Loading...
Office

Table of Content

    20 February 2004 Volume 31 Issue 1
      
    Original Articles

    Hierarchical semi-frigile watermarking based on the reconstruction of DCT coefficients

    GUO Bao-long;ZHANG Yong-ping;GUO Lei
    J4. 2004, 31(1):  1-5. 
    Abstract ( 1497 )   Save
    Related Articles | Metrics
    Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity becomes a major issue. In this paper, a new semi-fragile watermarking algorithm, claaed HSFW, is presented. Using a hierarchical structure and the idea of multi-resolution, HSFW can avoid the vector quantization (VQ) counterfeiting attack and identify the positions of corrupted blocks under different resolutions without the source image. By the reconstruction of DCT coefficient, HSFW can accept JPEG lossy compression on the watermarked image to a pre-determined quality factor, and reject malicious attacks. The experimental results show its effectiveness in protecting the content-integrity of images.

    The infrared image enhancement and the correlative technique based on the parallel genetic algorithm

    GUO Run-qiu;LI Jun-feng;LIN Xiao-chun
    J4. 2004, 31(1):  6-8. 
    Abstract ( 2265 )   Save
    Related Articles | Metrics
    A new method for infrared image enhancement using the improved genetic algorithm is proposed. First the relation between gray levels for the input and output images is coded, and then the most effective relation of the effect is searched for by using a certain evaluation standard for the image quality. In order to improve the efficiency of the genetic algorithm, a calculation model based on the multi-threadlike parallel genetic algorithm is designed. The results of a large number of he simulation experiments show that the algorithm has good feasibility and effectiveness.

    Research on optimal scheduling of hybrid production processes

    NIU Hai-jun1;MA Jian-hui2;Miao Wei-ping3
    J4. 2004, 31(1):  9-12. 
    Abstract ( 1598 )   Save
    Related Articles | Metrics
    We study the optimal scheduling method for hybrid production systems. Based on hierarchical modeling, we use the heuristics branch and bound algorithm to optimize scheduling. The objective is to minimize the production cost. According to the condition of production we have developed 5 rules, with two B&B algorithms structured. The cost includes not only the order and start time of production, but also the inventory cost.

    The process capability index analysis of non-normal distribution parameters

    JIA Xin-zhang;SONG Jun-jian;PU Jian-bin
    J4. 2004, 31(1):  13-154. 
    Abstract ( 1374 )   Save
    Related Articles | Metrics
    Using the traditional method to calculate the process capability index Cpk of the non-normal distribution parameters appearing in semiconductor device production will result in wrong conclusion. A new method is suggested and a software program is developed for calculation the Cpk and yield of non-normal distribution parameters at the PPM level.

    The design of 32×32-b multiplier

    LUAN Yu-xia;LI Cun-zhi
    J4. 2004, 31(1):  16-20. 
    Abstract ( 1409 )   Save
    Related Articles | Metrics
    The design of a 32×32-b multiplier by using a modified Carry-Select Adder, a 4-2 compressor, and a 4 Booth encoder is presented. The description of the multiplier in Verilog is simulated on Active-HDL 5.1, which shows that the design has advantages over some others in layout and frequency.

    Image information fusion and synthesis display of medical images

    NA Yan;YANG Wan-hai;LI Yong-zhao
    J4. 2004, 31(1):  21-24. 
    Abstract ( 1717 )   Save
    Related Articles | Metrics
    A new CT and NMR medical image fusion method is described. According to the expected fusion results, a new wavelet transform-based maximum-chosen fusion method is presented after a detailed analysis of the basic imaging principles of CT and NMR. The wavelet transform of teh matched CT and NMR are taken first, and then a combined wavelet coefficient is obtained after comparing the same scale wavelet coefficients of CT and NMR and choosing the largest one. The fusion image can be obtained after making the inverse wavelet transform of the combined wavelet coefficient. The image obtained clearly displays the bone and soft tissues in one image.

