In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In ...In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements.展开更多
The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a mess...The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient.展开更多
The opening of the economy has contributed to the rapid urban development in China over the last 17 years from 1979 to 1996. It is worthwhile to note three new development trends of Chinese urban system. The first tr...The opening of the economy has contributed to the rapid urban development in China over the last 17 years from 1979 to 1996. It is worthwhile to note three new development trends of Chinese urban system. The first trend identifies the emergence of mega urbanization regions. The second trend rebuilds a closer tie between the Chinese urban system and the global urban system through the development of the world (global) cities and international cities. The third trend shows the fast polarized development in hinterlands and peripheries around advanced economic regions. However, the research literature on Chinese urbanization in English has shown the scarcity of good databanks and the analysis results are incomplete. Some researchers also always question the quality of the data. Using the most completed and most recent data, this paper reviews the growth of China's new designated cities since 1949. This paper also seeks to examine the various policies and to explore the underlying factors that have affected the growth of China new cities. From the development of China's cities in the past 47 years from 1949 to 1996, it is easy to find that metropolitan cities developed with a relatively high rate compared with smaller ones, but the ratio of number and population to whole country cities remained stable; Chinese urban system development had entered a phase of small cities development; in terms of cities regional distribution, the south and east region is still the central area of urban development.展开更多
With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking servic...With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking services.For this reason,a countermeasure is required to improve the security of the online identification process.The current security and authentication mechanisms applied to financial services,such as Internet banking services for 5G-enabled IoT,do not ensure security.In this paper,a transaction-linkage technique with which the designated terminal is combined is proposed to solve this fundamental problem.The technique improves the security of online identification mechanisms because it is possible to counteract all of the existing security threats.The proposed technique supports mutual authentication and is safe from eavesdropping attacks,replay attacks,spoofing attacks,and service-denial attacks.Moreover,the technique supports non-repudiation by storing the transaction history in a transaction-linkage device.We believe that the security of Internet-banking services for 5G-enabled IoT will be increased through the utilization of the proposed technique.展开更多
Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the...Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable.展开更多
Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are lik...Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are likely not aware of the specific types of disaster. So, first of all, we need to know what kind<span style="font-family:;" "="">s</span><span style="font-family:;" "=""> of hazards are important. However, the information that integrates multiple hazards is not well maintained, and there are few such studies. On the other hand, in Japan, a lot of hazard information is being released on the Internet. So, we summarized and assessed hazard data that can be accessed online regarding shelters (where evacuees live during disasters) and their catchments (areas assigned to each shelter) in Yokohama City, Kanagawa Prefecture. Based on the results, we investigated whether a grouping by cluster analysis would allow for multi-hazard assessment. We used four natural disasters (seismic, flood, tsunami, sediment disaster) and six parameters of other population and senior population. However, since the characteristics of the population and the senior population were almost the same, only population data was used in the final examination. From the cluster analysis, it was found that it is appropriate to group the designated evacuation centers in Yokohama City into six groups. In addition, each of the six groups was found <span>to have explainable characteristics, confirming the effectiveness of multi-hazard</span> creation using cluster analysis. For example, we divided, all hazards are low, both flood and Seismic hazards are high, sediment hazards are high, etc. In many Japanese cities, disaster prevention measures have been constructed in consideration of ground hazards, mainly for earthquake disasters. In this paper, we confirmed the consistency between the evaluation results of the multi-hazard evaluated here and the existing ground hazard map and examined the usefulness of the designated evacuation center. Finally, the validity was confirmed by comparing this result with the ground hazard based on the actual measurement by the past research. In places where the seismic hazard is large, the two are consistent with the fact that the easiness of shaking by actual measurement is also large.</span>展开更多
Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance wi...Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance with the principle of"concentrating patients,experts,resources and treatment".Designated hospitals are often the strength of the general hospital and general hospital complex layers of various kinds of personnel,campus area is large,multi-channel,ordinary outpatient accepts people more,for emergency and severe cases treatment in patients with normal difficulty pressuure big,suspected/confirmed cases,combined with the COVID-19 occurred when the traditional holiday,the country launched the emergency response since,process reform faces a difficult labor,shortage of mampower,protective shortages,short time limit,and many other difficulties,hospital infection prevention and control is facing unprecedented pressure.In this paper,the West China-Guang'an Hospital,Sichuan University(Guang'an people's hospital)as a designated hospital,on the basis of the relevant scheme of the national health committee,epidemic prevention and control of the actual,combined with comprehensive hospital leadership,mampower allocation,protection,security,patient management,disinfection isolation,preview triage,preventive measures,training,monitoring,etc.,with practical experience summary for the COVID-19 diring the hospital infection prevention and control to improve the practice exploration.展开更多
“Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,...“Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,including four classes in national economy,namely,industrial enterprises above designated size,construction and real estate development and management enterprises above qualifications,wholesale and retail,catering and accommodation enterprises,and service enterprises above designated size,which are the primary part of national economic and social development activities.This paper is focused on analyzing the practice and difficulties in the current statistics work of four-classes enterprises,and then this paper proposes some recommendations.展开更多
The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National ...The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National Geoparks of China in Sichuan Province, 18 UNESCO Global Geoparks in China, and 219 World Heritage sites in China and 8 European nations. Through analysis and synthesis, the author concludes that doubled designation, which also leads to unbalanced park distribution, is particularly prevalent in China other than in Europe. Therefore, on-site management agencies and related governments in China should carefully translate the doubled designations into responsibilities and harmonious partnerships between all stakeholders in order to enhance the management effectiveness and avoid paper park phenomenon.展开更多
This paper proposes the financial index of payback period analysis in order to evaluate the economic performance of lighting system. Conventional designs and proposed optimal design using the Energy Conversation Promo...This paper proposes the financial index of payback period analysis in order to evaluate the economic performance of lighting system. Conventional designs and proposed optimal design using the Energy Conversation Promotion Act (No. 2) B.E. 2550 of Ministry of Energy (Section--The Type or Size of Building Standards and Rules and Procedures, Building Design for Energy Conservation, Act B.E. 2552) are compared based on illumination standard for office building in term of energy consumption, return of investment and environmental impact. Firstly, the Type or Size of Building Standards and Rule and Procedures, Building Design for Energy Conservation, Act B.E. 2552 is reviewed and compared with the conventional designs of lighting system for office building. Next, the lifetime energy consumption of fluorescent lamp T5 with electronic ballast, fluorescent lamp T8 with standard ballast and fluorescent lamp T8 with electronic ballast are simulated using DIALux software program in three sizes office buildings. Then, the payback period and CO2 emission of lighting system for selected office building are simulated by various scenarios, which the analytical results show are the optimal lighting system for office building under the present situation. Finally, the optimal design of lighting system for designated office building in Thailand will be discussed with respect to the energy performance with environmental friendly.展开更多
Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unabl...Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact. The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required. This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed. The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system. Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve.展开更多
An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build...An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappy with this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.'s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oracle model assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps.展开更多
Recently, a new type of Radio Frequency IDentification (RFID) system with mobile readers is introduced. In such a system, it is more desirable for mobile readers to identify tags without a back-end server, and thus ...Recently, a new type of Radio Frequency IDentification (RFID) system with mobile readers is introduced. In such a system, it is more desirable for mobile readers to identify tags without a back-end server, and thus it is frequently referred as a serverless mobile RFID system. In this paper, we formalize a serverless mobile RFID system model and propose a new encryption-based system that preserves the privacy of both tags and readers in the model. In addition, we define a new adversary model for the system model and show the security of the proposed system. Throughout comparisons between ours and the other alternatives, we show that our proposed system provides a stronger reader privacy and robustness against a reader forgery attack than the competitors.展开更多
