Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detectio...Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detection performance,this paper proposes a steganalysis method that can perfectly detectMV-based steganography in HEVC.Firstly,we define the local optimality of MVP(Motion Vector Prediction)based on the technology of AMVP(Advanced Motion Vector Prediction).Secondly,we analyze that in HEVC video,message embedding either usingMVP index orMVD(Motion Vector Difference)may destroy the above optimality of MVP.And then,we define the optimal rate of MVP as a steganalysis feature.Finally,we conduct steganalysis detection experiments on two general datasets for three popular steganographymethods and compare the performance with four state-ofthe-art steganalysis methods.The experimental results demonstrate the effectiveness of the proposed feature set.Furthermore,our method stands out for its practical applicability,requiring no model training and exhibiting low computational complexity,making it a viable solution for real-world scenarios.展开更多
Smart grid(SG)brings convenience to users while facing great chal-lenges in protecting personal private data.Data aggregation plays a key role in protecting personal privacy by aggregating all personal data into a sin...Smart grid(SG)brings convenience to users while facing great chal-lenges in protecting personal private data.Data aggregation plays a key role in protecting personal privacy by aggregating all personal data into a single value,preventing the leakage of personal data while ensuring its availability.Recently,a flexible subset data aggregation(FSDA)scheme based on the Pail-lier homomorphic encryption was first proposed by Zhang et al.Their scheme can dynamically adjust the size of each subset and obtain the aggregated data in the corresponding subset.In this paper,firstly,an efficient attack with both theorems proving and experimentative verification is launched.We find that in a specific scenario where the encrypted data constructed by a smart meter(SM)exceeds the size of one Paillier ciphertext,the malicious fog node(FN)may use the received ciphertext to obtain the reading of the SM.Secondly,to avoid the possibility of privacy disclosure under certain circumstances,additional hash functions are added to the individual encryption process.In addition,fault tolerance is very important to aggregation schemes in practical scenarios.In most of the current schemes,once some SMs failed,then they will not work.As far as we know,there is no multi-subset aggregation scheme both supports flexible subset data aggregation and fault tolerance.Finally,we construct the first secure flexible subset data aggregation(SFSDA)scheme with fault tolerance by combining the fault tolerance method with the flexible multi-subset aggregation,where FN enables the control server(CS)to finally decrypt the aggregated ciphertext by recovering equivalent ciphertexts when some SMs fail to submit their ciphertexts.Experiments show that our SFSDA scheme keeps the efficiency in implementing a flexible multi-subset aggregation function,and only has a small delay in implementing fault-tolerant data aggregation.展开更多
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c...Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based cryptography enjoys potential resistance to quantum analysis and low computational complexity. A multi-hop and unidirectional IB-PRE from lattices is presented. We split the functions of decryption and ciphertext transformation separately, and design the double private keys mechanism, where two keys are generated for each user, one key is used to decrypt the ciphertext by Pre-Image Sampling technique, and the other is used to generate the re-encryption key by Bonsai Trees technique. The generation of the re-encryption key is non-interactive and collusion resistant. Moreover, its IND-sID-CPA security over the decisional Learning With Errors (LWE) assumption under the standard model is proved. Compared with some previous IBPRE schemes from Bilinear Pairings, the format of transformed ciphertext in our scheme remains unchanged, furthermore, it can also resist quantum analysis. Compared with some existing IB-PRE schemes from lattices with similar properties, the space of the message in our scheme is a vector of length l and the encryption process remains a lower encryption blowup factor. At last, a proof-of-concept implementation is provided.展开更多
Affibody molecules are small nonimmunoglobulin affinity proteins,which can precisely target to some cancer cells with specific overexpressed molecular signatures.However,the relatively short in vivo half-life of them ...Affibody molecules are small nonimmunoglobulin affinity proteins,which can precisely target to some cancer cells with specific overexpressed molecular signatures.However,the relatively short in vivo half-life of them seriously limited their application in drug targeted delivery for cancer therapy.Here an amphiphilic affibody-drug conjugate is self-assembled into nanomicelles to prolong circulation time for targeted cancer therapy.As an example of the concept,the nanoagent was prepared through molecular self-assembly of the amphiphilic conjugate of Z_(HHR2:342)-Cys with auristatin E derivate,where the affibody used is capable of binding to the human epidermal growth factor receptor 2(HER2).Such a nanodrug not only increased the blood circulation time,but also enhanced the tumor targeting capacity(abundant affibody arms on the nanoagent surface) and the drug accumulation in tumor.As a result,this affibody-based nanoagent showed excellent antitumor activity in vivo to HER2-positive ovary and breast tumor models,which nearly eradicated both small solid tumors(about 100 mm^(3)) and large established tumors(exceed 500 mm^(3)).The relative tumor proliferation inhibition ratio reaches 99.8% for both models.展开更多
H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC...H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC compressed video without distortion.Four modules are introduced to eliminate the distortion caused by the modifications of motion vectors and guarantee the security of the algorithm.In the embedding block,the motion vector space encoding is used to embed a(2n+1)-ary notational number into an n-dimension vector composed of motion vectors generated from the selection block.Scrambling is adopted to disturb the order of steganographic carriers to improve the randomness of the carrier before the operation of embedding.The re-motion compensation(re-MC)block will re-construct the macroblock(MB)whose motion vectors have been modified by embedding block.System block plays the role of the generator for chaotic sequences and encryptor for secret data.Experimental results demonstrate that our proposed algorithm can achieve high embedding capacity without stego video visual quality distortion,it also presents good undetectability for existing MV-based steganalysis feature.Performance comparisons with other existing algorithms are provided to demonstrate the superiority of the proposed algorithm.展开更多
