Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representin...Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representing 6 genera of family Tetrigidae.The collated sequences were aligned using Clustal X version 1.81 and then,the sequence variability and heredity distances based on Kimura 2-parameter model were calculated using Mega 2.1.In obtained sequences (736 bp),the average A+T content is 73.9%,ranging from 71.2% to 77.5%;the overall G+C content is 26.1%,ranging from 22.5% to 28.8%.Based on alignment of the combined sequences,185 parsimony-informative sites were revealed in 755 available base pairs.Phylogenetic trees were reconstructed using NJ,MP and ML methods with Cylindraustralia kochii as outgroup.The results indicated that the monophyletic nature of Tetrix is questioned and suggest that T.tubercarina may be given tribal rank.Our results also show that Coptltettix huanjiangensis and C.gongshanensis are the same species,i.e.Coptltettix gongshanensis Zheng,and C.huanjiangensis is the synonyms of C.gongshanensis.展开更多
Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficien...Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don’t break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems.展开更多
E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) ...E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.展开更多
The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we prese...The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature schen. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate.展开更多
Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an ...Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest participants, but also features high efficiency and practicability. The new protocol also avoids transaction from an ambiguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction protocol.展开更多
After infection and integration steps, HIV-1 transcriptions increase sharply and singly-spliced mRNAs are produced. These encode Env (gpl20 and gp41) and auxiliary proteins Vif, Vpr and VpU. The same localization wi...After infection and integration steps, HIV-1 transcriptions increase sharply and singly-spliced mRNAs are produced. These encode Env (gpl20 and gp41) and auxiliary proteins Vif, Vpr and VpU. The same localization within the unique structure of the mRNAs suggests that the VpU sequence prior to the Env could affect the Env polyprotein expression.The HIV-I infection process begins when the gpl20 subunit of the envelope glycoprotein complex interacts with its receptor(s) on the target cell. The V3 domain of gpl20 is the major determinant of cellular co-receptor binding. According to phenotypic information of HIVol isolates, sequences from the VpU to V3 regions (119 in R5- and 120 X4-tropic viruses; one per patient) were analysed. The binomial correlation phi coefficient was used to assess covariation among VpU and gpl20v3 signatures. Subsequently, average linkage hierarchical agglomerative clustering was performed. Beyond the classical V3 signatures (R5-viruses: SI1, E25D; X4-viruses: SllKR, E25KRQ), other specific V3 and novel VpU signatures were found to be statistically associated with co-receptor usage. Several statistically significant associations between V3 and VpU mutations were also observed. The dendrogram showed two distinct large clusters: one associated with R5-tropic sequences (bootstrap=0.94), involving: (a) H13NPv3, E25Dv3, Sllv3, T22Av3 and Q61Hvpu, (b) E25Av3 and L12Fvpu, (c) D44Evpu, R18Qv3 and D80Nvpu; and another associated with X4-tropic sequences (bootstrap=0.97), involving: (i) E25Iv3 and V10Avpu, (ii) 0-1insVvpc, H13Rv3, I46Lvpc, I30Mv3 and 60-62delvpu, (iii) SllKRv3 and E25KRQv3. Some of these pairs of mutations were encoded always by one specific codon. These data indicate the possible VpU mutational patterns contributing to regulation of HIV-I tropism.展开更多
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ...By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.展开更多
To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based pro...To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.展开更多
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp...A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.展开更多
The purpose of Bible translation is to enable readers to fully understand what the Bible says in their own context. The different Bible translations use different translation principles, therefore, they show different...The purpose of Bible translation is to enable readers to fully understand what the Bible says in their own context. The different Bible translations use different translation principles, therefore, they show different translated results from each other. In general, translators will make translation choices between the “word-for-word translation” and “sense-for-sense translation”. A good translation usually has two translation choices and the difference is just which kind of choice to use more. In addition to this, whether the same word can be translated consistently is also worthy of being discussed, especially in the case of a proper noun or vocabulary with special meaning. If a vocabulary with special meaning in the Bible is translated into different words, it is not only impossible to clarify the conceptual connection or logical relationship between certain words in the Bible, but also makes it possible for readers who read different Bible translations to have the different understanding of the vocabulary. Under the influence of globalization, Christian communication has become more frequent. After different readers read different Bible translations, the problem of inconsistent understanding of the same word or paragraph will be gradually revealed. This article uses the Greek word “ψυχη” to explore the above issues. “ψυχη” is a vocabulary with special meaning in the New Testament and it is mostly discussed in the anthropology of Christian theology. This article compares three English Bible translations and six Chinese Bible translations on the Greek word “ψυχη” and then finds that the Greek word “ψυχη was translated into multiple different words in a single Bible translation and in different Bible translations. This situation shows that the difference in translation may make the readers of different Bible translations have different understandings after reading.展开更多
Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single cheek is used to pay any price that is not more than the face value. ...Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single cheek is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refired cheeks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairmess is also an important issue in check systelns. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonylnity revocation is introduced to electronic check system for the fitst thne, and a model of fair electronic check system is proposed. An effieient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is elnployed to revoke the anonymity of unhonest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.展开更多
The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarante...The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side.展开更多
文摘Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representing 6 genera of family Tetrigidae.The collated sequences were aligned using Clustal X version 1.81 and then,the sequence variability and heredity distances based on Kimura 2-parameter model were calculated using Mega 2.1.In obtained sequences (736 bp),the average A+T content is 73.9%,ranging from 71.2% to 77.5%;the overall G+C content is 26.1%,ranging from 22.5% to 28.8%.Based on alignment of the combined sequences,185 parsimony-informative sites were revealed in 755 available base pairs.Phylogenetic trees were reconstructed using NJ,MP and ML methods with Cylindraustralia kochii as outgroup.The results indicated that the monophyletic nature of Tetrix is questioned and suggest that T.tubercarina may be given tribal rank.Our results also show that Coptltettix huanjiangensis and C.gongshanensis are the same species,i.e.Coptltettix gongshanensis Zheng,and C.huanjiangensis is the synonyms of C.gongshanensis.
