The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua...The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.展开更多
AIM:To evaluate the relationship between donor safety and remnant liver volume in right lobe living donor liver transplantation(LDLT).METHODS:From July 2001 to January 2009,our liver transplant centers carried out 197...AIM:To evaluate the relationship between donor safety and remnant liver volume in right lobe living donor liver transplantation(LDLT).METHODS:From July 2001 to January 2009,our liver transplant centers carried out 197 LDLTs.The clinical data from 151 cases of adult right lobe living donors(not including the middle hepatic vein) were analyzed.The conditions of the three groups of donors were well matched in terms of the studied parameters.The donors' preoperative data,intraoperative and postoperative data were calculated for the three groups:Group 1 remnant liver volume(RLV) < 35%,group 2 RLV 36%-40%,and group 3 RLV > 40%.Comparisons included the different remnant liver volumes on postoperative liver function recovery and the impact of systemic conditions.Correlations between remnant liver volume and post-operative complications were also analyzed.RESULTS:The donors' anthroposomatology data,op-eration time,and preoperative donor blood test indicators were calculated for the three groups.No significant differences were observed between the donors' gender,age,height,weight,and operation time.According to the Chengdu standard liver volume formula,the total liver volume of group 1 was 1072.88 ± 131.06 mL,group 2 was 1043.84 ± 97.11 mL,and group 3 was 1065.33 ± 136.02 mL.The three groups showed no statistically significant differences.When the volume of the remnant liver was less than 35% of the total liver volume,the volume of the remnant had a significant effect on the recovery of liver function and intensive care unit time.In addition,the occurrence of complications was closely related to the remnant liver volume.When the volume of the remnant liver was more than 35% of the total liver volume,the remnant volume change had no significant effect on donor recovery.CONCLUSION:To ensure donor safety,the remnant liver volume should be greater than the standard liver volume(35%) in right lobe living donor liver transplantation.展开更多
In terms of reflection transformation of a matrix product state (MPS), the parity of the MPS is defined. Based on the reflective parity non-conserved MPS pair we construct the even-parity state |ψe〉 and the odd-p...In terms of reflection transformation of a matrix product state (MPS), the parity of the MPS is defined. Based on the reflective parity non-conserved MPS pair we construct the even-parity state |ψe〉 and the odd-parity state |ψσ〉. It is interesting to find that the parity non-conserved reflective MPS pair have no long-range correlations; instead the even-parity state |ψe〉 and the odd-parity state |ψo〉 constructed from them have the same long-range correlations for the parity non-conserved block operators. Moreover, the entanglement between a block of n contiguous spins and the rest of the spin chain for the states |ψe〉 and |ψo〉 is larger than that for the reflective MPS pair except for n = 1, and the difference of them approaches 1 monotonically and asymptotically from 0 as n increases from 1. These characteristics indicate that MPS parity as a conserved physical quantity represents a kind of coherent collective quantum mode, and that the parity conserved MPSs contain more correlation, coherence, and entanglement than the parity non-conserved ones.展开更多
The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different re...The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different requirements from the traditional security protocols.In order to solve this problem,first,we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle(MITM) attacks in some cases based on the extended SSM.Then,we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.展开更多
This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is a...This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is analyzed in detail,and this paper indicates that the scheme can withstand the up to date differential cryptanalysis.We give heuristic arguments to show that this scheme resists all known attacks.展开更多
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall...Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.展开更多
As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and mos...As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting.展开更多
With the development of high-speed railways in China,more than 2000 high-speed trains will be put into use.Safety and efficiency of railway transportation is increasingly important.We have designed a high availability...With the development of high-speed railways in China,more than 2000 high-speed trains will be put into use.Safety and efficiency of railway transportation is increasingly important.We have designed a high availability quadruple vital computer (HAQVC) system based on the analysis of the architecture of the traditional double 2-out-of-2 system and 2-out-of-3 system.The HAQVC system is a system with high availability and safety,with prominent characteristics such as fire-new internal architecture,high efficiency,reliable data interaction mechanism,and operation state change mechanism.The hardware of the vital CPU is based on ARM7 with the real-time embedded safe operation system (ES-OS).The Markov modeling method is designed to evaluate the reliability,availability,maintainability,and safety (RAMS) of the system.In this paper,we demonstrate that the HAQVC system is more reliable than the all voting triple modular redundancy (AVTMR) system and double 2-out-of-2 system.Thus,the design can be used for a specific application system,such as an airplane or high-speed railway system.展开更多
基金the National Natural Science Foundation of China,the State Key Program of National Natural Science of China,the Major Research Plan of the National Natural Science Foundation of China,Major State Basic Research Development Program of China (973 Program),the Hubei Natural Science Foundation of China
文摘The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.