Resource-based cities are the most important players in responding to climate change and achieving low carbon development in China.An analysis of relevant data(such as the energy consumption)showed an inter-city diffe...Resource-based cities are the most important players in responding to climate change and achieving low carbon development in China.An analysis of relevant data(such as the energy consumption)showed an inter-city differentiation of CO2 emissions from energy consumption,and suggested an influence of the Industrial Enterprises above Designated Size(IEDS)in resource-based industrial cities at the prefecture level and above in different regions.Then by geographical detector technology,the sizes of each influencing mechanism on CO2 emissions from energy consumption of the IEDS were probed.This analysis showed that significant spatial differences exist for CO2 emissions from energy consumption and revealed several factors which influence the IEDS in resource-based cities.(1)In terms of unit employment,Eastern and Western resource-based cities are above the overall level of all resource-based cities;and only Coal resource-based cities far exceeded the overall level among all of the cities in the analysis.(2)In terms of unit gross industrial output value,the Eastern,Central and Western resources-based cities are all above the overall level for all the cities.Here also,only Coal resource-based cities far exceeded the overall level of all resources-based cities.Economic scale and energy structure are the main factors influencing CO2 emissions from energy consumption of the IEDS in resource-based cities.The factors influencing CO2 emissions in different regions and types of resource-based cities show significant spatial variations,and the degree of influence that any given factor exerts varies among different regions and types of resource-based cities.Therefore,individualized recommendations should be directed to different regions and types of resource-based cities,so that the strategies and measures of industrial low carbon and transformation should vary greatly according to the specific conditions that exist in each city.展开更多
In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distr...In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distributed networks, Anyone in this scheme can signcrypt a message and distribute it to a designated group, and any member in the receiving group can unsigncrypt the ciphertext. The ciphertext and public key in the scheme are of constant size. In addition, this new scheme offers public verification of the ciphertext. This property is very important to the large-scale group communication since the gateway can filter the incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given to show that the scheme is secure against chosen ciphertext attack and existential forgery.展开更多
In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) ba...In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) based on Waters' signature scheme. In this setting, a signature holder can to designate the signature to multi verifiers. Moreover, the security of our proposed scheme is based on the Gap Bilinear Difffie-Hellman assumption.展开更多
Summary What is already known about this topic?The health status of designated drivers is largely associated with road safety,which is a major public health issue.However,few studies have focused on the health demands...Summary What is already known about this topic?The health status of designated drivers is largely associated with road safety,which is a major public health issue.However,few studies have focused on the health demands of designated drivers.What is added by this report?This study investigated the health consciousness,first aid knowledge learning,acceptable ways to acquire health knowledge,and willingness to have physical examinations for designated drivers to provide suggestions for improving their health status.What are the implications for public health practice?The industry and platform should provide scientific and reasonable guidance on healthy lifestyles for designated drivers and implement physical examinations to monitor their health status.展开更多
Layer-structured Ruddlesden–Popper(RP)perovskites(RPPs)with decent stability have captured the imagination of the photovoltaic research community and bring hope for boosting the development of perovskite solar cell(P...Layer-structured Ruddlesden–Popper(RP)perovskites(RPPs)with decent stability have captured the imagination of the photovoltaic research community and bring hope for boosting the development of perovskite solar cell(PSC)technology.However,two-dimensional(2D)or quasi-2D RP PSCs are encountered with some challenges of the large exciton binding energy,blocked charge transport and poor film quality,which restrict their photovoltaic performance.Fortunately,these issues can be readily resolved by rationally designing spacer cations of RPPs.This review mainly focuses on how to design the molecular structures of organic spacers and aims to endow RPPs with outstanding photovoltaic applications.We firstly elucidated the important roles of organic spacers in impacting crystallization kinetics,charge transporting ability and stability of RPPs.Then we brought three aspects to attention for designing organic spacers.Finally,we presented the specific molecular structure design strategies for organic spacers of RPPs aiming to improve photovoltaic performance of RP PSCs.These proposed strategies in this review will provide new avenues to develop novel organic spacers for RPPs and advance the development of RPP photovoltaic technology for future applications.展开更多
基金Supported by the National Natural Science Foun-dation of Chinafor Distinguished Young Scholars(60225007) the Na-tional Research Fundfor the Doctoral Programof Higher Education ofChina(20020248024) the Science and Technology Research Pro-ject of Shanghai (04DZ07067)
文摘In a strong designated verifier proxy signature scheme, a proxy signer can generate proxy signature on behalf of an original signer, but only the designated verifier can verify the validity of the proxy signature. In this paper, we first define the security requirements for strong designated verifier proxy signature schemes. And then we construct an identity-based strong designated verifier proxy signature scheme. We argue that the proposed scheme satisfies all of the security requirements.