    A secret sharing RSA digital signature scheme based on the vector space access structure

    XU Chun-xiang;FU Xiao-tong;XIAO Guo-zhen
    J4. 2004, 31(1):  25-275. 
    Abstract ( 1824 )   Save
    Related Articles | Metrics
    A new digital signature scheme, i.e., the secret sharing RSA digital signature scheme based on the vector space access structure, is proposed, which includes the threshold RSA signature scheme as a particular case. In this scheme, the vector space secret sharing scheme is established in a finite ring, so that N participants share the secret in the RSA signature shceme. This scheme can assure that the group signature can be easily produced by the cooperation of the participants in an authorized subset in the vector space access structure Γ and it is impossible for them to generate a group signature by the cooperation of the participants in an unauthorized subset. Compared with the existing schemes, this scheme does not require inversion operations, and thus can find wide applications.

    The calculation of thermal radiaiton distortion for large deployable antennas in satellites

    ZHU Min-bo;CAO Feng-yun;LIU Ming-zhi;HE En
    J4. 2004, 31(1):  28-31. 
    Abstract ( 1499 )   Save
    Related Articles | Metrics
    Thermal analysis is a key technique in designing the antenna in a satellite. We use the finite-element method to calculate the large unfold antenna structure's temperature distribution and thermal distortion, and study the influence of the basic structure's parameters on the distortion of the antenna. The result of calculation will be beneficial to antenna design and th control of the antenna's temperature.

    New design method for the optimal energy delay product of FPGA based on the interconnect

    MA Qun-gang;YANG Yin-tang;LI Yue-jin
    J4. 2004, 31(1):  32-35. 
    Abstract ( 1672 )   Save
    Related Articles | Metrics
    With the segmentation structure and low-swing circuit of the integrated circuit interconnect, an optimal design method is developed for efficiently solving the challenge of the FPGA energy delay product. OPtimizing the segmentation number of the FPGA interconnect with transmission line effects, the driving unit and receiving unit of the low-swing circuit are respectively connected to the input and output of the interconnect, and optimal size repeaters are inserted in the segmented interconnect. Both theoretical and experimental results show that the improvement of the FPGA energy delay product with this new technique is about an order of magnitude when compared to existing commerical architectures while keeping the good area performance of FPGA.

    The anti-cheating property of the Asmuth-Bloom secret sharing system

    MA Wen-ping;REN Ya-an
    J4. 2004, 31(1):  36-38. 
    Abstract ( 1330 )   Save
    Related Articles | Metrics
    Martin Tompa and Heather Woll demonstrated that Shamir's Scheme is not secure against cheating and this attack is called Tompa-Woll attack. In this paper, we show that the Asmuth-Bloom's System is also not secure against strong cheating. A little modification of this scheme retains the security and efficiency of the original scheme and is secure against strong cheating.

    Output feedback control of the nonlinear various structure unctertain system: its application to fuzzy adaption

    BO Hong1;DUAN Bao-yan1;YAN Li2
    J4. 2004, 31(1):  39-42. 
    Abstract ( 1805 )   Save
    Related Articles | Metrics
    By considering the special characteristics of an unknown disturbance and an unknown plant of single-input/output nonlinear variable structure systems, based on the fuzzy adaptive controller, a new method with the projection function for controlling the variable structure is presented. ecause the method can track satisfactorily all types of state of a class of uncertain variable structure systems, it can extend the nonlinear state error feedback control law(NLSEF) and auto disturbance rejection controller(ADRC) application field. Furthermore, the proof of the stability of the method is made mathematically. Finally, three examples are given to demonstrate the method.

    Relationship between performance and structural parameters of a metering pump with an adjustable stroke

    LI Tuan-jie;CAO Yan;ZHOU Xiao-yong
    J4. 2004, 31(1):  43-46. 
    Abstract ( 1284 )   Save
    Related Articles | Metrics
    A multi-bar mechanism with an adjustable stroke applied to metering pumps is presentedd. The analytical kinematic model is established. The output capability of metering pumps is studied with different stuctural parameters. The relationship between performance and different choices of structural parameters is revealed, thus providing the theoretical basis for the design and control of metering pumps. The research results indicate that the stroke length of a piston is varied by adjusting the length of the control links, and the requirement i satisfied that it allows the piston stroke to be adjusted in length and permits the pump flow to be changed during the pump functioning.

