The umbrella term"neurodege ne rative disorders"(NDDs) refers to several conditions characterized by a progressive loss of structure and function of cells belonging to the nervous system.Such diseases affect...The umbrella term"neurodege ne rative disorders"(NDDs) refers to several conditions characterized by a progressive loss of structure and function of cells belonging to the nervous system.Such diseases affect more than 50million people worldwide.Neurodegenerative disorders are characterized by sundry factors and pathophysiological mechanisms that a re challenging to be fully profiled.Many of these rely on cell signaling pathways to preserve homeostasis,involving second messengers such as cyclic adenosine monophosphate (cAMP)and cyclic guanosine 3',5'-monophosphate(cGMP).Their ability to control the duration and amplitude of the signaling cascade is given by the presence of several common and uncommon effectors.Protein kinases A and G (PKA and PKG),phosphodiesterases (PDEs),and scaffold proteins are among them.展开更多
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a...This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution.展开更多
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur...With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
This ancient city has a history going back over 2,000 years.It has witnessed the fusion of multiple ethnic cultures including the Miao,Dong,and Han,and hosts a number of cultural heritage sites.THE old town of Zhenyua...This ancient city has a history going back over 2,000 years.It has witnessed the fusion of multiple ethnic cultures including the Miao,Dong,and Han,and hosts a number of cultural heritage sites.THE old town of Zhenyuan is located in Zhenyuan County,Qiandongnan Miao and Dong Autonomous Prefecture in southwest China’s Guizhou Province.Covering an area of just around three square kilometers,it sits on the banks of the Wuyang River and is surrounded by mountains.Zhenyuan has been a county for more than 2,281 years and was the prefectural capital during the Yuan(1271-1368)and Qing(1644-1911)dynasties.It is a multicultural region,with Miao,Dong,and other ethnic minorities making up nearly half of the population.展开更多
With the vigorous development of Internet of Things(IoT)technology,the demand for communication and data exchange between different types of IoT devices is increasing day by day.To solve the problems of diversity and ...With the vigorous development of Internet of Things(IoT)technology,the demand for communication and data exchange between different types of IoT devices is increasing day by day.To solve the problems of diversity and complexity of communication protocols between devices,this paper proposes a design scheme of a multi-connector IoT central gateway based on Raspberry Pi and Docker.Through the research and application of related technologies,by integrating multiple communication interfaces and utilizing containerization technology,an efficient,flexible,and scalable IoT central gateway has been realized,which can support the connection and data interaction of multiple communication protocols and provide strong support for the stable operation and development of the IoT system.展开更多
文摘The umbrella term"neurodege ne rative disorders"(NDDs) refers to several conditions characterized by a progressive loss of structure and function of cells belonging to the nervous system.Such diseases affect more than 50million people worldwide.Neurodegenerative disorders are characterized by sundry factors and pathophysiological mechanisms that a re challenging to be fully profiled.Many of these rely on cell signaling pathways to preserve homeostasis,involving second messengers such as cyclic adenosine monophosphate (cAMP)and cyclic guanosine 3',5'-monophosphate(cGMP).Their ability to control the duration and amplitude of the signaling cascade is given by the presence of several common and uncommon effectors.Protein kinases A and G (PKA and PKG),phosphodiesterases (PDEs),and scaffold proteins are among them.
基金Project supported by the General Project of Natural Science Foundation of Hunan Province(Grant Nos.2024JJ5273 and 2023JJ50328)the Scientific Research Project of Education Department of Hunan Province(Grant Nos.22A0049 and 22B0699)。
文摘This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution.
基金supported by National Key Research and Development Project(No.2020YFB1005500)Beijing Natural Science Foundation Project(No.M21034)。
文摘With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
文摘This ancient city has a history going back over 2,000 years.It has witnessed the fusion of multiple ethnic cultures including the Miao,Dong,and Han,and hosts a number of cultural heritage sites.THE old town of Zhenyuan is located in Zhenyuan County,Qiandongnan Miao and Dong Autonomous Prefecture in southwest China’s Guizhou Province.Covering an area of just around three square kilometers,it sits on the banks of the Wuyang River and is surrounded by mountains.Zhenyuan has been a county for more than 2,281 years and was the prefectural capital during the Yuan(1271-1368)and Qing(1644-1911)dynasties.It is a multicultural region,with Miao,Dong,and other ethnic minorities making up nearly half of the population.
文摘With the vigorous development of Internet of Things(IoT)technology,the demand for communication and data exchange between different types of IoT devices is increasing day by day.To solve the problems of diversity and complexity of communication protocols between devices,this paper proposes a design scheme of a multi-connector IoT central gateway based on Raspberry Pi and Docker.Through the research and application of related technologies,by integrating multiple communication interfaces and utilizing containerization technology,an efficient,flexible,and scalable IoT central gateway has been realized,which can support the connection and data interaction of multiple communication protocols and provide strong support for the stable operation and development of the IoT system.