Matrix multiplication plays a pivotal role in the symmetric cipher algorithms, but it is one of the most complex and time consuming units, its performance directly affects the efficiency of cipher algorithms. Combined...Matrix multiplication plays a pivotal role in the symmetric cipher algorithms, but it is one of the most complex and time consuming units, its performance directly affects the efficiency of cipher algorithms. Combined with the characteristics of VLIW processor and matrix multiplication of symmetric cipher algorithms, this paper extracted the reconfigurable elements and analyzed the principle of matrix multiplication, then designed the reconfigurable architecture of matrix multiplication of VLIW processor further, at last we put forward single instructions for matrix multiplication between 4×1 and 4×4 matrix or two 4×4 matrix over GF(2~8), through the instructions extension, the instructions could support larger dimension operations. The experiment shows that the instructions we designed supports different dimensions matrix multiplication and improves the processing speed of multiplication greatly.展开更多
As one of the typical method for side channel attack,DPA has become a serious trouble for the security of encryption algorithm implementation.The potential capability of DPA attack induces researchers making a lot of ...As one of the typical method for side channel attack,DPA has become a serious trouble for the security of encryption algorithm implementation.The potential capability of DPA attack induces researchers making a lot of efforts in this area,which significantly improved the attack efficiency of DPA.However,most of these efforts were made based on the hypothesis that the gathered power consumption data from the target device were stable and low noise.If large deviation happens in part of the power consumption data sample,the efficiency of DPA attack will be reduced rapidly.In this work,a highly efficient method for DPA attack is proposed with the inspiration of genetic algorithm.Based on the designed fitness function,power consumption data that is stable and less noisy will be selected and the noisy ones will be eliminated.In this way,not only improves the robustness and efficiency of DPA attack,but also reduces the number of samples needed.With experiments on block cipher algorithms of DES and SM4,10%and 12.5%of the number of power consumption curves have been reduced in average with the proposed DPAG algorithm compared to original DPA attack respectively.The high efficiency and correctness of the proposed algorithm and novel model are proved by experiments.展开更多
In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computa...In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computation costs than existing similar schemes by utilizing secure outsourcing of scientific computation in cloud computing and eliminates overhead for users, the ciphertext is short, compact, the correctness of transformation algorithm is verifiable. The decrease of ciphertext is 17 %. Additionally, new scheme remits the key escrow problem and is proven selective security in the standard model, it could be verified publicly, applied in mobile devices.展开更多
An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mode, and signcryption mode can be switch adaptively. It sho...An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mode, and signcryption mode can be switch adaptively. It shows that the scheme achieves the semantic security under the decisional bilinear Diffie- Hellman assumption and achieves the unforgeability under the computational Diffie-Hellman assumption. It is more efficient than traditional way and can be used to secure the big data in networks.展开更多
McEliece cryptosystem is a public key cryptosystem that combines channel coding and encryption,and the oldest PKC that is conjectured to be postquantum secure.To decrease the key size of the original scheme,alternativ...McEliece cryptosystem is a public key cryptosystem that combines channel coding and encryption,and the oldest PKC that is conjectured to be postquantum secure.To decrease the key size of the original scheme,alternative codes have been adopted to replace Goppa codes.In this paper,we propose a ring signature using low-density generator-matrix codes.Our new scheme satisfies anonymity and existential unforgeability under chosen message attacks(EUFCMA).As for efficiency,the number of decoding operations has been reduced largely compared with ZLC ring signature,and the size of the public key is about 0.2%of the ZLC展开更多
Proteolysis targeting chimeras (PROTACs) have recently emerged as promising therapeutic agents for cancer therapy. However, their clinical application is considerably hindered by the poor membrane permeability and ins...Proteolysis targeting chimeras (PROTACs) have recently emerged as promising therapeutic agents for cancer therapy. However, their clinical application is considerably hindered by the poor membrane permeability and insufficient tumor distribution of PROTACs. Here we proposed a nanoengineered targeting strategy to construct a self-assembled affibody-PROTAC conjugate nanomedicine (APCN) for tumor-specific delivery of PROTACs. As proof of concept, a hydrophobic PROTAC MZ1 (a bromodomain-containing protein 4 degrader) was selected to couple with a hydrophilic affibody ZHER2:342 (an affinity protein of human epidermal growth factor receptor 2, HER2) via a smart linker containing disulfide bond to form an amphiphilic ZHER2:342-MZ1 conjugate. It spontaneously self-assembled into nanoparticles (ZHER2:342-MZ1 APCN) in water. Upon the excellent targeting property of ZHER2:342 and HER2 receptor-mediated endocytosis, ZHER2:342-MZ1 APCN was accumulated in tumor sites and internalized by cancer cells effectively in vitro. Under the intracellular high level of glutathione (GSH), ZHER2:342-MZ1 APCN released MZ1 to specifically degrade bromodomain-containing protein 4 (BRD4) and subsequently induced BRD4 deficiency-mediated apoptosis of cancer cells. By the tail-vein injection, ZHER2:342-MZ1 APCN showed the outstanding tumor-specific targeting ability, drug accumulation capacity, enhanced BRD4 degradation and antitumor efficacy in vivo for an HER2-positive SKOV-3 tumor model. Such an affibody mediated nanoengineered strategy would facilitate the application of PROTACs for targeted cancer therapy.展开更多