    Design and implementation of a software quality evaluation system based on ISO/IEC 9126

    YANG Zong-kui1;2;ZHOU Jin-hui1;2;LIU Xia2;WANG Qing2
    J4. 2004, 31(1):  47-53. 
    Abstract ( 1559 )   Save
    Related Articles | Metrics
    The software quality evaluation is significant for the improvement of software progress and the control of software quality. In order to obtain the quantitative and objective evaluation result of software quality, this paper presents a system framework for software quality evaluation based on the international standards of ISO/IEC 9126 and the implementation method of the system. The implementation covers an overall software lifecycle and is driven by the user's quality goals. According to the quality goals, the evaluators can select suitable indicators to start the evaluation. At the same time, the results of the evaluation are useful for the improvement of software progress.

    A unified percolation model for gate oxide breakdown

    MA Zhong-fa;ZHUANG Yi-qi;DU Lei;BAO Jun-lin;WAN Chang-xing;LI Wei-hua
    J4. 2004, 31(1):  54-58. 
    Abstract ( 1579 )   Save
    Related Articles | Metrics
    Based on the Percolation theory and defects creation mechanisms of bothe E model and 1/E model, a unified percolation model for gate oxide breakdown is brought forward. The trigging mechanism of gate oxide breakdown is believed to be the extending of the localized states induced by the defects such as oxygen vacancy in an oxide. The defect creation dynamics such as oxygen vacancy is described synthetically. As a result, the results of this model both in a high electric field and in a low electric field fit well with the experimental data. So, the long-existing dipute between 1/E and E models is settled.

    Characteristics of the Ni/4H-SiC Schottky barrier diode at high temperatures

    WANG Yue-hu;ZHANG Yi-men;ZHANG Yu-ming;CHEN Rui-biao;WANG Lei;ZHOU Yong-hua
    J4. 2004, 31(1):  63-667. 
    Abstract ( 2387 )   Save
    Related Articles | Metrics
    The I-V characteristics of the Ni/4H-SiC Schottky Barrier Diode(SBD) are measured first in the temperature range from 297K to 677K. The diode shows an excellent forward I-V characteristic. The devices present a behavior in accordance with the thermionic emission theory in the forward bias. The temperature influences obviously the forward characteristic of the SBD. The influence on the reverse current is small in the range of the applied voltages of less than 30V. The ideal factor n ranges from 1.165 to 1.872, the Barrier height ranges from 0.916 to 2.117eV, and the threshold voltage is 0.5V.

    The correctional Square-6 attack

    WEI Bao-dian;LIU Dong-su;WANG Xin-mei
    J4. 2004, 31(1):  67-71. 
    Abstract ( 1384 )   Save
    Related Articles | Metrics
    The Square-6 attack was once thought to be one of the most effective attacks against the AES algorithm Rijndael of six rounds. It was performed with a time complexity of 272 by means of applying a Square-5 attack to a Λ set that contains an active byte. The Λ set was constructed by guessing four bytes of the initial round key. We point out in this paper that no proper Λ set can be built in the Square-6 attack and therefore the overall attack will fail without doubt. Based on the technique of the partial sums, a correctional Square-6 attack independent of the initial round key is described. The time complexity of the correctional attack is 250.

    Estimation of the operation range of the active laser surveillance

    ZHAO Ming-jun1;2;HU Yong-zhao1;2;ZENG Xiao-dong1
    J4. 2004, 31(1):  72-75. 
    Abstract ( 1454 )   Save
    Related Articles | Metrics
    The principle of the active laser surveillance is based on the cat's eye effects of optical systems. The retrodirective reflection of the optical systems against the incident laser is introduced and the laser ranging equation of the targets which have such effects is derived in detail in this paper. The limis to the surveillance range are discussed in two types of backgrounds: the large size targets with diffuse reflection characteristics on the ground and the small size targets with diffuse reflection characteristics in the air. The conclusion is proved by the experimental analysis.

    A novel genetic algorithm based on the quantum chromosome

    YANG Shu-yuan1;2;LIU Fang3;JIAO Li-cheng1;2
    J4. 2004, 31(1):  76-81. 
    Abstract ( 1729 )   Save
    Related Articles | Metrics
    The genetic algorithm is an efficient optimization tool for its independence of problems, intrinsic parallelism and inherent learning capacity; however, it has some disadvantages such as slow convergence and prematurity. In this paper, a novel algorithm, called the quantum genetic alrogithm--QGA, is proposed based on the combination of the quantum theory with the evolutionary theory. By adopting the qubit chromosome as a representation, QGA can represent a linear superposition of solutions due to its probabilistic representation. The random observation simulating the quantum collapse can bring diverse individuals, and the evolution of quantum chromosome can also pilot the evolution. So it has better diversity than the classical genetic algorithm. Rapid convergence and good global search capacity characterize the performance of QGA. The paper not only proves the global convergence of the QGA, but also some simulation experiments are shown to prove its superiority over other algorithms.

