [PDF 423KB](6)
Camellia is the final winner of 128-bit blockcipher in NESSIE project, and is also certified as the international IETF standard cipher for SSL/TLS cipher suites.In this study, we present an effcient differential fault attack on Camellia. Ideally, by using our techniques, on average, the complete key of Camellia-128 is recovered with64 faulty ciphertexts while the full keys of Camellia-192and Camellia-256 are retrieved with 96 faulty ciphertexts.Our attack is applicable to generic block ciphers with overall Fiestel structure using a SPN round function.All theseattacks have been successfully put into experimental simulations on a personal computer.
Face Liveness Detection Based on the Improved CNN with Context and Texture Information
GAO Chenqiang, LI Xindou, ZHOU Fengshun, MU Song
2019, 28(6): 1092-1098.   doi: 10.1049/cje.2019.07.012
[Abstract](48) [PDF 3162KB](7)
Face liveness detection, as a key module of real face recognition systems, is to distinguish a fake face from a real one. In this paper, we propose an improved Convolutional neural network (CNN) architecture with two bypass connections to simultaneously utilize low-level detailed information and high-level semantic information. Considering the importance of the texture information for describing face images, texture features are also adopted under the conventional recognition framework of Support vector machine (SVM). The improved CNN and the texture feature based SVM are fused. Context information which is usually neglected by existing methods is well utilized in this paper. Two widely used datasets are used to test the proposed method. Extensive experiments show that our method outperforms the state-of-the-art methods.
An Ultra Low Steady-State Current Power-on- Reset Circuit in 65nm CMOS Technology
SHAN Weiwei, WANG Xuexiang, LIU Xinning, SUN Huafang
2014, 23(4): 678-681.  
[Abstract](210) [PDF 832KB](4)
A novel Power-on-reset (POR) circuit is proposed with ultra-low steady-state current consumption. A band-gap voltage comparator is used to generate a stable pull-up voltage. To eliminate the large current consumptions of the analog part, a power switch is adopted to cut the supply of band-gap voltage comparator, which gained ultra-low current consumption in steady-state after the POR rest process completed. The state of POR circuit is maintained through a state latch circuit. The whole circuit was designed and implemented in 65nm CMOS technology with an active area of 120μm*160μm. Experimental results show that it has a steady pull-up voltage of 0.69V and a brown-out voltage of 0.49V under a 1.2V supply voltage rising from 0V, plus its steady-state current is only 9nA. The proposed circuit is suitable to be integrated in system on chip to provide a reliable POR signal.
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
CHENG Hongbing, RONG Chunming, TAN Zhenghua, ZENG Qingkai
2012, 21(2): 254-259.  
[Abstract](976) [PDF 273KB](4)
Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing.
A Global K-modes Algorithm for Clustering Categorical Data
BAI Tian, C.A. Kulikowski, GONG Leiguang, YANG Bin, HUANG Lan, ZHOU Chunguang
2012, 21(3): 460-465.  
[Abstract](407) [PDF 334KB](5)
In this paper, a new Global k-modes (GKM) algorithm is proposed for clustering categorical data. The new method randomly selects a sufficiently large number of initial modes to account for the global distribution of the data set, and then progressively eliminates the redundant modes using an iterative optimization process with an elimination criterion function. Systematic experiments were carried out with data from the UCI Machine learning repository. The results and a comparative evaluation show a high performance and consistency of the proposed method, which achieves significant improvement compared to other well-known k-modes-type algorithms in terms of clustering accuracy.
Large Spaceborne Deployable Antennas (LSDAs)-A Comprehensive Summary
DUAN Baoyan
2020, 29(1): 1-15.   doi: 10.1049/cje.2019.09.001
[Abstract](309) [PDF 4261KB](82)
This paper provides a survey of research activities of Large spaceborne deployable antennas (LSDAs) in the past, present and future. Firstly, three main kinds of spaceborne antennas, such as solid reflector, inflatable reflector and mesh reflector, are issued by showing the strengths and weaknesses. Secondly, a detailed research situation of LSDAs with mesh is discussed, for majority of the in-orbit large diameter and high frequency antennas are made in this type of structures. Thirdly, new conception of antenna is proposed as it does have both advantages of large aperture (high gain) and high precision (high frequency). Fourthly, the design theory and approach of LSDAs are concerned. It includes thermal-electromechanical multidisciplinary optimization, shaped beam design technique, performance testing technology and evaluation method, passive intermodulation of mesh, and application of new materials. Finally, the ultra large spaceborne deployable antennas of the next generation are presented, such as the deployable frame and inflatable reflector antennas, space-assembled ultra large antennas, smart array antennas and so on.

Review Articles

A Review of FPGA-Based Custom Computing Architecture for Convolutional Neural Network Inference
PENG Xiyuan, YU Jinxiang, YAO Bowen, et al.
2021, 30(1): 1-17.   doi: 10.1049/cje.2020.11.002
Abstract(43) HTML(20) PDF(9)
Deep Learning and Its Application in Diabetic Retinopathy Screening
ZOU Beiji, SHAN Xi, ZHU Chengzhang, et al.
2020, 29(6): 992-1000.   doi: 10.1049/cje.2020.09.001
Abstract(50) PDF(330)
Research and Application of Machine Learning in Automatic Program Generation
ZHANG Xiaojiang, JIANG Ying
2020, 29(6): 1001-1015.   doi: 10.1049/cje.2020.10.006
Abstract(74) PDF(242)
Transparent Computing: Development and Current Status
ZHANG Yaoxue, DUAN Sijing, ZHANG Deyu, et al.
2020, 29(5): 793-811.   doi: 10.1049/cje.2020.07.001
Abstract(273) PDF(460)
The Principle and Progress of Dynamically Reconfigurable Computing Technologies
WEI Shaojun, LU Yan'an
2020, 29(4): 595-607.   doi: 10.1049/cje.2020.05.002
Abstract(195) PDF(539)
Spatial Sound—History, Principle, Progress and Challenge
XIE Bosun
2020, 29(3): 397-416.   doi: 10.1049/cje.2020.02.016
Abstract(86) PDF(476)
Review on the Technological Development and Application of UAV Systems
FAN Bangkui, LI Yun, ZHANG Ruiyu, et al.
2020, 29(2): 199-207.   doi: 10.1049/cje.2019.12.006
Abstract(40) PDF(543)
Survey of Performance Evaluation Standardization and Research Methods on GNSS-Based Localization for Railways
CAI Baigen, WU Boqian, LU Debiao
2020, 29(1): 22-33.   doi: 10.1049/cje.2019.09.003
Abstract(20) PDF(855)