A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy...A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signature on behalf of the original signer. In the scheme, any t or more of n receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the proxy signature.展开更多
This paper proposes a threshold mult-proxy multi-signature scheme with share verification. In the scheme, a subset of original signers allows a designated group of proxy signers to sign on behalf of the original group...This paper proposes a threshold mult-proxy multi-signature scheme with share verification. In the scheme, a subset of original signers allows a designated group of proxy signers to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. In other words, some threshold values will be given to indicate the number of persons to represent a group to authorize the signing capability or to sign a message or to verify the proxy signature.展开更多
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv...In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme.展开更多
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. How...Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed.展开更多
A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the...A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the corresponding one based on traditional discrete logarithm.展开更多
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear ...Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear pairings using Boneh,Lynn,and Shacham’s (BLS) short signatures. The proxy key for the proxy group is just a short signature on the proxy warrant generated by the original signer. Due to the use of short signatures,our scheme is not only efficient,but also satisfies all the security requirements of the strong proxy signature.展开更多
Using the southern limit of snowfall recorded in Chinese documents, chronologies of tree-ring width, and tree-ring stable oxygen isotope(δ^(18)O), the annual temperature anomaly in southern China during 1850–200...Using the southern limit of snowfall recorded in Chinese documents, chronologies of tree-ring width, and tree-ring stable oxygen isotope(δ^(18)O), the annual temperature anomaly in southern China during 1850–2009 is reconstructed using the method of signal decomposition and synthesis. The results show that the linear trend was 0.47℃(100 yr)^(-1)over 1871–2009,and the two most rapid warming intervals occurred in 1877–1938 and 1968–2007, at rates of 0.125℃(10 yr)^(-1)and 0.258℃(10 yr)^(-1), respectively. The decadal variation shows that the temperature in the moderate warm interval of the 1910s–1930s was notably lower than that of the 1980s–2000s, which suggests that the warming since the 1980s was unprecedented for the past 160 years, though a warming hiatus existed in the 2000s. Additionally, there was a rapid cooling starting from the 1860s,followed by a cold interval until the early 1890s, with the coldest years in 1892 and 1893. A slight temperature decline was also found from the 1940s to the late 1960s. This study provides an independent case to validate the global warming for the past 160 years and its hiatus recently, because the proxy data are not affected by urbanization.展开更多
Based on multi-proxy analysis of pollen, carbonate, TOC, TN and δ13C of organic matters, a high-resolution climatic evolution of Qinghai Lake since the Late Glacial Age is recon-structed. The results indicate that th...Based on multi-proxy analysis of pollen, carbonate, TOC, TN and δ13C of organic matters, a high-resolution climatic evolution of Qinghai Lake since the Late Glacial Age is recon-structed. The results indicate that the boundary between the Last Glacial Maximum and the Late Glacial Age is at about 18.2 cal.ka BP. The warm and wet period, which began at about 15.4 cal.ka BP, culminated at 7.4 cal.ka BP and came to its end at about 4.5 cal.ka BP. After that, the climate gradually became cold and dry. The multi-proxy analysis indicates that the climate fluc-tuated greatly during the transitional period from the Late glacial Age to the Holocene, and this is in good accordance with that reflected by deep sea cores of North Atlantic, ice cores of Greenland, lake sediments in Europe, loess sequences and Guliya ice core in China. The cli-matic evolutional characteristic of the Qinghai Lake since the Late Glacial Age shows that the driving force of the East-Asia Monsoon correlates with solar radiation on the ten-thousand-year scale.展开更多
Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on...Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer. Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature (CLMPS) and proposed a concrete CLMPS scheme. However, their construction model is inaccurate, the concrete signature scheme has has three problems: the definition of the strengthened security a security flaw, and the proof of the security is imperfect. With further consideration, a remedial strengthened security model is redefined, and an improved scheme is also proposed, which is existentially unforgeable against adaptively chosen-warrant, chosen-message and chosen-identity attacks in the random oracles. In this condition, the computational Diffie-Hellman (CDH) assumption is used to prove full security for our CLMPS scheme.展开更多
In this paper, a multi-proxy blind signature scheme based on controlled quantum teleportation is proposed.Entangled four-qubit Cluster state functions as quantum channel, which needs less resource to complete the quan...In this paper, a multi-proxy blind signature scheme based on controlled quantum teleportation is proposed.Entangled four-qubit Cluster state functions as quantum channel, which needs less resource to complete the quantum multi-proxy blind signature. The scheme uses the physical characteristics of quantum mechanics to guarantee its blindness, unforgeability, and undeniability. The eavesdropping check is used to ensure the security. Our scheme has a foreseeable application to the E-business, E-governments, and etc.展开更多
Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original sign...Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public-key systems and the message recovery signature schemes,our proposed schemes have the following advan-tages:(1) They do not require the signing message to be transmitted,since the verifier can recover it from the signature;(2) The authentication of the public keys,verification of the signature,and recovery of the message can be simultaneously carried out in a single logical step;(3) No certificate is needed for validating the public keys. Further,the elliptic curve variant with short key lengths especially suits the cryptographic applications with limited computing power and storage space,e.g.,smart cards. As compared with the previous work that was implemented with the certificate-based public-key systems,the proposed schemes give better performance in terms of communication bandwidth and computation efforts.展开更多
A practical E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature,...A practical E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our E-payment system could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security, which the classical E-payment systems can not provide. Furthermore, compared with the existing quantum E-payment systems, this practical system could not only support mobile E-payment transactions but also inter-bank transactions.展开更多
Based on stratigraphic variations of petrology,geochemistry(major,trace elements),and pyrite framboids,we study the sedimentary environment of siliceous rocks of the Wufeng Formation in Wuxi,Northeastern Chongqing,Chi...Based on stratigraphic variations of petrology,geochemistry(major,trace elements),and pyrite framboids,we study the sedimentary environment of siliceous rocks of the Wufeng Formation in Wuxi,Northeastern Chongqing,China.Coupled Al2O3/(Al2O3þFe2O3),SiO2/Al2O3,with AleFeeMn values indicate that Wufeng Formation are deposited in a continental margin and influenced by detrital input.UEF-MoEF and V/CreU/Th cross-plots suggest that the siliceous shale was formed in dysoxic to anoxic conditions.Redox proxies imply that the lower,the middle to upper,and the top part of the Wufeng sediments were deposited in an anoxic,dysoxic and oxic environment,respectively.Accordingly,the average size of pyrite framboids are gradually increased from bottom to top,showing that increased oxidisability.A complete vibratory third-order cycle of sea level fluctuations during the Wufeng deposition can be identified.During Wufeng to Longmaxi transition,the sedimentary environment exhibits a short-scale oscillatory pattern and was probably transformed from an outer shelf to inner shelf.Coupled multi-proxies are considered more reliable proxies for deciphering redox conditions in fine-grained sediment.展开更多
Objective The lake levels in the eastern and southern Asia are regarded as low lake-level owing to precipitation decreasing based on the records of lake-level fluctuation in the continental interior lakes since the la...Objective The lake levels in the eastern and southern Asia are regarded as low lake-level owing to precipitation decreasing based on the records of lake-level fluctuation in the continental interior lakes since the last glacial maximum(LGM)(14C 18±1 kaBP,since 20 kaBP)in the Central Asia.Higher lake-level appeared in the transition belt between western Kunlun Mountain and the central Tibetan Plateau.展开更多
The Fourth Assessment Report of IPCC(IPCC AR4)concluded that average Northern Hemisphere temperatures during the second half of the 20th century were very likely higher than that of any other 50-year period in the las...The Fourth Assessment Report of IPCC(IPCC AR4)concluded that average Northern Hemisphere temperatures during the second half of the 20th century were very likely higher than that of any other 50-year period in the last 500 years and likely the highest in at least the past 1300 years.However,after evaluating Global or Northern Hemisphere temperature change series derived from ice cores,tree rings,展开更多
Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy sign...Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem. Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system, and also secure against the original signer's forgery attack. Furtherlnore, based on the elliptic curve cryptosystem, they are more efficient and have smaller key size than other system. They can be used in electronics transaction and mobile agent environment.展开更多
基金Project supported by the National Basic Research Program of China (973 Program) (Grant No 2007CB311100)the National High Technology Research and Development Program of China (Grant Nos 2006AA01Z419 and 20060101Z4015)+4 种基金the Major Research plan of the National Natural Science Foundation of China (Grant No 90604023)2008 Scientific Research Common Program of Beijing Municipal Commission of Education The Scientific Research Foundation for the Youth of Beijing University of Technology (Grant No 97007016200701)the National Research Foundation for the Doctoral Program of Higher Educationof China (Grant No 20040013007)the National Laboratory for Modern Communications Science Foundation of China (GrantNo 9140C1101010601)the Doctor Scientific Research Activation Foundation of Beijing University of Technology (Grant No 52007016200702)
文摘A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signature on behalf of the original signer. In the scheme, any t or more of n receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the proxy signature.
基金Supported by the National Natural Science Foundation of China (No.10471152).