    Application of wavelet analysis in medical image fusion

    TAO Guan-qun1;LI Da-peng2;LU Guang-hua1
    J4. 2004, 31(1):  82-86. 
    Abstract ( 1586 )   Save
    Related Articles | Metrics
    In practical clinic applications, the 3D reconstrution of the single-modality medical image(CT, MRI) can not provide enough information for clinical doctors. Because of a different imaging mechanism and highly complexity of body tissues and structures, different modality medical images provide non-overlay complementary information. Fusion rules of maximum, local gradient and area energy based on wavelet transform are advanced. Compared fusion results of CT and MRI images are gien, which show the proposed method based on the area energy fusion rule can achieve better fusion performance than other usual fusion rules. The fusion image can combine the merits of two original images, providing not only the exact orientation reference of pathological changes but also the clear pathological tissue.

    Research on the protocol of the subliminal-free channel in digital signatures

    DONG Qing-kuan;ZHANG Chuan-rong;XIAO Guo-zhen
    J4. 2004, 31(1):  87-90. 
    Abstract ( 1877 )   Save
    Related Articles | Metrics
    Some defects of G.J.Simmons' subliminal-free protocol are discovered during our study. In this paper two narrow-band subliminal channels are given based on the protocol. One is the channel we have constructed based on harmless messages, and the other is the channel constructed by Y.Desmedt based on the component r of ElGamal signature (r,s). Then a sound discussion shows that it is impossible to construct a complete subliminal-free channel in digital signatures. At the same time the lowest transmission efficiency is discussed.

    Application of data fusion in SAR image denoising

    SHENG Guo-fang1;LENG Zhao-xia2;JIAO Li-cheng1
    J4. 2004, 31(1):  91-95. 
    Abstract ( 1882 )   Save
    Related Articles | Metrics
    The CMAP filter based on the statistic feature of SAR image and the filter based on the wavelet transform show different characteristics in the application of SAR image denoising. The CMAP filter can reduce the influence of the speckle better, but the detail of the image in lost greatly. The wavelet transform can keep the detail of the image well, but the effect of reducing the speckle is not good. In this paper, we use the two results of these two filter methods according to a certain fusion rule. The experimental result shows that this method can reduce the influence of the speckle and keep the image detail well.

    Design o space-time block codes with pre-coding

    LI Ying;WANG Xin-mei
    J4. 2004, 31(1):  96-101. 
    Abstract ( 1802 )   Save
    Related Articles | Metrics
    A design method for the space-time block code(STBC) with pre-coding is proposed to utilize both space diversity and time diversity. The constellations are rotated first. Then the L-dimension signal vector a is transformed to a new vector x, which is divided into L/2 sub-vectors. These L/2 sub-vectors are used to construct the signal matrix and transmitted via two antennas one by one. When m receive antennas are fixed, the diversity achieved by the pre-coding STBC in Lm, which is L/2 times that of the traditional methods over quasi-static flat fading channels. Compared with the space-time trellis code(STTC), the Pre-coding STBC has lower complexity without performance deterioration.

    Angular resolution of jammers of the passive monopulse seeker

    XU Song-tao1;2;YANG Shao-quan1
    J4. 2004, 31(1):  102-105. 
    Abstract ( 1550 )   Save
    Related Articles | Metrics
    The angle resolving method of two narrow band Gaussian noise jammers for the passive monopulse seeker is presented. In the case of one jammer within the main beam, the average angle of arrival given by the seeker points in the direction of the jammer. In the case of two jamers within the main beam, the average angle of arrival points at the power centroid. One or two jammers within the main beam can be distinguished by the complex angle. By using the complex angle and clustering analysis, an angle resolving method of two jammers is presented. The method is verified with the results of digital computer simulation.

