{"title":"PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings","authors":"Hongchen Guo;Weilin Gan;Mingyang Zhao;Chuan Zhang;Tong Wu;Liehuang Zhu;Jingfeng Xue","doi":"10.23919/cje.2023.00.305","DOIUrl":"https://doi.org/10.23919/cje.2023.00.305","url":null,"abstract":"Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data redaction. However, the development of redactable blockchain is now obstructed by three limitations, which are data privacy breaches, high communication overhead, and low searching efficiency, respectively. In this paper, we propose PriChain, the first efficient privacy-preserving fine-grained redactable blockchain in decentralized settings. PriChain provides data owners with rights to control who can read and redact on-chain data while maintaining downward compatibility, ensuring the one who can redact will be able to read. Specifically, inspired by the concept of multi-authority attribute-based encryption, we utilize the isomorphism of the access control tree, realizing fine-grained redaction mechanism, downward compatibility, and collusion resistance. With the newly designed structure, PriChain can realize <tex>$mathcal{O}(n)$</tex> communication and storage overhead compared to prior <tex>$mathcal{O}(n^{2})$</tex> schemes. Furthermore, we integrate multiple access trees into a tree-based dictionary, optimizing searching efficiency. Theoretical analysis proves that PriChain is secure against the chosen-plaintext attack and has competitive complexity. The experimental evaluations show that PriChain realizes <tex>$10times$</tex> efficiency improvement of searching and <tex>$100times$</tex> lower communication and storage overhead on average compared with existing schemes.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"82-97"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891990","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear Forgery Attacks on the Authenticated Encryption Cipher ACORN-Like","authors":"Yunqiang Li;Ting Cui","doi":"10.23919/cje.2023.00.016","DOIUrl":"https://doi.org/10.23919/cje.2023.00.016","url":null,"abstract":"The authenticated encryption stream cipher ACORN is one of the finalists of the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) and is intended for lightweight applications. Because of structural weaknesses in the state update function of ACORN, we can introduce a linear function to analyze conditions and differential trails of the state collision and present a linear method to construct forgery messages under the condition that the key and initialization vector are known or the register state at a certain time is known. The attack method is suitable for three versions of ACORN and may be also extended to any ACORN-like, of which the linear feedback shift register (LFSR) can be replaced by other LFSRs and the feedback function can be replaced by other nonlinear functions. For continuous <tex>$l(l > 293)$</tex> bits of new input data, we can construct <tex>$2^{l-294}$</tex> forgery messages for any given message of ACORN. Using a standard personal computer, a concrete forgery message can be constructed almost instantly and the required central processing unit time and memory are equivalent to the required resources for solving a system of 293 linear equations over the binary field. These attacks in this paper make that the sender and receiver may easily cheat each other, which is not a desirable property for an ideal cipher and casts some doubt on the necessary authentication security requirements of ACORN.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"257-265"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891972","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhengyu Zhang;Ruisi He;Mi Yang;Xuejian Zhang;Ziyi Qi;Hang Mi;Guiqi Sun;Jingya Yang;Bo Ai
{"title":"Non-Stationarity Characteristics in Dynamic Vehicular ISAC Channels at 28 GHz","authors":"Zhengyu Zhang;Ruisi He;Mi Yang;Xuejian Zhang;Ziyi Qi;Hang Mi;Guiqi Sun;Jingya Yang;Bo Ai","doi":"10.23919/cje.2024.00.003","DOIUrl":"https://doi.org/10.23919/cje.2024.00.003","url":null,"abstract":"Integrated sensing and communications (ISAC) is a potential technology of 6G, aiming to enable end-to-end information processing ability and native perception capability for future communication systems. As an important part of the ISAC application scenarios, ISAC aided vehicle-to-everything (V2X) can improve the traffic efficiency and safety through intercommunication and synchronous perception. It is necessary to carry out measurement, characterization, and modeling for vehicular ISAC channels as the basic theoretical support for system design. In this paper, dynamic vehicular ISAC channel measurements at 28 GHz are carried out and provide data for the characterization of non-stationarity characteristics. Based on the actual measurements, this paper analyzes the time-varying PDPs, RMSDS and non-stationarity characteristics of front, lower front, left and right perception directions in a complicated V2X scenarios. The research in this paper can enrich the investigation of vehicular ISAC channels and enable the analysis and design of vehicular ISAC systems.