文摘This paper proposes a threshold mult-proxy multi-signature scheme with share verification. In the scheme, a subset of original signers allows a designated group of proxy signers to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. In other words, some threshold values will be given to indicate the number of persons to represent a group to authorize the signing capability or to sign a message or to verify the proxy signature.
基金Supported by the National Natural Science Foundation of China (No.10671051)the Natural Science Foundation of Zhejiang Province (No.Y105067).
文摘In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme.
基金Supported by the National Natural Science Foundation of China (No.60503005)the Natural Science Foundation of Hunan Province (No.07JJ6110)
文摘Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed.
文摘A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the corresponding one based on traditional discrete logarithm.
基金Supported by the Jiangsu Educational Committee (No.03KJA520066)Key Lab. (Xidian University) of Ministry of Education of China on Computer Networks and Information Security.
文摘Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear pairings using Boneh,Lynn,and Shacham’s (BLS) short signatures. The proxy key for the proxy group is just a short signature on the proxy warrant generated by the original signer. Due to the use of short signatures,our scheme is not only efficient,but also satisfies all the security requirements of the strong proxy signature.
基金supported by the Strategic Priority Research Program of the Chinese Academy of Sciences(Grant No.XDA05090104)the National Natural Science Foundation of China(Grant Nos.41430528 and 41671201)
文摘Using the southern limit of snowfall recorded in Chinese documents, chronologies of tree-ring width, and tree-ring stable oxygen isotope(δ^(18)O), the annual temperature anomaly in southern China during 1850–2009 is reconstructed using the method of signal decomposition and synthesis. The results show that the linear trend was 0.47℃(100 yr)^(-1)over 1871–2009,and the two most rapid warming intervals occurred in 1877–1938 and 1968–2007, at rates of 0.125℃(10 yr)^(-1)and 0.258℃(10 yr)^(-1), respectively. The decadal variation shows that the temperature in the moderate warm interval of the 1910s–1930s was notably lower than that of the 1980s–2000s, which suggests that the warming since the 1980s was unprecedented for the past 160 years, though a warming hiatus existed in the 2000s. Additionally, there was a rapid cooling starting from the 1860s,followed by a cold interval until the early 1890s, with the coldest years in 1892 and 1893. A slight temperature decline was also found from the 1940s to the late 1960s. This study provides an independent case to validate the global warming for the past 160 years and its hiatus recently, because the proxy data are not affected by urbanization.
基金the National Natural Science Foundation of China(Grant No.40072056)the Knowledge Innovation Project of the Chinese Academy of Sciences(CAS)(Grant No.KZCX1-10-01)+1 种基金the Post-doctor Foundation of China the Foundation of Key Laboratory of Lake Sedimentation and Environment,Nanjing Institute of Geography and Limnology,CAS
文摘Based on multi-proxy analysis of pollen, carbonate, TOC, TN and δ13C of organic matters, a high-resolution climatic evolution of Qinghai Lake since the Late Glacial Age is recon-structed. The results indicate that the boundary between the Last Glacial Maximum and the Late Glacial Age is at about 18.2 cal.ka BP. The warm and wet period, which began at about 15.4 cal.ka BP, culminated at 7.4 cal.ka BP and came to its end at about 4.5 cal.ka BP. After that, the climate gradually became cold and dry. The multi-proxy analysis indicates that the climate fluc-tuated greatly during the transitional period from the Late glacial Age to the Holocene, and this is in good accordance with that reflected by deep sea cores of North Atlantic, ice cores of Greenland, lake sediments in Europe, loess sequences and Guliya ice core in China. The cli-matic evolutional characteristic of the Qinghai Lake since the Late Glacial Age shows that the driving force of the East-Asia Monsoon correlates with solar radiation on the ten-thousand-year scale.
