Proceedings of the 8th annual conference on Genetic and evolutionary computation
Dynamic Group Signature with Forward Security and Its Application
GCC '07 Proceedings of the Sixth International Conference on Grid and Cooperative Computing
Evolutionary Algorithm and Its Application in Artificial Immune System
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 03
Threshold Cryptosystem Based Fair Off-Line E-cash
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 03
Bionic evolution based intrusion detection system
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance
IEEE Transactions on Signal Processing
Efficient statistical parallel interference cancellation for DS-CDMA in Rayleigh fading channels
IEEE Transactions on Wireless Communications
Learning and optimization using the clonal selection principle
IEEE Transactions on Evolutionary Computation
Genetically modified multiuser detection for code division multiple access systems
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Combining bionic evolution and e-cash (electronic cash), we present an improved e-cash scheme based on bionic evolution algorithm. In the scheme, the private key for e-cash generating and identity tracing is generated with evolutionary algorithm by a successive optimizing process. The adaptive optimizing of secret parameters with bionic evolution avoids the randomness and indefinite security problem in private key selection, and thus prevents generalized e-cash forgery and coalition attack by dishonest users and other outer adversaries. The optimizing algorithm can also be applied to other essential parameters, such as the private keys of TTP (Trustable Third Party) and e-cash users to further improve the security of ecash. Besides, the optimizing algorithm can be executed in advance without any influence to the efficiency of e-cash scheme. This designing strategy not only reinforces the security and stability of e-cash scheme but also greatly improves the efficiency of software and hardware application.