    Oblivious transfer with extractors

    ZHAO Tie-shan;GE Jian-hua;YANG Bo
    J4. 2004, 31(1):  106-109. 
    Abstract ( 1566 )   Save
    Related Articles | Metrics
    Reductions among oblivious transfers have a long history in cryptography. This paper describes a (2 1)-1-OTk protocol that can be reduced to a single execution of UOT by using privacy amplification with extranctors. An extractor allows to efficiently isolate the randomness of some source into virtually-random bits, using a small number of perfectly-random bits as a catalyst. With extractors, less information is transmitted and the leaked information is at most 2<sup>-n<sup>-1/2-o(1)</sup></sup> bits. The conditions under which the protocol is unconditionally secure are investigated.

    Recent developments of consumer behavior stochastic models

    DU Rong;HU-Qi ying
    J4. 2004, 31(1):  110-114. 
    Abstract ( 1362 )   Save
    Related Articles | Metrics
    This paper makes a survey of recent developments in the area of consumer behavior stochastic modeling. We first outline some basic models including category choice, brand choice, and purchasing incidence models. Then, we formulate in detail some newly extended models for brand choice and purchasing rate, including the negative binomial model and the Markovian model introducing explanory variables, the Markovian model introducing variety seeking, brand choice models considering dynamic consumer preferences and product attributes, the cyclical choice model and the household choice model, bying incidence models introducing explanory variables and consumer heterogeneity, and the comprehensive model integrating brand choice with buying incidence. Furthermore, we analyze the particular characteristics and common natures of teh ablve metioned extended models. After that, we point out the new trends of consumer behavior stochastic models. Finally, we conclude the survey by posing several problems needed to be studied further.

    Effect of the cell culture dish configuration on the millimeter-wave irradiation dose

    ZHAO Jian-xun1;LU De-qiang2
    J4. 2004, 31(1):  115-118. 
    Abstract ( 1762 )   Save
    Related Articles | Metrics
    An analysis is made of the millimeter-wave(MMW) dosimetry in culture dishes used in experiments on MMW biological effects at the cellular level. The finite-difference time-domain(FDTD) technique is employed to compute the MMW power density(PD) irradiated into cells in two culture dishes with typical configurations and the MMW specific absorption rate(SAR) of cells with consideration of the 8mm wavelength. A qualitative analysis as well as quantitative illustrations is carried out for the outcomes. As indicated in the results, distributions of the MMW PD irradiated into cells, the SAR of cells, and experimental results are significantly influenced by culture dish configurations which should be seriously considered in related experiments.

    Compact space-like hypersurfaces with constant scalar curvature in locally symmetric de Sitter space

    SHU Shi-chang1;2;LIU San-yang1
    J4. 2004, 31(1):  119-123. 
    Abstract ( 1367 )   Save
    Related Articles | Metrics
    The compact n dimensional space-like hypersurfaces with constant scalar curvature in locally symmetric de Sitter space Nn+11 are studied, with some rigidity characterization theorems obtained by introducing a self-adjoint operator and by using the moving frame method. As a corollary, the rigidity characterization theorem is obtained on the space-like hypersurfaces in a de Sitter space Sn+11. These results generalize the results of Zheng and Liu, and the pinching constants do not depend on the dimensional n.

    An AKE protocol for mobile networks

    YU Bin-xiao;WANG Xin-mei
    J4. 2004, 31(1):  124-128. 
    Abstract ( 1506 )   Save
    Related Articles | Metrics
    For mobile communication networks, the main security troubles including the authentication of entities, establishment, delivery, and negotiation of conversation keys mostly concentrate on the wireless interface duo to its inherent openness. In this paper, we first propose a new AKE protocol on the basis of research on other alike ones, then analyze its security and other performance and finally discusses some correlative issues about the protocol. As the analysis shows that our protocol has not only higher safety, but more suppleness, better efficiency, low operation times, and better applicability, thus being suitable for mobile use.

    Hedging strategy of a contingent claim as the price of the underlying asset follow jump-diffusion process

    LIU Xuan-hui1;HU Qi-ying2
    J4. 2004, 31(1):  129-134. 
    Abstract ( 1431 )   Save
    Related Articles | Metrics
    The price of underlying assets follows a jump-diffusion process. We introduce the dynamic measure of risk to the incomplete market. We have acquired optimal replication of contingent claim in the auxilizar finance market which is induced by a risk neutral probability measure. With an application clark formula the paper provides the optimal hedging strategy for a contingent claim.