Implant-related osteomyelitis is a formidable hurdle in the clinical setting and is characterized by inflammation,infection,and consequential bone destruction.Therefore,effective reactive oxygen species(ROS)scavenging...Implant-related osteomyelitis is a formidable hurdle in the clinical setting and is characterized by inflammation,infection,and consequential bone destruction.Therefore,effective reactive oxygen species(ROS)scavenging,bacterial killing,and subsequent bone tissue repair are urgently needed for the treatment of difficult-to-heal osteomyelitis.Herein,we utilized the eddy-thermal effect of magnesium(Mg)implants under an alternating magnetic field(AMF)for the controlled release of H_(2)gas and ions(OH^(-)and Mg^(2+))for the treatment of osteomyelitis.H_(2)released by Mg rods under AMFs effectively scavenged cytotoxic ROS,exhibiting anti-inflammatory effects and consequently disrupting the environment of bacterial infections.In addition,the OH-hindered the energy metabolism of bacteria by effectively neutralizing protons within the microenvironment.Moreover,H_(2)impaired the permeability of bacterial membranes and expedited the damage induced by OH-.This synergistic AMF-induced H_(2)and proton depletion treatment approach not only killed both gram-negative and gram-positive bacteria but also effectively treated bacterial infections(abscesses and osteomyelitis).Moreover,Mg^(2+)released from the Mg rods enhanced and accelerated the process of bone osteogenesis.Overall,our work cleverly exploited the eddy-thermal effect and chemical activity of Mg implants under AMFs,aiming to eliminate the inflammatory environment and combat bacterial infections by the simultaneous release of H_(2),OH^(-),and Mg^(2+),thereby facilitating tissue regeneration.This therapeutic strategy achieved multiple benefits in one,thus presenting a promising avenue for clinical application.展开更多
Affibody is a new class of small non-immunoglobulin affinity proteins that possesses high affinity at the picomole level to several tumor overexpressed receptors.Owing to the simple framework,affibody is flexible for ...Affibody is a new class of small non-immunoglobulin affinity proteins that possesses high affinity at the picomole level to several tumor overexpressed receptors.Owing to the simple framework,affibody is flexible for modification with payload,but the relatively low molecular weight of this construction simultaneously results in short half-life time which hinders its application in cancer therapy.In this work,we prepared a nanomedicine self-assembled from the conjugate of affibody(ZPDGFRβ:09591,PDGFRβ:platelet-derived growth factor receptorβ)with monomethyl auristatin E(MMAE)through cathepsin B cleavable dipeptide linker for targeted colorectal cancer therapy.The nanoscale characteristics of ZPDGFRβ:09591-MMAE affibody-drug conjugate nanomedicine(ZPDGFRβ:09591-M ADCN)resulted in enhanced pharmacokinetics,improved drug accumulation,and promoted biosecurity performance than those of free drugs.As a result,ZPDGFRβ:09591-M ADCN exhibited excellent antitumor efficacy with tumor inhibition rates(TIR)over 99.0%in PDGFRβ-positive tumor models with small solid tumors(~150 mm^(3))or large established tumors(~500 mm^(3)),indicating that ZPDGFRβ:09591-MMAE ADCN is promising for the clinic application in colorectal cancer therapy.展开更多
Osteosarcoma(OS)patients have a poor prognosis due to its high degree of heterogeneity and high rate of metastasis.Magnetic hyperthermia therapy(MHT)combined with immunotherapy is an effective strategy to treat solid ...Osteosarcoma(OS)patients have a poor prognosis due to its high degree of heterogeneity and high rate of metastasis.Magnetic hyperthermia therapy(MHT)combined with immunotherapy is an effective strategy to treat solid and metastatic tumors.Here,we combined biodegradable magnesium(Mg)macroscale rods,which acted as an eddy thermo-magnetic agent under a low external alternating magnetic field,and immunotherapy to achieve a radical cure for OS.The eddy thermal effect(ETE)of the Mg rods(MgR)showed outstanding cytotoxic effects and enhanced the maturation of dendritic cells(DCs),and the mild MHT induced the immunogenic cell death(ICD)in the OS cells.Combined with immune checkpoint blockade(ICB)therapy,we obtained an excellent curative effect against OS,and a further evaluation demonstrated that the local MHT induced by the MgR increased T cells infiltration and the polarization of M1 macrophages.Interestingly,the biodegradable MgR also promoted bone osteogenesis.Our work highlighted the uneven ETE mediated by the biodegradable MgR induced a comprehensive immunologic activation in the OS tumor microenvironment(TME),which would inspire the application of MHT for the effective treatment of OS.展开更多
Traditional steganography is the practice of embedding a secret message into an image by modifying the information in the spatial or frequency domain of the cover image.Although this method has a large embedding capac...Traditional steganography is the practice of embedding a secret message into an image by modifying the information in the spatial or frequency domain of the cover image.Although this method has a large embedding capacity,it inevitably leaves traces of rewriting that can eventually be discovered by the enemy.The method of Steganography by Cover Synthesis(SCS)attempts to construct a natural stego image,so that the cover image is not modified;thus,it can overcome detection by a steganographic analyzer.Due to the difficulty in constructing natural stego images,the development of SCS is limited.In this paper,a novel generative SCS method based on a Generative Adversarial Network(GAN)for image steganography is proposed.In our method,we design a GAN model called Synthetic Semantics Stego Generative Adversarial Network(SSS-GAN)to generate stego images from secret messages.By establishing a mapping relationship between secret messages and semantic category information,category labels can generate pseudo-real images via the generative model.Then,the receiver can recognize the labels via the classifier network to restore the concealed information in communications.We trained the model on the MINIST,CIFAR-10,and CIFAR-100 image datasets.Experiments show the feasibility of this method.The security,capacity,and robustness of the method are analyzed.展开更多