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘The subliminal channel is used to send a secret message to an authorized receiver; the message cannot he discovered by any unauthorized receivers. Designated verifier signature (DVS) provide authentication of a message, we design a DVS scheme with message recovery mechanism and use it as a subliminal channel. In order to share a message among n users securely and allows t or more users can reconstruct the secret in dynamic groups, we combine both subliminal channel and (t, n) threshold cryptography. Then we proposed a threshold subliminal channel which can convey a subliminal message to a group of users based on message-recovery designated verifier signatures. Reconstructing the subliminal message relies on the cooperation of t or more users in the group and they can verify the validity of the subliminal message. Security and performance analysis show that the proposed scheme is secure and efficient.
文摘The opening of the economy has contributed to the rapid urban development in China over the last 17 years from 1979 to 1996. It is worthwhile to note three new development trends of Chinese urban system. The first trend identifies the emergence of mega urbanization regions. The second trend rebuilds a closer tie between the Chinese urban system and the global urban system through the development of the world (global) cities and international cities. The third trend shows the fast polarized development in hinterlands and peripheries around advanced economic regions. However, the research literature on Chinese urbanization in English has shown the scarcity of good databanks and the analysis results are incomplete. Some researchers also always question the quality of the data. Using the most completed and most recent data, this paper reviews the growth of China's new designated cities since 1949. This paper also seeks to examine the various policies and to explore the underlying factors that have affected the growth of China new cities. From the development of China's cities in the past 47 years from 1949 to 1996, it is easy to find that metropolitan cities developed with a relatively high rate compared with smaller ones, but the ratio of number and population to whole country cities remained stable; Chinese urban system development had entered a phase of small cities development; in terms of cities regional distribution, the south and east region is still the central area of urban development.
基金This work was partially supported by the National Research Foundation of Korea(NRF)grant funded by the Korean government(MSIT)(No.2018R1A4A1025632)the Soonchunhyang University Research Fund.
文摘With the growth of the scale of the market for Internet banking and e-commerce,the number of Internet-based financial markets has been increasing.Meanwhile,hacking incidents continuously affect Internet-banking services.For this reason,a countermeasure is required to improve the security of the online identification process.The current security and authentication mechanisms applied to financial services,such as Internet banking services for 5G-enabled IoT,do not ensure security.In this paper,a transaction-linkage technique with which the designated terminal is combined is proposed to solve this fundamental problem.The technique improves the security of online identification mechanisms because it is possible to counteract all of the existing security threats.The proposed technique supports mutual authentication and is safe from eavesdropping attacks,replay attacks,spoofing attacks,and service-denial attacks.Moreover,the technique supports non-repudiation by storing the transaction history in a transaction-linkage device.We believe that the security of Internet-banking services for 5G-enabled IoT will be increased through the utilization of the proposed technique.
基金Supported by Scientific Research Common Programof Beijing Municipal Commission of Education ( KM200610009011)Open Fund of State Key Laboratory of Information Security(Institute of Software of Chinese Academy of Sciences) (02-4)
文摘Oblivious transfer (OT) protocol is a fundamental cryptographical tool and widely used as a building block of secure computation. In this work, we propose two efficient t-out-of-n oblivious transfer schemes with the designated receiver. A common advantage of the two schemes is efficient. The total computation cost of the sender and the receiver is n + 2t + 1 modular exponentiations in first scheme that is three-round, and the total one of the sender and receiver is n + 3t modular exponentiations in second scheme that is two-round. Another advantage of both schemes is designable.