文摘AIM:To evaluate the relationship between donor safety and remnant liver volume in right lobe living donor liver transplantation(LDLT).METHODS:From July 2001 to January 2009,our liver transplant centers carried out 197 LDLTs.The clinical data from 151 cases of adult right lobe living donors(not including the middle hepatic vein) were analyzed.The conditions of the three groups of donors were well matched in terms of the studied parameters.The donors' preoperative data,intraoperative and postoperative data were calculated for the three groups:Group 1 remnant liver volume(RLV) < 35%,group 2 RLV 36%-40%,and group 3 RLV > 40%.Comparisons included the different remnant liver volumes on postoperative liver function recovery and the impact of systemic conditions.Correlations between remnant liver volume and post-operative complications were also analyzed.RESULTS:The donors' anthroposomatology data,op-eration time,and preoperative donor blood test indicators were calculated for the three groups.No significant differences were observed between the donors' gender,age,height,weight,and operation time.According to the Chengdu standard liver volume formula,the total liver volume of group 1 was 1072.88 ± 131.06 mL,group 2 was 1043.84 ± 97.11 mL,and group 3 was 1065.33 ± 136.02 mL.The three groups showed no statistically significant differences.When the volume of the remnant liver was less than 35% of the total liver volume,the volume of the remnant had a significant effect on the recovery of liver function and intensive care unit time.In addition,the occurrence of complications was closely related to the remnant liver volume.When the volume of the remnant liver was more than 35% of the total liver volume,the remnant volume change had no significant effect on donor recovery.CONCLUSION:To ensure donor safety,the remnant liver volume should be greater than the standard liver volume(35%) in right lobe living donor liver transplantation.
基金Supported by the Scientific Research Foundation of CUIT under Grant No.KYTZ201024the National Natural Science Foundation of China under Grant Nos.10775100,10974137 the Fund of Theoretical Nuclear Center of HIRFL of China
文摘In terms of reflection transformation of a matrix product state (MPS), the parity of the MPS is defined. Based on the reflective parity non-conserved MPS pair we construct the even-parity state |ψe〉 and the odd-parity state |ψσ〉. It is interesting to find that the parity non-conserved reflective MPS pair have no long-range correlations; instead the even-parity state |ψe〉 and the odd-parity state |ψo〉 constructed from them have the same long-range correlations for the parity non-conserved block operators. Moreover, the entanglement between a block of n contiguous spins and the rest of the spin chain for the states |ψe〉 and |ψo〉 is larger than that for the reflective MPS pair except for n = 1, and the difference of them approaches 1 monotonically and asymptotically from 0 as n increases from 1. These characteristics indicate that MPS parity as a conserved physical quantity represents a kind of coherent collective quantum mode, and that the parity conserved MPSs contain more correlation, coherence, and entanglement than the parity non-conserved ones.
基金supported in part by the National Natural Science Foundation of China under Grants No.60473072,No.60803151the Joint Fund of Natural Science Foundation of China with the Guangdong Provincial Government under Grant No.U0632004
文摘The TNC IF-T Protocol Binding to TLS(TIPBT) is specified by Trusted Computing Group(TCG) for TNC assessment exchanges.However,the TIPBT cannot be analysed by current Strand Space Model(SSM) because of the different requirements from the traditional security protocols.In order to solve this problem,first,we give an extension of the SSM and point out the TIPBT cannot prevent Man-in-the-Middle(MITM) attacks in some cases based on the extended SSM.Then,we improve the TIPBT and show that the improved TIPBT can resist MITM attacks in the extended SSM.
基金ACKNOWLEDGEMENT This work is supported by the National Natural Science Foundation of China under Grant No.61103210, the Mathematical Tianyuan Foundation of China under Grant No.11226274, the Fundamental Research Funds for the Central Universities: DKYPO 201301, 2014 XSYJ09, YZDJ1102 and YZDJ1103, the Fund of Beijing Electronic Science and Technology Institute: 2014 TD2OHW, and the Fund of BESTI Information Security Key Laboratory: YQNJ1005.
文摘This paper presents a multivariate public key cryptographic scheme over a finite field with odd prime characteristic.The idea of embedding and layering is manifested in its construction.The security of the scheme is analyzed in detail,and this paper indicates that the scheme can withstand the up to date differential cryptanalysis.We give heuristic arguments to show that this scheme resists all known attacks.
文摘Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.
基金Supported by the National High Technology Research and Development Programme of China ( No. 2008AA092301 ) and the National Natural Science Foundation of China (No. 50879014).
文摘As a special kind of digital signature, verifiably encrypted signatures are used as a building block to construct optimistic fair exchange. Many verifiably encrypted signature schemes have been proposed so far and most of them were proven secure under certain complexity assumptions. In this paper, however, we find that although some schemes are secure in a single-user setting, they are not secure in a multi-user setting any more. We show that Zhang, et al. ' s scheme, Gorantla, et al. ' s scheme and Ming, et al. ' s scheme are vulnerable to key substitution attacks, where an adversary can generate new keys satisfying legitimate verifiably encrypted signatures created by the legitimate users. We also show that this kind of attacks can breach the fairness when they are used in fair exchange in a multi-user setting.
基金Project(No.2009BAG12A05) supported by the National Key Technology R&D Program of China
文摘With the development of high-speed railways in China,more than 2000 high-speed trains will be put into use.Safety and efficiency of railway transportation is increasingly important.We have designed a high availability quadruple vital computer (HAQVC) system based on the analysis of the architecture of the traditional double 2-out-of-2 system and 2-out-of-3 system.The HAQVC system is a system with high availability and safety,with prominent characteristics such as fire-new internal architecture,high efficiency,reliable data interaction mechanism,and operation state change mechanism.The hardware of the vital CPU is based on ARM7 with the real-time embedded safe operation system (ES-OS).The Markov modeling method is designed to evaluate the reliability,availability,maintainability,and safety (RAMS) of the system.In this paper,we demonstrate that the HAQVC system is more reliable than the all voting triple modular redundancy (AVTMR) system and double 2-out-of-2 system.Thus,the design can be used for a specific application system,such as an airplane or high-speed railway system.