Psoriatic arthritis(PsA)is a complicated psoriasis comorbidity with manifestations of psoriatic skin and arthritic joints,and tailoring specific treatment strategies for simultaneously delivering different drugs to di...Psoriatic arthritis(PsA)is a complicated psoriasis comorbidity with manifestations of psoriatic skin and arthritic joints,and tailoring specific treatment strategies for simultaneously delivering different drugs to different action sites in PsA remains challenging.We developed a need-based layered dissolving microneedle(MN)system loading immunosuppressant tacrolimus(TAC)and antiinflammatory diclofenac(DIC)in different layers of MNs,i.e.,TD-MN,which aims to specifically deliver TAC and DIC to skin and articular cavity,achieving simultaneous alleviation of psoriatic skin and arthritic joint lesions in PsA.In vitro and in vivo skin permeation demonstrated that the inter-layer retained TAC within the skin of~100μm,while the tip-layer delivered DIC up to~300μm into the articular cavity.TD-MN not only efficiently decreased the psoriasis area and severity index scores and recovered the thickened epidermis of imiquimod-induced psoriasis but also alleviated carrageenan/kaolin-induced arthritis even better than DIC injection through reducing joint swelling,muscle atrophy,and cartilage destruction.Importantly,TD-MN significantly inhibited the serum TNF-αand IL-17 A in psoriatic and arthritic rats.The results support that this approach represents a promising alternative to multi-administration of different drugs for comorbidity,providing a convenient and effective strategy for meeting the requirements of PsA treatment.展开更多
OBJECTIVE: The association of spleen system including both spleen and stomach with earth, one of the five elements, is a part of the theory of five elements. Practitioners of Traditional Chinese Medicine (TCM) used th...OBJECTIVE: The association of spleen system including both spleen and stomach with earth, one of the five elements, is a part of the theory of five elements. Practitioners of Traditional Chinese Medicine (TCM) used the theory as a reasoning tool to illustrate the Zang-Fu organs' physiological functions and the interaction among them.The exploration of how the theory of that spleen system is associated with earth was created may provide insights into how five-element theory is applied to TCM practice. METHODS: Using analogism as a method to explore the relationship between earth and spleen system inTCM. RESULTS: Chinese ancestors experienced and observed the features of earth from agricultural practice and used the knowledge for the explanation ofspleen system functions including physiological functions, pathological characteristics and for the treatment of related illnesses. CONCLUSION: The theory of the five elements in TCM is a kind of metaphor, which depends on observation and exploration of the natural world and experience of human beings.展开更多
The Multi-Key Fully Homomorphic Encryption (MKFHE) based on the NTRU cryptosystem is an important alternative to the post-quantum cryptography due to its simple scheme form,high efficiency,and fewer ciphertexts and ke...The Multi-Key Fully Homomorphic Encryption (MKFHE) based on the NTRU cryptosystem is an important alternative to the post-quantum cryptography due to its simple scheme form,high efficiency,and fewer ciphertexts and keys.In 2012,Lopez-Alt et al.proposed the first NTRU-type MKFHE scheme,the LTV12 scheme,using the key-switching and modulus-reduction techniques,whose security relies on two assumptions:the Ring Learning With Error (RLWE) assumption and the Decisional Small Polynomial Ratio (DSPR) assumption.However,the LTV12and subsequent NTRU-type schemes are restricted to the family of power-of-2 cyclotomic rings,which may affect the security in the case of subfield attacks.Moreover,the key-switching technique of the LTV12 scheme requires a circular application of evaluation keys,which causes rapid growth of the error and thus affects the circuit depth.In this paper,an NTRU-type MKFHE scheme over prime cyclotomic rings without key-switching is proposed,which has the potential to resist the subfield attack and decrease the error exponentially during the homomorphic evaluating process.First,based on the RLWE and DSPR assumptions over the prime cyclotomic rings,a detailed analysis of the factors affecting the error during the homomorphic evaluations in the LTV12 scheme is provided.Next,a Low Bit Discarded&Dimension Expansion of Ciphertexts (LBD&DEC) technique is proposed,and the inherent homomorphic multiplication decryption structure of the NTRU is proposed,which can eliminate the key-switching operation in the LTV12 scheme.Finally,a leveled NTRU-type MKFHE scheme is developed using the LBD&DEC and modulus-reduction techniques.The analysis shows that the proposed scheme compared to the LTV12 scheme can decrease the magnitude of the error exponentially and minimize the dimension of ciphertexts.展开更多
基金the National Natural Science Foundation of China(Grant Nos.62272478,62202496,61872384).
文摘Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detection performance,this paper proposes a steganalysis method that can perfectly detectMV-based steganography in HEVC.Firstly,we define the local optimality of MVP(Motion Vector Prediction)based on the technology of AMVP(Advanced Motion Vector Prediction).Secondly,we analyze that in HEVC video,message embedding either usingMVP index orMVD(Motion Vector Difference)may destroy the above optimality of MVP.And then,we define the optimal rate of MVP as a steganalysis feature.Finally,we conduct steganalysis detection experiments on two general datasets for three popular steganographymethods and compare the performance with four state-ofthe-art steganalysis methods.The experimental results demonstrate the effectiveness of the proposed feature set.Furthermore,our method stands out for its practical applicability,requiring no model training and exhibiting low computational complexity,making it a viable solution for real-world scenarios.
基金supported by National Natural Science Foundation of China (Grant Nos.62102452,62172436)Natural Science Foundation of Shaanxi Province (No.2023-JCYB-584)+1 种基金Innovative Research Team in Engineering University of PAP (KYTD201805)Engineering University of PAP’s Funding for Key Researcher (No.KYGG202011).
