Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Neverthel...Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Nevertheless,most IDTS schemes rely on a trusted key generation center(KGC).Recently,some IDTS schemes can achieve escrow-free security against corrupted KGC,but all of them are vulnerable to denial-of-service attacks in the dishonest majority setting,where cheaters may force the protocol to abort without providing any feedback.In this work,we present a fully decentralized IDTS scheme to resist corrupted KGC and denialof-service attacks.To this end,we design threshold protocols to achieve distributed key generation,private key extraction,and signing generation which can withstand the collusion between KGCs and signers,and then we propose an identification mechanism that can detect the identity of cheaters during key generation,private key extraction and signing generation.Finally,we formally prove that the proposed scheme is threshold unforgeability against chosen message attacks.The experimental results show that the computation time of both key generation and signing generation is<1 s,and private key extraction is about 3 s,which is practical in the distributed environment.展开更多
Variants in the solute carrier family 40 member 1(SLC40A1)gene are the molecular basis of ferroportin disease,which is an autosomal dominant hereditary hemochromatosis.Here,we present a patient with pure red cell apla...Variants in the solute carrier family 40 member 1(SLC40A1)gene are the molecular basis of ferroportin disease,which is an autosomal dominant hereditary hemochromatosis.Here,we present a patient with pure red cell aplasia(PRCA)and large granular lymphocytic leukemia(LGLL)associated with an extremely high levels of serum ferritin and iron overload syndrome.Whole exon sequencing revealed a novel heterozygous variant in SLC40A1(p.T419I),which was found in his daughter as well.A series of functional studies in vitro of the T419I variant in ferroportin were conducted and the results revealed a reduced capacity of iron export from cells without changes in protein localization and its sensitivity to hepcidin.Intracellular iron storage in mutated cells was significantly higher than that of wild-type.These findings suggest that the novel variant p.T419I can cause the classical form of ferroportin disease and an elevated intracellular iron level indicates a potential novel pathogenic mechanism underlying PRCA and LGLL.展开更多
基金support by the National Key R&D Program of China(No.2021YFB3100400)the National Natural Science Foundation of China(Grant Nos.62172216,U20A201092)+6 种基金the Jiangsu Provincial Key Research and Development Program(Nos.BE2022068,BE2022068-2)the Key R&D Program of Guangdong Province(No.2020B0101090002)the Natural Science Foundation of Jiangsu Province(No.BK20211180)the Research Fund of Guangxi Key Laboratory of Trusted Software(No.KX202034)the Research Fund of State Key Laboratory of Integrated Services Networks(Xidian University)(No.ISN23-20)the Fund of Prospective Layout of Scientific Research for NUAA(Nanjing University of Aeronautics and Astronautics)JSPS Postdoctoral Fellowships(No.P21073).
文摘Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Nevertheless,most IDTS schemes rely on a trusted key generation center(KGC).Recently,some IDTS schemes can achieve escrow-free security against corrupted KGC,but all of them are vulnerable to denial-of-service attacks in the dishonest majority setting,where cheaters may force the protocol to abort without providing any feedback.In this work,we present a fully decentralized IDTS scheme to resist corrupted KGC and denialof-service attacks.To this end,we design threshold protocols to achieve distributed key generation,private key extraction,and signing generation which can withstand the collusion between KGCs and signers,and then we propose an identification mechanism that can detect the identity of cheaters during key generation,private key extraction and signing generation.Finally,we formally prove that the proposed scheme is threshold unforgeability against chosen message attacks.The experimental results show that the computation time of both key generation and signing generation is<1 s,and private key extraction is about 3 s,which is practical in the distributed environment.
基金was supported by grants from the National Natural Science Foundation of China under grant numbers 81770119&81700120。
文摘Variants in the solute carrier family 40 member 1(SLC40A1)gene are the molecular basis of ferroportin disease,which is an autosomal dominant hereditary hemochromatosis.Here,we present a patient with pure red cell aplasia(PRCA)and large granular lymphocytic leukemia(LGLL)associated with an extremely high levels of serum ferritin and iron overload syndrome.Whole exon sequencing revealed a novel heterozygous variant in SLC40A1(p.T419I),which was found in his daughter as well.A series of functional studies in vitro of the T419I variant in ferroportin were conducted and the results revealed a reduced capacity of iron export from cells without changes in protein localization and its sensitivity to hepcidin.Intracellular iron storage in mutated cells was significantly higher than that of wild-type.These findings suggest that the novel variant p.T419I can cause the classical form of ferroportin disease and an elevated intracellular iron level indicates a potential novel pathogenic mechanism underlying PRCA and LGLL.