    PKC and chosen ciphertext security

    CHEN Yuan;WANG Yu-min;XIAO Guo-zhen
    J4. 2004, 31(1):  135-139. 
    Abstract ( 1527 )   Save
    Related Articles | Metrics
    Security against the chosen ciphertext attack of PKC is discussed(simply denoted by chosen ciphertext security of IND-CCA2). Some schemes which make general PKCs IND-CCA2 are compared and analyzed, on the basis of which we classify all the present methods which can obtain IND-CCA2 and find a common idea among them, which is the contruction of a test of ciphertext validity. Finally a problem in the IND-CCA2 security proof of OAEP+ is pointed out together with its two solutions.

    A cut-plane algorithm for semidefinite programming and its application

    WANG Xin-hui;LIU San-yang;LIU Hong-wei
    J4. 2004, 31(1):  140-142. 
    Abstract ( 1367 )   Save
    Related Articles | Metrics
    A cut plane algorithm for semidefinite programming is presented in this paper, which relaxs the semidefinite programming to a linear programming, thus solving large scale semidefinite programming effeciently. Its covergence is proved. As an applications, a numerical example of the Max-cut problem is given.

    Theoretical frameworks for KDD based on intelligence

    ZHENG Jian-guo1;2;ZHOU Ming-quan1;GENG Guo-hua1
    J4. 2004, 31(1):  143-147. 
    Abstract ( 1400 )   Save
    Related Articles | Metrics
    Data mining is currently a hot research topic of the knowledge discovery domain. The core components of data mining technology have been under development for decades in research areas such as statistics, artificial intelligence, and machine learning. By analyzing the concept and theory of immunity in life sciences, the theoretical frame of KDD based on intelligence is discussed.

    Euclid algorithm for finding the inverse and generalized inverse of the permutation factor circulant matrix

    JIANG Zhao-lin1;2;LIU San-yang1
    J4. 2004, 31(1):  148-152. 
    Abstract ( 1332 )   Save
    Related Articles | Metrics
    A new algorithm for finding the inverse of a nonsingular permutation factor circulant matrix is presented by teh Euclid algirytm of polynomial. Extension is made to compute the Moore-Penrose inverse of a singular permutation factor circulant matrix. Finally, numerical examples show the effectiveness of the algorithm.

    A dynamic secret sharing scheme to identify cheaters

    HE Ye-feng;ZHANG Jian-zhong
    J4. 2004, 31(1):  153-155. 
    Abstract ( 1633 )   Save
    Related Articles | Metrics
    A dynamic secret sharing scheme based on discrete logarithms is proposed which can detect cheaters. The shadow of every participant can be used by many times without restriction, so that the system secrets can be renewed without renewing the shadows of the participants. The system can also accept a new participant or fire a participant freely. Due to its properties of security and efficiency, the scheme will find wide applications in distributed key escrow and electronic commerce.

    Principle of the reconfiguration expert system for a reconfigurable manufacturing system

    CAI Zong-yan
    J4. 2004, 31(1):  156-160. 
    Abstract ( 1328 )   Save
    Related Articles | Metrics
    The reconfiguration expert system for a reconfigurable manufacturing system is one of the most important technologies that can be used to design a candidate reconfigurable manufacturing system. The principle of a reconfiguration expert system for a reconfigurable manufacturing syste is suggested in this paper. Moreover, the automatic and CBR-based reconfiguration method of the reconfigurable modular machine tool and the reconfiguration method of a reconfigurable manufacturing system, according to a given order form, are brought forward. These reconfiguration methods are primary enabling technologies of a reconfiguration expert system for a reconfigurable manufacturing system.

    An undeniable cryptographic protocol for both the sender and the receiver

    LI Yan-ping;ZHANG Jian-zhong
    J4. 2004, 31(1):  161-164. 
    Abstract ( 1309 )   Save
    Related Articles | Metrics
    We survey the state of non-repudiation cryptographic protocols, almost all of which have weaknesses. The paper proposes a perfect protocol which can be used to realize the strong fairness and non-repudiation of both parties even if the channels are not reliable. Usually the protocol only needs three interactions of participants and the transferring data remain confidential for others but the sender and the receiver, who are unknown to others. The Trusted Third Party(TTP) acts as a notary rather than a delivery and its bottleneck problem is solved completely. Finally the security of the protocol is analysed in detail.