文摘Hazard maps are usually prepared for each disaster, including seismic hazard maps, flood hazard maps, and landslide hazard maps. However, when the general public attempts to check their own disaster risk, most are likely not aware of the specific types of disaster. So, first of all, we need to know what kind<span style="font-family:;" "="">s</span><span style="font-family:;" "=""> of hazards are important. However, the information that integrates multiple hazards is not well maintained, and there are few such studies. On the other hand, in Japan, a lot of hazard information is being released on the Internet. So, we summarized and assessed hazard data that can be accessed online regarding shelters (where evacuees live during disasters) and their catchments (areas assigned to each shelter) in Yokohama City, Kanagawa Prefecture. Based on the results, we investigated whether a grouping by cluster analysis would allow for multi-hazard assessment. We used four natural disasters (seismic, flood, tsunami, sediment disaster) and six parameters of other population and senior population. However, since the characteristics of the population and the senior population were almost the same, only population data was used in the final examination. From the cluster analysis, it was found that it is appropriate to group the designated evacuation centers in Yokohama City into six groups. In addition, each of the six groups was found <span>to have explainable characteristics, confirming the effectiveness of multi-hazard</span> creation using cluster analysis. For example, we divided, all hazards are low, both flood and Seismic hazards are high, sediment hazards are high, etc. In many Japanese cities, disaster prevention measures have been constructed in consideration of ground hazards, mainly for earthquake disasters. In this paper, we confirmed the consistency between the evaluation results of the multi-hazard evaluated here and the existing ground hazard map and examined the usefulness of the designated evacuation center. Finally, the validity was confirmed by comparing this result with the ground hazard based on the actual measurement by the past research. In places where the seismic hazard is large, the two are consistent with the fact that the easiness of shaking by actual measurement is also large.</span>
文摘Corona Virus Disease 2019(COVID-19)is a new infectious disease that appeared in whan in December 2019 Since January23,the national health and fitmess commission has required hospitals to be designated in accordance with the principle of"concentrating patients,experts,resources and treatment".Designated hospitals are often the strength of the general hospital and general hospital complex layers of various kinds of personnel,campus area is large,multi-channel,ordinary outpatient accepts people more,for emergency and severe cases treatment in patients with normal difficulty pressuure big,suspected/confirmed cases,combined with the COVID-19 occurred when the traditional holiday,the country launched the emergency response since,process reform faces a difficult labor,shortage of mampower,protective shortages,short time limit,and many other difficulties,hospital infection prevention and control is facing unprecedented pressure.In this paper,the West China-Guang'an Hospital,Sichuan University(Guang'an people's hospital)as a designated hospital,on the basis of the relevant scheme of the national health committee,epidemic prevention and control of the actual,combined with comprehensive hospital leadership,mampower allocation,protection,security,patient management,disinfection isolation,preview triage,preventive measures,training,monitoring,etc.,with practical experience summary for the COVID-19 diring the hospital infection prevention and control to improve the practice exploration.
文摘“Four classes of enterprises above designated size”(hereinafter called four-classes enterprises)refer to objects of statistical survey that have reached a certain scale in China’s current statistical method system,including four classes in national economy,namely,industrial enterprises above designated size,construction and real estate development and management enterprises above qualifications,wholesale and retail,catering and accommodation enterprises,and service enterprises above designated size,which are the primary part of national economic and social development activities.This paper is focused on analyzing the practice and difficulties in the current statistics work of four-classes enterprises,and then this paper proposes some recommendations.
基金Lab Construction Support Funding for Returned Oversea Scholars, Ministry of Education, No.[2003]18
文摘The author selects a thorny issue of doubled designations that bother policy-makers, professional planners and managers in the field of conservation for protected areas. The analyzed case study areas cover 5 National Geoparks of China in Sichuan Province, 18 UNESCO Global Geoparks in China, and 219 World Heritage sites in China and 8 European nations. Through analysis and synthesis, the author concludes that doubled designation, which also leads to unbalanced park distribution, is particularly prevalent in China other than in Europe. Therefore, on-site management agencies and related governments in China should carefully translate the doubled designations into responsibilities and harmonious partnerships between all stakeholders in order to enhance the management effectiveness and avoid paper park phenomenon.