文摘Smart grid(SG)brings convenience to users while facing great chal-lenges in protecting personal private data.Data aggregation plays a key role in protecting personal privacy by aggregating all personal data into a single value,preventing the leakage of personal data while ensuring its availability.Recently,a flexible subset data aggregation(FSDA)scheme based on the Pail-lier homomorphic encryption was first proposed by Zhang et al.Their scheme can dynamically adjust the size of each subset and obtain the aggregated data in the corresponding subset.In this paper,firstly,an efficient attack with both theorems proving and experimentative verification is launched.We find that in a specific scenario where the encrypted data constructed by a smart meter(SM)exceeds the size of one Paillier ciphertext,the malicious fog node(FN)may use the received ciphertext to obtain the reading of the SM.Secondly,to avoid the possibility of privacy disclosure under certain circumstances,additional hash functions are added to the individual encryption process.In addition,fault tolerance is very important to aggregation schemes in practical scenarios.In most of the current schemes,once some SMs failed,then they will not work.As far as we know,there is no multi-subset aggregation scheme both supports flexible subset data aggregation and fault tolerance.Finally,we construct the first secure flexible subset data aggregation(SFSDA)scheme with fault tolerance by combining the fault tolerance method with the flexible multi-subset aggregation,where FN enables the control server(CS)to finally decrypt the aggregated ciphertext by recovering equivalent ciphertexts when some SMs fail to submit their ciphertexts.Experiments show that our SFSDA scheme keeps the efficiency in implementing a flexible multi-subset aggregation function,and only has a small delay in implementing fault-tolerant data aggregation.
基金supported by the National Natural Science Foundation of China under grant No.(U1636114, 61572521,61772550)Natural Science of Shaanxi Province of China under grant No.2018JM6078Innovative Research Team in Engineering University of PAP (KYTD201805)
文摘Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based cryptography enjoys potential resistance to quantum analysis and low computational complexity. A multi-hop and unidirectional IB-PRE from lattices is presented. We split the functions of decryption and ciphertext transformation separately, and design the double private keys mechanism, where two keys are generated for each user, one key is used to decrypt the ciphertext by Pre-Image Sampling technique, and the other is used to generate the re-encryption key by Bonsai Trees technique. The generation of the re-encryption key is non-interactive and collusion resistant. Moreover, its IND-sID-CPA security over the decisional Learning With Errors (LWE) assumption under the standard model is proved. Compared with some previous IBPRE schemes from Bilinear Pairings, the format of transformed ciphertext in our scheme remains unchanged, furthermore, it can also resist quantum analysis. Compared with some existing IB-PRE schemes from lattices with similar properties, the space of the message in our scheme is a vector of length l and the encryption process remains a lower encryption blowup factor. At last, a proof-of-concept implementation is provided.
基金Research and Development Plan of China(No.2016YFA0201500,2020YFA0907702)National Facility for Translational Medi-cine(Shanghai)(No.TMST-2020-001)for financial support.
文摘Affibody molecules are small nonimmunoglobulin affinity proteins,which can precisely target to some cancer cells with specific overexpressed molecular signatures.However,the relatively short in vivo half-life of them seriously limited their application in drug targeted delivery for cancer therapy.Here an amphiphilic affibody-drug conjugate is self-assembled into nanomicelles to prolong circulation time for targeted cancer therapy.As an example of the concept,the nanoagent was prepared through molecular self-assembly of the amphiphilic conjugate of Z_(HHR2:342)-Cys with auristatin E derivate,where the affibody used is capable of binding to the human epidermal growth factor receptor 2(HER2).Such a nanodrug not only increased the blood circulation time,but also enhanced the tumor targeting capacity(abundant affibody arms on the nanoagent surface) and the drug accumulation in tumor.As a result,this affibody-based nanoagent showed excellent antitumor activity in vivo to HER2-positive ovary and breast tumor models,which nearly eradicated both small solid tumors(about 100 mm^(3)) and large established tumors(exceed 500 mm^(3)).The relative tumor proliferation inhibition ratio reaches 99.8% for both models.
基金This work was supported by the National Natural Science Foundation of China(Grant Nos.61872384 and U1636114)partly supported by the Natural Science Foundation of Engineering University of PAP(Grant No.WJY201915).
文摘H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC compressed video without distortion.Four modules are introduced to eliminate the distortion caused by the modifications of motion vectors and guarantee the security of the algorithm.In the embedding block,the motion vector space encoding is used to embed a(2n+1)-ary notational number into an n-dimension vector composed of motion vectors generated from the selection block.Scrambling is adopted to disturb the order of steganographic carriers to improve the randomness of the carrier before the operation of embedding.The re-motion compensation(re-MC)block will re-construct the macroblock(MB)whose motion vectors have been modified by embedding block.System block plays the role of the generator for chaotic sequences and encryptor for secret data.Experimental results demonstrate that our proposed algorithm can achieve high embedding capacity without stego video visual quality distortion,it also presents good undetectability for existing MV-based steganalysis feature.Performance comparisons with other existing algorithms are provided to demonstrate the superiority of the proposed algorithm.
基金supported in part by open project foundation of State Key Laboratory of Cryptology National Natural Science Foundation of China (NSFC) under Grant No. 61272492, No. 61572521 and No. 61309008Natural Science Foundation for Young of Shaanxi Province under Grant No. 2013JQ8013
文摘Matrix multiplication plays a pivotal role in the symmetric cipher algorithms, but it is one of the most complex and time consuming units, its performance directly affects the efficiency of cipher algorithms. Combined with the characteristics of VLIW processor and matrix multiplication of symmetric cipher algorithms, this paper extracted the reconfigurable elements and analyzed the principle of matrix multiplication, then designed the reconfigurable architecture of matrix multiplication of VLIW processor further, at last we put forward single instructions for matrix multiplication between 4×1 and 4×4 matrix or two 4×4 matrix over GF(2~8), through the instructions extension, the instructions could support larger dimension operations. The experiment shows that the instructions we designed supports different dimensions matrix multiplication and improves the processing speed of multiplication greatly.
基金This work was supported by National Key R&D Program of China(Grant No.2017YFB0802000)National Natural Science Foundation of China(Grant No.U1636114,61772550,61572521)National Cryptography Development Fund of China(Grant No.MMJJ20170112).
文摘As one of the typical method for side channel attack,DPA has become a serious trouble for the security of encryption algorithm implementation.The potential capability of DPA attack induces researchers making a lot of efforts in this area,which significantly improved the attack efficiency of DPA.However,most of these efforts were made based on the hypothesis that the gathered power consumption data from the target device were stable and low noise.If large deviation happens in part of the power consumption data sample,the efficiency of DPA attack will be reduced rapidly.In this work,a highly efficient method for DPA attack is proposed with the inspiration of genetic algorithm.Based on the designed fitness function,power consumption data that is stable and less noisy will be selected and the noisy ones will be eliminated.In this way,not only improves the robustness and efficiency of DPA attack,but also reduces the number of samples needed.With experiments on block cipher algorithms of DES and SM4,10%and 12.5%of the number of power consumption curves have been reduced in average with the proposed DPAG algorithm compared to original DPA attack respectively.The high efficiency and correctness of the proposed algorithm and novel model are proved by experiments.
基金This work is supported by National Natural Science Foundation of China (61572521, 61272492), Natural Science Basic Research Plan in Shaanxi Province of China (2015JM6353) and Foundation Funding Research Project of Engineering University of Chinese Armed Police Force (WJY201523).
文摘In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computation costs than existing similar schemes by utilizing secure outsourcing of scientific computation in cloud computing and eliminates overhead for users, the ciphertext is short, compact, the correctness of transformation algorithm is verifiable. The decrease of ciphertext is 17 %. Additionally, new scheme remits the key escrow problem and is proven selective security in the standard model, it could be verified publicly, applied in mobile devices.
基金This work is partially supported by Natural Science Foundation of China (61103231,61272492, 61462408, 61103230), the Project funded by China Postdoctoral Science Foundation (2014M562445).
文摘An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mode, and signcryption mode can be switch adaptively. It shows that the scheme achieves the semantic security under the decisional bilinear Diffie- Hellman assumption and achieves the unforgeability under the computational Diffie-Hellman assumption. It is more efficient than traditional way and can be used to secure the big data in networks.
文摘McEliece cryptosystem is a public key cryptosystem that combines channel coding and encryption,and the oldest PKC that is conjectured to be postquantum secure.To decrease the key size of the original scheme,alternative codes have been adopted to replace Goppa codes.In this paper,we propose a ring signature using low-density generator-matrix codes.Our new scheme satisfies anonymity and existential unforgeability under chosen message attacks(EUFCMA).As for efficiency,the number of decoding operations has been reduced largely compared with ZLC ring signature,and the size of the public key is about 0.2%of the ZLC
基金supported by the National Natural Science Foundation of China(NOs.22201178,and 32071414)the National Key Research and Development Program of China(No.2020YFA0907702).
文摘Proteolysis targeting chimeras (PROTACs) have recently emerged as promising therapeutic agents for cancer therapy. However, their clinical application is considerably hindered by the poor membrane permeability and insufficient tumor distribution of PROTACs. Here we proposed a nanoengineered targeting strategy to construct a self-assembled affibody-PROTAC conjugate nanomedicine (APCN) for tumor-specific delivery of PROTACs. As proof of concept, a hydrophobic PROTAC MZ1 (a bromodomain-containing protein 4 degrader) was selected to couple with a hydrophilic affibody ZHER2:342 (an affinity protein of human epidermal growth factor receptor 2, HER2) via a smart linker containing disulfide bond to form an amphiphilic ZHER2:342-MZ1 conjugate. It spontaneously self-assembled into nanoparticles (ZHER2:342-MZ1 APCN) in water. Upon the excellent targeting property of ZHER2:342 and HER2 receptor-mediated endocytosis, ZHER2:342-MZ1 APCN was accumulated in tumor sites and internalized by cancer cells effectively in vitro. Under the intracellular high level of glutathione (GSH), ZHER2:342-MZ1 APCN released MZ1 to specifically degrade bromodomain-containing protein 4 (BRD4) and subsequently induced BRD4 deficiency-mediated apoptosis of cancer cells. By the tail-vein injection, ZHER2:342-MZ1 APCN showed the outstanding tumor-specific targeting ability, drug accumulation capacity, enhanced BRD4 degradation and antitumor efficacy in vivo for an HER2-positive SKOV-3 tumor model. Such an affibody mediated nanoengineered strategy would facilitate the application of PROTACs for targeted cancer therapy.
基金supported by the National Key Research and Development Program of China(2022YFB3804600,2021YFF0701800)the National Natural Science Foundation of China(U20A20254,52072253)+4 种基金the Science and Technology Development Fund,Macao SAR(0118/2023/RIA2)Collaborative Innovation Center of Suzhou Nano Science and Technology,Suzhou Key Laboratory of Nanotechnology and Biomedicine,the Jiangsu Natural Science Fund for Distinguished Young Scholars(BK20211544)the 111 Project,Joint International Research Laboratory of Carbon-Based Functional Materials and Devices,Medical Research Project of Jiangsu Province(ZD2022024)New Cornerstone Science Foundation through the XPLORER PRIZE,and Key Laboratory of Structural Deformities in Children of Suzhou(SZS2022018)N.Y.was supported by the Macao Young Scholars Program and the Jiangsu Funding Program for Excellent Postdoctoral Talent.
