An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl...An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure.展开更多
This study investigated self-efficacy in breastfeeding support among public health nurses (PHNs) working at maternal and child health (MCH) services in Japanese municipalities, and its related factors such as educatio...This study investigated self-efficacy in breastfeeding support among public health nurses (PHNs) working at maternal and child health (MCH) services in Japanese municipalities, and its related factors such as education, working experience, breastfeeding experience, and postgraduate/continuous education. Directors of the MCH divisions were requested to select one PHN to answer the self-report questionnaires sent. The questionnaires were collected from October 2010 to January 2011. Of the 1750 questionnaires sent, 831 were returned (response rate: 47.5%);102 were excluded from analysis because of missing data (valid response rate: 41.7%). After adjusting the weights of PHN sampling and collection rates by prefecture and population size, Model 1 of the multiple regression analysis showed that the self-efficacy in breastfeeding support was significantly higher in large/urban municipalities (β = 0.13) and in the Kanto district. Model 2 revealed that self-efficacy was significantly associated with working experience (β = 0.13) and breastfeeding experience (β = 0.22) but not with educational background. Model 3 showed that self-efficacy was significantly associated with postgraduate education (β = 0.14) and continuous education (β = 0.12). This suggested that PHNs’ self-efficacy increased through self-enrichment. It is necessary to create training opportunities about breastfeeding support for PHNs—especially those working in remote and/or small municipalities— and to provide them with new and important information.展开更多
A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the t...A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer.展开更多
In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public k...In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better.展开更多
To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation...To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation cost than previous schemes. Furthermore, the signatmeprocess of the proposed scheme is non-interactive.展开更多
文摘An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure.
文摘This study investigated self-efficacy in breastfeeding support among public health nurses (PHNs) working at maternal and child health (MCH) services in Japanese municipalities, and its related factors such as education, working experience, breastfeeding experience, and postgraduate/continuous education. Directors of the MCH divisions were requested to select one PHN to answer the self-report questionnaires sent. The questionnaires were collected from October 2010 to January 2011. Of the 1750 questionnaires sent, 831 were returned (response rate: 47.5%);102 were excluded from analysis because of missing data (valid response rate: 41.7%). After adjusting the weights of PHN sampling and collection rates by prefecture and population size, Model 1 of the multiple regression analysis showed that the self-efficacy in breastfeeding support was significantly higher in large/urban municipalities (β = 0.13) and in the Kanto district. Model 2 revealed that self-efficacy was significantly associated with working experience (β = 0.13) and breastfeeding experience (β = 0.22) but not with educational background. Model 3 showed that self-efficacy was significantly associated with postgraduate education (β = 0.14) and continuous education (β = 0.12). This suggested that PHNs’ self-efficacy increased through self-enrichment. It is necessary to create training opportunities about breastfeeding support for PHNs—especially those working in remote and/or small municipalities— and to provide them with new and important information.
文摘A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer.
基金Supported by the National Natural Science Funda-tion of China (60403027)
文摘In traditional networks , the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this pa per, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short, the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust re quirement of hosts better.
文摘To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation cost than previous schemes. Furthermore, the signatmeprocess of the proposed scheme is non-interactive.