文摘This paper proposes the financial index of payback period analysis in order to evaluate the economic performance of lighting system. Conventional designs and proposed optimal design using the Energy Conversation Promotion Act (No. 2) B.E. 2550 of Ministry of Energy (Section--The Type or Size of Building Standards and Rules and Procedures, Building Design for Energy Conservation, Act B.E. 2552) are compared based on illumination standard for office building in term of energy consumption, return of investment and environmental impact. Firstly, the Type or Size of Building Standards and Rule and Procedures, Building Design for Energy Conservation, Act B.E. 2552 is reviewed and compared with the conventional designs of lighting system for office building. Next, the lifetime energy consumption of fluorescent lamp T5 with electronic ballast, fluorescent lamp T8 with standard ballast and fluorescent lamp T8 with electronic ballast are simulated using DIALux software program in three sizes office buildings. Then, the payback period and CO2 emission of lighting system for selected office building are simulated by various scenarios, which the analytical results show are the optimal lighting system for office building under the present situation. Finally, the optimal design of lighting system for designated office building in Thailand will be discussed with respect to the energy performance with environmental friendly.
基金This work is supported by the National Natural Science Foundation of China (60473027).
文摘Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact. The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required. This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed. The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system. Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve.
基金Acknowledgements This work was supported by the National Natural Science Foundation of China (Grant No. 61370203) and Science and Technology on Communication Security Laboratory Foundation (Grant No. 9140C110301110C1103).
文摘An auditing scheme is a good way to prove owner's data outsourced to the cloud are kept intact, and a scheme capable of giving public verifiability service is a good option that some researchers have managed to build for the last few years. However, in a public auditing scheme everybody does verification of data and a possibility of leaking some secrete information to the public verifiers is an issue that data owners are unhappy with this scenario. For example, the data owner does not want anybody else to know he has the data stored in the cloud server. Motivated by the issue of privacy associated with public auditing system, we proposed a designated verifier auditing (DVA) scheme based on Steinfeld et al.'s universal designated verifier (DV) signature scheme. Our DVA scheme authorizes a third party auditor with private verification capability. It provides private verification because the scheme involves private key of the verifier. Moreover, we present the batch auditing scheme to improve auditing efficiency. Through rigorous security analysis we showed that our scheme is provably secure in the random oracle model assuming that the computational Diffie-Hellman (CDH) problem is hard over the group of bilinear maps.
基金Supported in part by the MKE (The Ministry of Knowledge Economy), Korea, under the ITRC (Information Technology Research Center) support program (No. NIPA-2012-H0301-12-4004)supervised by the NIPA (National IT Industry Promotion Agency)+1 种基金supported in part by US National Science Foundation (NSF) CREST (No. HRD-0833184)US Army Research Office (ARO) (No.W911NF-0810510)
文摘Recently, a new type of Radio Frequency IDentification (RFID) system with mobile readers is introduced. In such a system, it is more desirable for mobile readers to identify tags without a back-end server, and thus it is frequently referred as a serverless mobile RFID system. In this paper, we formalize a serverless mobile RFID system model and propose a new encryption-based system that preserves the privacy of both tags and readers in the model. In addition, we define a new adversary model for the system model and show the security of the proposed system. Throughout comparisons between ours and the other alternatives, we show that our proposed system provides a stronger reader privacy and robustness against a reader forgery attack than the competitors.
