We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC), which shows more loss resistibility, less communication cost, and no delay at receivers. The EMTC sc...We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC), which shows more loss resistibility, less communication cost, and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme, and integrates the advantages of both. In this scheme, stream is firstly divided into blocks with n packets, and each block consists of m clusters, everyone of which contains a tree of packets. All clusters are chained together. Through EMTC, packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols, the proposed scheme has the following advantages: ① dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side.展开更多
Pruni Semen,the seed of several unique Prunus plants,is a traditional purgative herbal material.To determine the authentic sources of Pruni Semen,46 samples from four species were collected and analyzed.Ten compounds ...Pruni Semen,the seed of several unique Prunus plants,is a traditional purgative herbal material.To determine the authentic sources of Pruni Semen,46 samples from four species were collected and analyzed.Ten compounds including multiflorin A(Mul A),a notable purative compound,were isolated and identified by chemical separation and nuclear magnetic resonance spectroscopy.Seventy-six communal components were identified by ultra-high performance liquid chromatography with linear ion trap-quadrupole Orbitrap mass spectrometry,and acetyl flavonoid glycosides were recognized as characteristic constituents.The flavonoids were distributed in the seed coat and cyanogenic glycosides in the kernel.Based on this,methods for identifying Pruni Semen from different sources were established using chemical fingerprinting,quantitative analysis of the eight principal compounds,hierarchical cluster analysis,principal component analysis,and orthogonal partial least squares discriminant analysis.The results showed that the samples were divided into two categories:one is the small seeds from Prunus humilis(Ph)and Prunus japonica(Pj),and the other is the big seeds from Prunus pedunculata(Pp)and Prunus triloba(Pt).The average content of Mul A was 3.02,6.93,0.40,and 0.29 mg/g,while the average content of amygdalin was 18.5,17.7,31.5,and 30.9 mg/g in Ph,Pj,Pp,and Pt,respectively.All the above information suggests that small seeds might be superior sources of Pruni Semen.This is the first comprehensive report on the identification of chemical components in Pruni Semen from different species.展开更多
The overload of traditional cryptosystems is too high for real-time applications so there is a need to design a new encryption and signature scheme for the multicast applications. In this paper, we use the elliptic cu...The overload of traditional cryptosystems is too high for real-time applications so there is a need to design a new encryption and signature scheme for the multicast applications. In this paper, we use the elliptic curve cryptosystem to design a source authentication scheme for real-time applications. The proposed scheme uses the message recovery signature to reduce the computation cost. Thus, the proposed source authentication scheme is more suitable for real-time applications, such as online meeting, online movie, and online music.展开更多
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such...The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity.展开更多
基金Supported by the National Natural Science Foun-dation of China (605731120)
文摘We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC), which shows more loss resistibility, less communication cost, and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme, and integrates the advantages of both. In this scheme, stream is firstly divided into blocks with n packets, and each block consists of m clusters, everyone of which contains a tree of packets. All clusters are chained together. Through EMTC, packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols, the proposed scheme has the following advantages: ① dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side.
基金sponsored by the Key Research and Development Programs in the Ningxia Hui Autonomous Region,China(Grant No.:2020BBF02027)Beijing Natural Science Foundation(Grant No.:5212014).
文摘Pruni Semen,the seed of several unique Prunus plants,is a traditional purgative herbal material.To determine the authentic sources of Pruni Semen,46 samples from four species were collected and analyzed.Ten compounds including multiflorin A(Mul A),a notable purative compound,were isolated and identified by chemical separation and nuclear magnetic resonance spectroscopy.Seventy-six communal components were identified by ultra-high performance liquid chromatography with linear ion trap-quadrupole Orbitrap mass spectrometry,and acetyl flavonoid glycosides were recognized as characteristic constituents.The flavonoids were distributed in the seed coat and cyanogenic glycosides in the kernel.Based on this,methods for identifying Pruni Semen from different sources were established using chemical fingerprinting,quantitative analysis of the eight principal compounds,hierarchical cluster analysis,principal component analysis,and orthogonal partial least squares discriminant analysis.The results showed that the samples were divided into two categories:one is the small seeds from Prunus humilis(Ph)and Prunus japonica(Pj),and the other is the big seeds from Prunus pedunculata(Pp)and Prunus triloba(Pt).The average content of Mul A was 3.02,6.93,0.40,and 0.29 mg/g,while the average content of amygdalin was 18.5,17.7,31.5,and 30.9 mg/g in Ph,Pj,Pp,and Pt,respectively.All the above information suggests that small seeds might be superior sources of Pruni Semen.This is the first comprehensive report on the identification of chemical components in Pruni Semen from different species.
文摘The overload of traditional cryptosystems is too high for real-time applications so there is a need to design a new encryption and signature scheme for the multicast applications. In this paper, we use the elliptic curve cryptosystem to design a source authentication scheme for real-time applications. The proposed scheme uses the message recovery signature to reduce the computation cost. Thus, the proposed source authentication scheme is more suitable for real-time applications, such as online meeting, online movie, and online music.
基金supported in part by the National Key R&D Program of China under Project 2020YFB1006004the Guangxi Natural Science Foundation under Grants 2019GXNSFFA245015 and 2019GXNSFGA245004+2 种基金the National Natural Science Foundation of China under Projects 62162017,61862012,61962012,and 62172119the Major Key Project of PCL under Grants PCL2021A09,PCL2021A02 and PCL2022A03the Innovation Project of Guangxi Graduate Education YCSW2021175.
文摘The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity.