Search For:

Displaying 1-18 out of 18 total
Survey, Analysis and Re-evaluation -- How Efficient and Secure a Mix Network Can Be
Found in: Computer and Information Technology, International Conference on
By Kun Peng
Issue Date:September 2011
pp. 249-254
The recent shuffling schemes usually claim strong security and much higher efficiency than their predecessors. In this paper, it is illustrated that some of them are not so secure as they claim. Some of them are incomplete in correctness and may fail even ...
 
Self-Calibration of Catadioptric Camera with Two Planar Mirrors from Silhouettes
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Xianghua Ying, Kun Peng, Yongbo Hou, Sheng Guan, Jing Kong, Hongbin Zha
Issue Date:May 2013
pp. 1206-1220
If an object is interreflected between two planar mirrors, we may take an image containing both the object and its multiple reflections, i.e., simultaneously imaging multiple views of an object by a single pinhole camera. This paper emphasizes the problem ...
 
Investigation and Survey of Secret Sharing in Verifiable Distributed Systems
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Kun Peng
Issue Date:October 2011
pp. 342-347
The two most recent PVSS (publicly verifiable secret sharing) schemes are illustrated to be vulnerable to a simple attack. Moreover, one of them has to deteriorate its efficiency greatly to meet practical security requirement. The attack makes the share ho...
 
Secure E-Commerce Based on Distributed Processing
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Kun Peng
Issue Date:October 2011
pp. 406-411
A new secret-sharing-based e-auction scheme is proposed. Distributed bid opening is employed to protect bid privacy. It can achieve all the desired properties for sealed-bid auctions at a reasonable cost. Moreover, attacks existing in the current secret-sh...
 
Analysing a Batch Range Proof to Address a Security Concern
Found in: Computational Science and Engineering, IEEE International Conference on
By Kun Peng,Feng Bao
Issue Date:August 2011
pp. 68-72
In Africacrypt 2010, Peng and Bao propose a batch proof and verification technique and apply it to design efficient range proof with practical small ranges. Their range proof employs a batch proof and verification technique by Chida and Yamamoto. We show t...
 
A GIS Based Service-Oriented Power Grid Intelligent Planning System
Found in: Asia-Pacific Power and Energy Engineering Conference
By Jiong Yan, Kun-Peng Zhou, Chang-Hong Deng, Jun-Chang Huang
Issue Date:March 2011
pp. 1-4
NA
 
Improving Applicability, Efficiency and Security of Non-Membership Proof
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Kun Peng, Feng Bao
Issue Date:September 2010
pp. 39-44
Two new non-membership proof protocols are proposed in this paper, which prove that a committed message is not in a finite set. They are concrete proof protocols rather than abstract principles. The first is a completely general non-membership proof suitab...
 
Efficient Proof of Validity of Votes in Homomorphic E-Voting
Found in: Network and System Security, International Conference on
By Kun Peng, Feng Bao
Issue Date:September 2010
pp. 17-23
A special membership proof technique is applied to the efficiency bottleneck of homomorphic e-voting, vote validity check. Although the special membership proof technique has some limitations such that so far few appropriate applications have been found fo...
 
Single View Metrology Along Orthogonal Directions
Found in: Pattern Recognition, International Conference on
By Kun Peng, Lulu Hou, Ren Ren, Xianghua Ying, Hongbin Zha
Issue Date:August 2010
pp. 1658-1661
In this paper, we describe how 3D metric measurements can be determined from a single uncalibrated image, when only minimal geometric information are available in the image. The minimal information just is orthogonal vanishing points. Given such limited in...
 
An Efficient Range Proof Scheme
Found in: Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, 2010 IEEE International Conference on
By Kun Peng, Feng Bao
Issue Date:August 2010
pp. 826-833
No summary available.
 
A Shuffling Scheme with Strict and Strong Security
Found in: Emerging Security Information, Systems, and Technologies, The International Conference on
By Kun Peng, Feng Bao
Issue Date:July 2010
pp. 201-206
In this paper, it is pointed out that security of no existing shuffling scheme is strong enough for their supposed applications. For example, some of them are not always correct. Especially, their soundness and privacy depend on hardness of certain mathema...
 
Geometric properties of multiple reflections in catadioptric camera with two planar mirrors
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Xianghua Ying, Kun Peng, Ren Ren, Hongbin Zha
Issue Date:June 2010
pp. 1126-1132
A catadioptric system consisting of a pinhole camera and two planar mirrors is deeply investigated in this paper. The two mirrors combine to form a corner and face-to-face with the pinhole. Their relative pose is unknown. An object will be reflected in the...
 
Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property
Found in: Computer and Information Technology, International Conference on
By Kun Peng, Feng Bao
Issue Date:July 2010
pp. 1044-1049
Membership proof shows that a secret committed message is in a finite set. In this paper, a general, flexible, universally verifiable and efficient solution to membership proof is proposed. It overcomes the drawbacks of the existing membership proof scheme...
 
Study on the Turntable Hydraulic Variable Structure Control Based on Lyapunov Theory
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Tian-hua Chen, Pei-yuan Guo, Zai-wen Liu, Kun-Peng Wang
Issue Date:April 2009
pp. 140-143
This paper studies the basic structure and principles of the three degrees of the freedom turntable system, and establishes its mathematical model. It describes the design theory and procedures of the variable structure control system, presents a new desig...
 
A novel scheme of face verification using active appearance models
Found in: Advanced Video and Signal Based Surveillance, IEEE Conference on
By Kun Peng, Liming Chen, Su Ruan
Issue Date:September 2005
pp. 247-252
Face verification and face identification are two main applications for face recognition. Based on the face representation which they use, the current image-based face recognition techniques can be roughly classified into two groups: appearance-based metho...
 
Simulation and Experimental Studies on Similar Material of Rockmass
Found in: Modelling, Simulation and Optimization, International Workshop on
By Chang-long Wang, Yan-ming Qi, Kun-peng Zhang
Issue Date:December 2008
pp. 355-359
Model experimental basis is similar theory, that is similar to model and prototype, model can reflect situation of the prototype. Based on similar theory, adopting similar similar material of cement-gypsum to make model, its Brittle is close to rock, elast...
 
Batch zero-knowledge proof and verification and its applications
Found in: ACM Transactions on Information and System Security (TISSEC)
By Colin Boyd, Ed Dawson, Kun Peng
Issue Date:May 2007
pp. 6-es
The batch verification technique of Bellare et al. is extended to verification of several frequently employed zero-knowledge proofs. The new techniques are correct, sound, efficient, and can be widely applied. Specific applications are discussed in detail,...
     
A New Operational Tests Circuit for Testing ±660kV UHVDC Thyristor Valves
Found in: Electrical and Control Engineering, International Conference on
By Ting Xie, Tang Guang-fu, Zha Kun-peng, Gao Chong
Issue Date:June 2010
pp. 3177-3180
Operational test is an important measure which can guarantee safe and stable operation of UHVDC thyristor valves. HVDC thyristor modules can be performed either in a six-pulse back-to-back test circuit or in a synthetic test circuit. UHVDC thyristor valves...
 
 1