文摘Implant-related osteomyelitis is a formidable hurdle in the clinical setting and is characterized by inflammation,infection,and consequential bone destruction.Therefore,effective reactive oxygen species(ROS)scavenging,bacterial killing,and subsequent bone tissue repair are urgently needed for the treatment of difficult-to-heal osteomyelitis.Herein,we utilized the eddy-thermal effect of magnesium(Mg)implants under an alternating magnetic field(AMF)for the controlled release of H_(2)gas and ions(OH^(-)and Mg^(2+))for the treatment of osteomyelitis.H_(2)released by Mg rods under AMFs effectively scavenged cytotoxic ROS,exhibiting anti-inflammatory effects and consequently disrupting the environment of bacterial infections.In addition,the OH-hindered the energy metabolism of bacteria by effectively neutralizing protons within the microenvironment.Moreover,H_(2)impaired the permeability of bacterial membranes and expedited the damage induced by OH-.This synergistic AMF-induced H_(2)and proton depletion treatment approach not only killed both gram-negative and gram-positive bacteria but also effectively treated bacterial infections(abscesses and osteomyelitis).Moreover,Mg^(2+)released from the Mg rods enhanced and accelerated the process of bone osteogenesis.Overall,our work cleverly exploited the eddy-thermal effect and chemical activity of Mg implants under AMFs,aiming to eliminate the inflammatory environment and combat bacterial infections by the simultaneous release of H_(2),OH^(-),and Mg^(2+),thereby facilitating tissue regeneration.This therapeutic strategy achieved multiple benefits in one,thus presenting a promising avenue for clinical application.
基金partially supported by the National Key Research and Development Program of China(2022YFB3804600 and 2021YFF0701800)the National Natural Science Foundation of China(U20A20254 and 52072253)+7 种基金Collaborative Innovation Center of Suzhou Nano Science and TechnologySuzhou Key Laboratory of Nanotechnology and Biomedicinethe Jiangsu Natural Science Fund for Distinguished Young Scholars(BK20211544)the 111 ProjectJoint International Research Laboratory of Carbon-Based Functional Materials and DevicesMedical Research Project of Jiangsu Province(ZD2022024)New Cornerstone Science Foundation through the XPLORER PRIZEKey Laboratory of Structural Deformities in Children of Suzhou(SZS2022018)。
基金supported by the National Key Research and Development Plan of China(No.2020YFA0907702)the National Facility for Translational Medicine(Shanghai)(No.TMST-2020-001).
文摘Affibody is a new class of small non-immunoglobulin affinity proteins that possesses high affinity at the picomole level to several tumor overexpressed receptors.Owing to the simple framework,affibody is flexible for modification with payload,but the relatively low molecular weight of this construction simultaneously results in short half-life time which hinders its application in cancer therapy.In this work,we prepared a nanomedicine self-assembled from the conjugate of affibody(ZPDGFRβ:09591,PDGFRβ:platelet-derived growth factor receptorβ)with monomethyl auristatin E(MMAE)through cathepsin B cleavable dipeptide linker for targeted colorectal cancer therapy.The nanoscale characteristics of ZPDGFRβ:09591-MMAE affibody-drug conjugate nanomedicine(ZPDGFRβ:09591-M ADCN)resulted in enhanced pharmacokinetics,improved drug accumulation,and promoted biosecurity performance than those of free drugs.As a result,ZPDGFRβ:09591-M ADCN exhibited excellent antitumor efficacy with tumor inhibition rates(TIR)over 99.0%in PDGFRβ-positive tumor models with small solid tumors(~150 mm^(3))or large established tumors(~500 mm^(3)),indicating that ZPDGFRβ:09591-MMAE ADCN is promising for the clinic application in colorectal cancer therapy.
基金This article was partially supported by the National Natural Science Foundation of China(U20A20254,52072253,82172506,82030068)Collaborative Innovation Center of Suzhou Nano Science and Technology,the 111 Project,Joint International Research Laboratory of Carbon-Based Functional Materials and Devices,a Jiangsu Social Development Project(BE2019658)+1 种基金a Jiangsu Natural Science Fund for Distinguished Young Scholars(BK20211544)Suzhou Key Laboratory of Nanotechnology and Biomedicine.L.Cheng was supported by the Tang Scholarship of Soochow University.
文摘Osteosarcoma(OS)patients have a poor prognosis due to its high degree of heterogeneity and high rate of metastasis.Magnetic hyperthermia therapy(MHT)combined with immunotherapy is an effective strategy to treat solid and metastatic tumors.Here,we combined biodegradable magnesium(Mg)macroscale rods,which acted as an eddy thermo-magnetic agent under a low external alternating magnetic field,and immunotherapy to achieve a radical cure for OS.The eddy thermal effect(ETE)of the Mg rods(MgR)showed outstanding cytotoxic effects and enhanced the maturation of dendritic cells(DCs),and the mild MHT induced the immunogenic cell death(ICD)in the OS cells.Combined with immune checkpoint blockade(ICB)therapy,we obtained an excellent curative effect against OS,and a further evaluation demonstrated that the local MHT induced by the MgR increased T cells infiltration and the polarization of M1 macrophages.Interestingly,the biodegradable MgR also promoted bone osteogenesis.Our work highlighted the uneven ETE mediated by the biodegradable MgR induced a comprehensive immunologic activation in the OS tumor microenvironment(TME),which would inspire the application of MHT for the effective treatment of OS.
