In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by th...In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.展开更多
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ...Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead.展开更多
Objective: To provide a kinetic model(s) and reveal the mechanism of thymoquinone and Poloxin blocking an emerging anti-cancer target, human Polo-like kinase 1 (hPlkl) Polo-box domain (PBD). Methods: The bindi...Objective: To provide a kinetic model(s) and reveal the mechanism of thymoquinone and Poloxin blocking an emerging anti-cancer target, human Polo-like kinase 1 (hPlkl) Polo-box domain (PBD). Methods: The binding kinetics was determined by using a fluorescence polarization based assay. The putative mechanism was examined with a competition test. Results: Thymoquinone follows a one-step binding with an association rate constant (k1) of 6.635× 10^3 L.mol^-1 min^-1.Poloxin fit a two-step binding with a dissociation constant (Ki) of 118 μmol/L for the intermediate complex and its isomerization rate (k4) of 0.131 5 minJ to form an irreversible adduct. No significant dissociation was observed for either ligand up to 13 h. The inhibitors responded insignificantly to the presence of Michael donors as hPIkl-PBD competitors. Conclusion: Thymoquinone and Poloxin are slow-tight ligands to the hPlkl-PBD with kinetic models distinct from each other. Michael addition as the mechanism is excluded.展开更多
The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to...The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.展开更多
Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme bas...Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme based on factoring, and prove that it is secure in the random oracle. Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme.展开更多
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontriviai scheme has attracted great interests because o~ its...Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontriviai scheme has attracted great interests because o~ its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.展开更多
文摘In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.
基金financially supported by Shenzhen Key Fundamental Research Projects(Grant No.:JCYJ20170306091556329).
文摘Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead.
基金a co-sponsored graduate research project by China Pharmaceutical University and Shanghai Medicilon Inc
文摘Objective: To provide a kinetic model(s) and reveal the mechanism of thymoquinone and Poloxin blocking an emerging anti-cancer target, human Polo-like kinase 1 (hPlkl) Polo-box domain (PBD). Methods: The binding kinetics was determined by using a fluorescence polarization based assay. The putative mechanism was examined with a competition test. Results: Thymoquinone follows a one-step binding with an association rate constant (k1) of 6.635× 10^3 L.mol^-1 min^-1.Poloxin fit a two-step binding with a dissociation constant (Ki) of 118 μmol/L for the intermediate complex and its isomerization rate (k4) of 0.131 5 minJ to form an irreversible adduct. No significant dissociation was observed for either ligand up to 13 h. The inhibitors responded insignificantly to the presence of Michael donors as hPIkl-PBD competitors. Conclusion: Thymoquinone and Poloxin are slow-tight ligands to the hPlkl-PBD with kinetic models distinct from each other. Michael addition as the mechanism is excluded.
基金supported in part by the National Natural Science Foundation of China under Grant Nos. 61033014,60970110,60972034the National 973 Program under Grant No.2007CB311201
文摘The focus of this paper is to design an efficient and secure solution addressing the semi trusted issue in proxy re-signature schemes, i.e., the proxy knows the re-signature key from user A to user B, so he is able to translate any signatures made by user A to user B, which damages the essential requirement ("non-repudiation" property) of proxy re-signature schemes. In this paper, the authors first define the security model for threshold proxy re-signature scheme, and then propose two threshold proxy re-signature schemes based on Ateniese-Hohenberger's and Shao-Cao-Wang-Liang's approach.
基金the National Basic Research Program(973) of China (No. 2007CB31074)the National Natural Science Foundation of China (No. 90718001)
文摘Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme based on factoring, and prove that it is secure in the random oracle. Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme.
基金Supported by the National Natural Science Foundation of China under Grant No.61303039Sichuan Youth Science and Technique Foundation No.2017JQ0048+2 种基金Fundamental Research Funds for the Central Universities(Nos.2682014CX095)CSC ScholarshipEU ICT COST Crypto Action No.IC1306
文摘Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontriviai scheme has attracted great interests because o~ its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.