基金supported by the National Natural Science Foundation of China (61170270,61100203,60903152,61003286,61121061)the Fundamental Research Funds for the Central Universities (BUPT2011YB01,BUPT2011RC0505,2011PTB-00-29,2011RCZJ15,2012RC0612)
文摘Multi-proxy signature is a scheme that an original signer delegates his or her signing capability to a proxy group. In the scheme, only the cooperation of all proxy signers in the proxy group can create a signature on behalf of the original signer. Jin and Wen firstly defined the formal security model of certificateless multi-proxy signature (CLMPS) and proposed a concrete CLMPS scheme. However, their construction model is inaccurate, the concrete signature scheme has has three problems: the definition of the strengthened security a security flaw, and the proof of the security is imperfect. With further consideration, a remedial strengthened security model is redefined, and an improved scheme is also proposed, which is existentially unforgeable against adaptively chosen-warrant, chosen-message and chosen-identity attacks in the random oracles. In this condition, the computational Diffie-Hellman (CDH) assumption is used to prove full security for our CLMPS scheme.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61402275,61402015,61273311the Natural Science Foundation of Shaanxi Province under Grant Nos.2015JM6263,2016JM6069the Fundamental Research Funds for the Central Universities under Grant No.GK201402004
文摘In this paper, a multi-proxy blind signature scheme based on controlled quantum teleportation is proposed.Entangled four-qubit Cluster state functions as quantum channel, which needs less resource to complete the quantum multi-proxy blind signature. The scheme uses the physical characteristics of quantum mechanics to guarantee its blindness, unforgeability, and undeniability. The eavesdropping check is used to ensure the security. Our scheme has a foreseeable application to the E-business, E-governments, and etc.
基金Project (No. 94-2213-E-182-019) supported by the National Science Council, Taiwan, China
文摘Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must corporately generate a valid proxy signature on behalf of the original signer. We first propose a multi-proxy signature scheme based on discrete logarithms and then adapt it to the elliptic curve cryptosystem. With the integration of self-certified public-key systems and the message recovery signature schemes,our proposed schemes have the following advan-tages:(1) They do not require the signing message to be transmitted,since the verifier can recover it from the signature;(2) The authentication of the public keys,verification of the signature,and recovery of the message can be simultaneously carried out in a single logical step;(3) No certificate is needed for validating the public keys. Further,the elliptic curve variant with short key lengths especially suits the cryptographic applications with limited computing power and storage space,e.g.,smart cards. As compared with the previous work that was implemented with the certificate-based public-key systems,the proposed schemes give better performance in terms of communication bandwidth and computation efforts.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61402275,61402015,61273311the Natural Science Foundation of Shaanxi Province under Grant Nos.2015JM6263,2016JM6069the Fundamental Research Funds for the Central Universities under Grant No.GK201402004
文摘A practical E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our E-payment system could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security, which the classical E-payment systems can not provide. Furthermore, compared with the existing quantum E-payment systems, this practical system could not only support mobile E-payment transactions but also inter-bank transactions.
基金This research was funded by the National Major projects of Science and Technology(Grant No.2017ZX05001001-002)the Project of Sichuan Key Laboratory of Natural Gas Geology of China(Grant No.2015trqdz01)
文摘Based on stratigraphic variations of petrology,geochemistry(major,trace elements),and pyrite framboids,we study the sedimentary environment of siliceous rocks of the Wufeng Formation in Wuxi,Northeastern Chongqing,China.Coupled Al2O3/(Al2O3þFe2O3),SiO2/Al2O3,with AleFeeMn values indicate that Wufeng Formation are deposited in a continental margin and influenced by detrital input.UEF-MoEF and V/CreU/Th cross-plots suggest that the siliceous shale was formed in dysoxic to anoxic conditions.Redox proxies imply that the lower,the middle to upper,and the top part of the Wufeng sediments were deposited in an anoxic,dysoxic and oxic environment,respectively.Accordingly,the average size of pyrite framboids are gradually increased from bottom to top,showing that increased oxidisability.A complete vibratory third-order cycle of sea level fluctuations during the Wufeng deposition can be identified.During Wufeng to Longmaxi transition,the sedimentary environment exhibits a short-scale oscillatory pattern and was probably transformed from an outer shelf to inner shelf.Coupled multi-proxies are considered more reliable proxies for deciphering redox conditions in fine-grained sediment.
基金financially supported by the National Science Foundation of China(grant No.41571177)
文摘Objective The lake levels in the eastern and southern Asia are regarded as low lake-level owing to precipitation decreasing based on the records of lake-level fluctuation in the continental interior lakes since the last glacial maximum(LGM)(14C 18±1 kaBP,since 20 kaBP)in the Central Asia.Higher lake-level appeared in the transition belt between western Kunlun Mountain and the central Tibetan Plateau.
文摘The Fourth Assessment Report of IPCC(IPCC AR4)concluded that average Northern Hemisphere temperatures during the second half of the 20th century were very likely higher than that of any other 50-year period in the last 500 years and likely the highest in at least the past 1300 years.However,after evaluating Global or Northern Hemisphere temperature change series derived from ice cores,tree rings,
文摘Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem. Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system, and also secure against the original signer's forgery attack. Furtherlnore, based on the elliptic curve cryptosystem, they are more efficient and have smaller key size than other system. They can be used in electronics transaction and mobile agent environment.