基金supported by the National Natural Science Foundation of China(NSFC)(Nos.61872384 and61672090).
文摘Traditional steganography is the practice of embedding a secret message into an image by modifying the information in the spatial or frequency domain of the cover image.Although this method has a large embedding capacity,it inevitably leaves traces of rewriting that can eventually be discovered by the enemy.The method of Steganography by Cover Synthesis(SCS)attempts to construct a natural stego image,so that the cover image is not modified;thus,it can overcome detection by a steganographic analyzer.Due to the difficulty in constructing natural stego images,the development of SCS is limited.In this paper,a novel generative SCS method based on a Generative Adversarial Network(GAN)for image steganography is proposed.In our method,we design a GAN model called Synthetic Semantics Stego Generative Adversarial Network(SSS-GAN)to generate stego images from secret messages.By establishing a mapping relationship between secret messages and semantic category information,category labels can generate pseudo-real images via the generative model.Then,the receiver can recognize the labels via the classifier network to restore the concealed information in communications.We trained the model on the MINIST,CIFAR-10,and CIFAR-100 image datasets.Experiments show the feasibility of this method.The security,capacity,and robustness of the method are analyzed.
基金financially supported by the National Natural Science Foundation of China(Nos.81973491 and 81473358,China)the Guangdong Basic and Applied Basic Research Foundation(2019A1515011161,China)
文摘Psoriatic arthritis(PsA)is a complicated psoriasis comorbidity with manifestations of psoriatic skin and arthritic joints,and tailoring specific treatment strategies for simultaneously delivering different drugs to different action sites in PsA remains challenging.We developed a need-based layered dissolving microneedle(MN)system loading immunosuppressant tacrolimus(TAC)and antiinflammatory diclofenac(DIC)in different layers of MNs,i.e.,TD-MN,which aims to specifically deliver TAC and DIC to skin and articular cavity,achieving simultaneous alleviation of psoriatic skin and arthritic joint lesions in PsA.In vitro and in vivo skin permeation demonstrated that the inter-layer retained TAC within the skin of~100μm,while the tip-layer delivered DIC up to~300μm into the articular cavity.TD-MN not only efficiently decreased the psoriasis area and severity index scores and recovered the thickened epidermis of imiquimod-induced psoriasis but also alleviated carrageenan/kaolin-induced arthritis even better than DIC injection through reducing joint swelling,muscle atrophy,and cartilage destruction.Importantly,TD-MN significantly inhibited the serum TNF-αand IL-17 A in psoriatic and arthritic rats.The results support that this approach represents a promising alternative to multi-administration of different drugs for comorbidity,providing a convenient and effective strategy for meeting the requirements of PsA treatment.
基金Supported by National Science Foundation of China (No.30973971)Ph.D. Programs Foundation of Ministry of Education of China (No. 20090013110012)
文摘OBJECTIVE: The association of spleen system including both spleen and stomach with earth, one of the five elements, is a part of the theory of five elements. Practitioners of Traditional Chinese Medicine (TCM) used the theory as a reasoning tool to illustrate the Zang-Fu organs' physiological functions and the interaction among them.The exploration of how the theory of that spleen system is associated with earth was created may provide insights into how five-element theory is applied to TCM practice. METHODS: Using analogism as a method to explore the relationship between earth and spleen system inTCM. RESULTS: Chinese ancestors experienced and observed the features of earth from agricultural practice and used the knowledge for the explanation ofspleen system functions including physiological functions, pathological characteristics and for the treatment of related illnesses. CONCLUSION: The theory of the five elements in TCM is a kind of metaphor, which depends on observation and exploration of the natural world and experience of human beings.
基金supported by the National Key R&D Program of China(No.2017YFB0802000)the National Natural Science Foundation of China(Nos.U1636114 and 61872289)National Cryptography Development Fund of China(No.MMJJ20170112)。
文摘The Multi-Key Fully Homomorphic Encryption (MKFHE) based on the NTRU cryptosystem is an important alternative to the post-quantum cryptography due to its simple scheme form,high efficiency,and fewer ciphertexts and keys.In 2012,Lopez-Alt et al.proposed the first NTRU-type MKFHE scheme,the LTV12 scheme,using the key-switching and modulus-reduction techniques,whose security relies on two assumptions:the Ring Learning With Error (RLWE) assumption and the Decisional Small Polynomial Ratio (DSPR) assumption.However,the LTV12and subsequent NTRU-type schemes are restricted to the family of power-of-2 cyclotomic rings,which may affect the security in the case of subfield attacks.Moreover,the key-switching technique of the LTV12 scheme requires a circular application of evaluation keys,which causes rapid growth of the error and thus affects the circuit depth.In this paper,an NTRU-type MKFHE scheme over prime cyclotomic rings without key-switching is proposed,which has the potential to resist the subfield attack and decrease the error exponentially during the homomorphic evaluating process.First,based on the RLWE and DSPR assumptions over the prime cyclotomic rings,a detailed analysis of the factors affecting the error during the homomorphic evaluations in the LTV12 scheme is provided.Next,a Low Bit Discarded&Dimension Expansion of Ciphertexts (LBD&DEC) technique is proposed,and the inherent homomorphic multiplication decryption structure of the NTRU is proposed,which can eliminate the key-switching operation in the LTV12 scheme.Finally,a leveled NTRU-type MKFHE scheme is developed using the LBD&DEC and modulus-reduction techniques.The analysis shows that the proposed scheme compared to the LTV12 scheme can decrease the magnitude of the error exponentially and minimize the dimension of ciphertexts.