基金The Ministry of Education on Cultivate Project Fund of Philosophy and Social Science Research Development Report(13JBGP004)
文摘Resource-based cities are the most important players in responding to climate change and achieving low carbon development in China.An analysis of relevant data(such as the energy consumption)showed an inter-city differentiation of CO2 emissions from energy consumption,and suggested an influence of the Industrial Enterprises above Designated Size(IEDS)in resource-based industrial cities at the prefecture level and above in different regions.Then by geographical detector technology,the sizes of each influencing mechanism on CO2 emissions from energy consumption of the IEDS were probed.This analysis showed that significant spatial differences exist for CO2 emissions from energy consumption and revealed several factors which influence the IEDS in resource-based cities.(1)In terms of unit employment,Eastern and Western resource-based cities are above the overall level of all resource-based cities;and only Coal resource-based cities far exceeded the overall level among all of the cities in the analysis.(2)In terms of unit gross industrial output value,the Eastern,Central and Western resources-based cities are all above the overall level for all the cities.Here also,only Coal resource-based cities far exceeded the overall level of all resources-based cities.Economic scale and energy structure are the main factors influencing CO2 emissions from energy consumption of the IEDS in resource-based cities.The factors influencing CO2 emissions in different regions and types of resource-based cities show significant spatial variations,and the degree of influence that any given factor exerts varies among different regions and types of resource-based cities.Therefore,individualized recommendations should be directed to different regions and types of resource-based cities,so that the strategies and measures of industrial low carbon and transformation should vary greatly according to the specific conditions that exist in each city.
文摘In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distributed networks, Anyone in this scheme can signcrypt a message and distribute it to a designated group, and any member in the receiving group can unsigncrypt the ciphertext. The ciphertext and public key in the scheme are of constant size. In addition, this new scheme offers public verification of the ciphertext. This property is very important to the large-scale group communication since the gateway can filter the incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given to show that the scheme is secure against chosen ciphertext attack and existential forgery.
基金Supported by the National Natural Science Foundation of China (60772136)
文摘In this paper, we re-formalize the security notions of universal designated multi verifier signature (UDMVS) schemes. Then the first UDMVS scheme is presented in the standard model (i.e. without random oracles) based on Waters' signature scheme. In this setting, a signature holder can to designate the signature to multi verifiers. Moreover, the security of our proposed scheme is based on the Gap Bilinear Difffie-Hellman assumption.
基金China CDC program:Designated driver health risk management.
文摘Summary What is already known about this topic?The health status of designated drivers is largely associated with road safety,which is a major public health issue.However,few studies have focused on the health demands of designated drivers.What is added by this report?This study investigated the health consciousness,first aid knowledge learning,acceptable ways to acquire health knowledge,and willingness to have physical examinations for designated drivers to provide suggestions for improving their health status.What are the implications for public health practice?The industry and platform should provide scientific and reasonable guidance on healthy lifestyles for designated drivers and implement physical examinations to monitor their health status.
基金funding from National Science Foundation of China(52202337 and 22178015)the Young Taishan Scholars Program of Shandong Province(tsqn202211082)+1 种基金Natural Science Foundation of Shandong Province(ZR2023MB051)Independent Innovation Research Project of China University of Petroleum(East China)(22CX06023A).
文摘Layer-structured Ruddlesden–Popper(RP)perovskites(RPPs)with decent stability have captured the imagination of the photovoltaic research community and bring hope for boosting the development of perovskite solar cell(PSC)technology.However,two-dimensional(2D)or quasi-2D RP PSCs are encountered with some challenges of the large exciton binding energy,blocked charge transport and poor film quality,which restrict their photovoltaic performance.Fortunately,these issues can be readily resolved by rationally designing spacer cations of RPPs.This review mainly focuses on how to design the molecular structures of organic spacers and aims to endow RPPs with outstanding photovoltaic applications.We firstly elucidated the important roles of organic spacers in impacting crystallization kinetics,charge transporting ability and stability of RPPs.Then we brought three aspects to attention for designing organic spacers.Finally,we presented the specific molecular structure design strategies for organic spacers of RPPs aiming to improve photovoltaic performance of RP PSCs.These proposed strategies in this review will provide new avenues to develop novel organic spacers for RPPs and advance the development of RPP photovoltaic technology for future applications.