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"73-81"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891984","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Object Detection and Combination Clustering for Railway Switch Machine Gap Detection","authors":"Qingsheng Feng;Shuai Xiao;Wangyang Liu;Hong Li","doi":"10.23919/cje.2023.00.268","DOIUrl":"https://doi.org/10.23919/cje.2023.00.268","url":null,"abstract":"Turnouts and switch machines play a crucial role in facilitating train line operations and establishing routes, making them vital for ensuring the safety and efficiency of railway transportation. Through the gap detection system of switch machines, the real-time working status of turnouts and switch machines on railway sites can be quickly known. However, due to the challenging working environment and demanding conversion tasks of switch machines, the current gap detection system has often experienced the issues of fault detection. To address this, this study proposes an automatic gap detection method for railway switch machines based on object detection and combination clustering. Firstly, a lightweight object detection network, specifically the MobileNet V3-YOLOv5s model, is used to accurately locate and extract the focal area. Subsequently, the extracted image undergoes preprocessing and is then fed into a combination clustering algorithm to achieve precise segmentation of the gap area and background, the algorithm consists of simple linear iterative clustering, Canopy and kernel fuzzy c-means clustering. Finally, the Fisher optimal segmentation criterion is utilized to divide the data sequence of pixel values, determine the classification nodes and calculate the gap size. The experimental results obtained from switch machine gap images captured in various scenes demonstrate that the proposed method is capable of accurately locating focal areas, efficiently completing gap image segmentation with a segmentation accuracy of 93.55%, and swiftly calculating the gap size with a correct rate of 98.57%. Notably, the method achieves precise detection of gap sizes even after slight deflection of the acquisition camera, aligning it more closely with the actual conditions encountered on railway sites.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"186-203"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891988","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuanyuan Wang;Xing Zhang;Zhiguang Chu;Wei Shi;Xiang Li
{"title":"An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs","authors":"Yuanyuan Wang;Xing Zhang;Zhiguang Chu;Wei Shi;Xiang Li","doi":"10.23919/cje.2023.00.276","DOIUrl":"https://doi.org/10.23919/cje.2023.00.276","url":null,"abstract":"As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highly challenging problem. Although current research has addressed the issue of identity disclosure, there are still two challenges: First, the privacy protection for large-scale datasets is not yet comprehensive; Second, it is difficult to simultaneously protect the privacy of nodes, edges, and attributes in social networks. To address these issues, this paper proposes a <tex>$(k, t)$</tex>-graph anonymity algorithm based on enhanced clustering. The algorithm uses <tex>$k$</tex>-means++ clustering for <tex>$k$</tex>-anonymity and <tex>$t$</tex>-closeness to improve <tex>$k$</tex>-anonymity. We evaluate the privacy and efficiency of this method on two datasets and achieved good results. This research is of great significance for addressing the problem of privacy breaches that may arise from the publication of graph data.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"365-372"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891996","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143446298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antenna Selection Method for Distributed Dual-Function Radar Communication in MIMO System","authors":"Haitao Zhao;Zhongzheng Ding;Qin Wang;Wenchao Xia;Bo xu;Hongbo Zhu","doi":"10.23919/cje.2023.00.270","DOIUrl":"https://doi.org/10.23919/cje.2023.00.270","url":null,"abstract":"Distributed dual-function radar system is an emerging trend in next-generation wireless systems, offering the possibility of improved parameter estimation for target localization as well as improved communication performance. With sufficient resource allocation, the achievable minimum estimated mean square error (MSE) and maximum total communication rate of localization may exceed the intended performance metrics of the system, which may consume an excessive number of antennas as well as antenna costs. In order to avoid resource wastage, this paper proposes a distributed dual-function radar communication multiple-input multiple-output (MIMO) system capable of performing radar and communication tasks simultaneously. The distributed system achieves the desired MSE performance metrics and communication performance metrics by efficiently selecting a subset of antennas, and minimizing the number of transmitting antennas and receiving antennas used in the system as well as the cost. In this paper, the problem is modeled as a knapsack problem where the objective is to obtain the maximal MSE performance and the maximal total communication rate performance at the lowest cost, for which we design a heuristic antenna selection algorithm. The designed algorithm is effective in reducing the time complexity as well as reducing the cost of antenna, and minimizing the number of antennas required.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"165-175"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891981","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"14-Bit SAR ADC with On-Chip Digital Bubble Sorting Calibration Technology","authors":"Hua Fan;Zhuorui Chen;Tongrui Xu;Franco Maloberti;Qi Wei;Quanyuan Feng","doi":"10.23919/cje.2023.00.307","DOIUrl":"https://doi.org/10.23919/cje.2023.00.307","url":null,"abstract":"This article designs a 14-bit successive approximation register analog-to-digital converter (SAR ADC). A novel digital bubble sorting calibration method is proposed and applied to eliminate the effect of capacitor mismatch on the linearity of the SAR ADC. To reduce the number of capacitors, a hybrid architecture of a high 8-bit binary-weighted capacitor array and a low 6-bit resistor array is adopted by the digital-to-analog (DAC). The common-mode voltage <tex>$V_{text{CM}}$</tex>-based switching scheme is chosen to reduce the switching energy and area of the DAC. The time-domain comparator is employed to obtain lower power consumption. Sampling is performed through a gate voltage bootstrapped switch to reduce the nonlinear errors introduced when sampling the input signal. Moreover, the SAR logic and the whole calibration is totally implemented on-chip through digital integrated circuit (IC) tools such as design compiler, IC compiler, etc. Finally, a prototype is designed and implemented using 0.18 μm bipolar-complementary metal oxide semiconductor (CMOS)-double-diffused MOS 1.8 V CMOS technology. The measurement results show that the SAR ADC with on-chip bubble sorting calibration method achieves the signal-to-noise-and-distortion ratio of 69.75 dB and the spurious-free dynamic range of 83.77 dB.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"125-136"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891969","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds","authors":"Yuhang Qiu;Gongming Zhao;Hongli Xu;Long Li;He Huang;Liusheng Huang","doi":"10.23919/cje.2023.00.387","DOIUrl":"https://doi.org/10.23919/cje.2023.00.387","url":null,"abstract":"The virtual private cloud service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessive communication and computational resources in such large-scale cloud environments, and suffer from poor timeliness. To address these issues, we propose a lightweight consistency validation mechanism that includes real-time incremental validation and periodic full-scale validation. The former leverages message layer aggregation to enable tenants to swiftly determine the success of their requests on hosts with minimal communication overhead. The latter utilizes lightweight validation checksums to compare the expected and actual states of hosts locally, while efficiently managing the checksums of various host entries using inverted indexing. This approach enables us to efficiently validate the complete local configurations within the limited memory of hosts. In summary, our proposed mechanism achieves closed-loop implementation for new requests and ensures their long-term effectiveness.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"49-63"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891985","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Terahertz Solid-State Electronic/Optoelectronic Devices and Communication Systems","authors":"Wenbo Li;Hongxin Zeng;Lin Huang;Sen Gong;Haoyi Cao;Weipeng Wang;Zheng Wang;Hongji Zhou;Shixiong Liang;Ziqiang Yang;Yaxin Zhang","doi":"10.23919/cje.2023.00.282","DOIUrl":"https://doi.org/10.23919/cje.2023.00.282","url":null,"abstract":"With the rapid development of modern communication technology, spectrum resources have become non-renewable and precious resources, and the terahertz frequency band has entered people's vision. Nowadays, terahertz communication technology has become one of the core technologies for future high-capacity and high-rate communication. This paper discusses and analyzes the core technologies related to the field of terahertz communication. We introduce the characteristics, domestic and international comparisons and development trends of the core devices for terahertz communication, and also introduce and discuss the terahertz solid-state frequency mixing communication system, terahertz direct modulation communication system, and terahertz optoelectronic communication system. Finally, we summarize the development of terahertz communication technology and the outlook of future applications.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"26-48"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891986","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Helmet Detection Algorithm Based on Transformers with Deformable Attention Module","authors":"Songle Chen;Hongbo Sun;Yuxin Wu;Lei Shang;Xiukai Ruan","doi":"10.23919/cje.2023.00.346","DOIUrl":"https://doi.org/10.23919/cje.2023.00.346","url":null,"abstract":"Wearing a helmet is one of the effective measures to protect workers' safety. To address the challenges of severe occlusion, multi-scale, and small target issues in helmet detection, this paper proposes a helmet detection algorithm based on deformable attention transformers. The main contributions of this paper are as follows. A compact end-to-end network architecture for safety helmet detection based on transformers is proposed. It cancels the computationally intensive transformer encoder module in the existing detection transformer (DETR) and uses the transformer decoder module directly on the output of feature extraction for query decoding, which effectively improves the efficiency of helmet detection. A novel feature extraction network named Swin transformer with deformable attention module (DSwin transformer) is proposed. By sparse cross-window attention, it enhances the contextual awareness of multi-scale features extracted by Swin transformer, and keeps high computational efficiency simultaneously. The proposed method generates the query reference points and query embeddings based on the joint prediction probabilities, and selects an appropriate number of decoding feature maps and sparse sampling points for query decoding, which further enhance the inference capability and processing speed. On the benchmark safety-helmet-wearing-dataset (SHWD), the proposed method achieves the average detection accuracy mAP@0.5 of 95.4% with 133.35G floating-point operations per second (FLOPs) and 20 frames per second (FPS), the state-of-the-art method for safety helmet detection.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 1","pages":"229-241"},"PeriodicalIF":1.6,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891976","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143438468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}