文摘Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don’t break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems.
基金Supported by the National Natural Science Foundation of China(No.60073052)
文摘E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.
基金Acknowledgements This work was supported by the National Basic Research Program of China under Crant No. 2007CB311100, Core Electronic Devices, High-end General Purpose Chips and Basic Software Products in China under Oant No. 2010ZX01037-001-001 Ph.D. Start-up Fund of Beijing University of Technology under Grants No. X0007211201101 and No. X00700054R1764, National Soft Science Research Program under Crant No. 2010GXQ5D317 and the National Natural Science Foundation of China underGrant No. 91018008 ,Opening Project of Key Lab of Information Network Security, Ministry of Public Security under Crant No. C11610, Opening Project of State Key Laboratory of Information Security (Institute of Sottware, Chinese Academy of Sciences) under Cxant No. 04-04-1.
文摘The conventional ring signature schemes cannot address the scenario where the rank of members of the ring needs to be distinguished, for example, in electronically commerce application. To solve this problem, we presented a Trusted Platform Module (TPM)-based threshold ring signature schen. Employing a reliable secret Share Distribution Center (SDC), the proposed approach can authenticate the TPM-based identity rank of members of the ring but not track a specific member's identity. A subset including t members with the same identity rank is built. With the signing cooperation of t members of the subset, the ring signature based on Chinese remainder theorem is generated. We proved the anonymity and unforgeability of the proposed scheme and compared it with the threshold ring signature based on Lagrange interpolation polynomial. Our scheme is relatively simpler to calculate.
文摘Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest participants, but also features high efficiency and practicability. The new protocol also avoids transaction from an ambiguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction protocol.
文摘After infection and integration steps, HIV-1 transcriptions increase sharply and singly-spliced mRNAs are produced. These encode Env (gpl20 and gp41) and auxiliary proteins Vif, Vpr and VpU. The same localization within the unique structure of the mRNAs suggests that the VpU sequence prior to the Env could affect the Env polyprotein expression.The HIV-I infection process begins when the gpl20 subunit of the envelope glycoprotein complex interacts with its receptor(s) on the target cell. The V3 domain of gpl20 is the major determinant of cellular co-receptor binding. According to phenotypic information of HIVol isolates, sequences from the VpU to V3 regions (119 in R5- and 120 X4-tropic viruses; one per patient) were analysed. The binomial correlation phi coefficient was used to assess covariation among VpU and gpl20v3 signatures. Subsequently, average linkage hierarchical agglomerative clustering was performed. Beyond the classical V3 signatures (R5-viruses: SI1, E25D; X4-viruses: SllKR, E25KRQ), other specific V3 and novel VpU signatures were found to be statistically associated with co-receptor usage. Several statistically significant associations between V3 and VpU mutations were also observed. The dendrogram showed two distinct large clusters: one associated with R5-tropic sequences (bootstrap=0.94), involving: (a) H13NPv3, E25Dv3, Sllv3, T22Av3 and Q61Hvpu, (b) E25Av3 and L12Fvpu, (c) D44Evpu, R18Qv3 and D80Nvpu; and another associated with X4-tropic sequences (bootstrap=0.97), involving: (i) E25Iv3 and V10Avpu, (ii) 0-1insVvpc, H13Rv3, I46Lvpc, I30Mv3 and 60-62delvpu, (iii) SllKRv3 and E25KRQv3. Some of these pairs of mutations were encoded always by one specific codon. These data indicate the possible VpU mutational patterns contributing to regulation of HIV-I tropism.
基金Projects 60473028 supported by the National Natural Science Foundation of China and 2006XXJ17 by the Natural Science Foundation of Zhengzhou Universityof Light Industry
文摘By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.
基金Supported by the National Basic Research Program of China(No.2012CB315905)the National Natural Science Foundation of China(No.61272501)the Fund of Tianjin Key Laboratory of Civil Aircraft Airworthiness and Maintenance in CAUC and a General grant from Civil Aviation Flight University of China(No.J2013-31,Q2014-48)
文摘To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as In this paradigm, multiple proxy signer candidates identity-based proxy multi-signature (IBPMS). are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.
基金Project(61379057)supported by the National Natural Science Foundation of ChinaProject supported by the Construct Program of the Key Discipline in Hunan University of Arts and Science,China+1 种基金Project(2012BS01)supported by Science Technology Research and Development Projects of Changde,ChinaProject supported by Science and the MEST2012-002521,NRF,Korea
文摘A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.
文摘The purpose of Bible translation is to enable readers to fully understand what the Bible says in their own context. The different Bible translations use different translation principles, therefore, they show different translated results from each other. In general, translators will make translation choices between the “word-for-word translation” and “sense-for-sense translation”. A good translation usually has two translation choices and the difference is just which kind of choice to use more. In addition to this, whether the same word can be translated consistently is also worthy of being discussed, especially in the case of a proper noun or vocabulary with special meaning. If a vocabulary with special meaning in the Bible is translated into different words, it is not only impossible to clarify the conceptual connection or logical relationship between certain words in the Bible, but also makes it possible for readers who read different Bible translations to have the different understanding of the vocabulary. Under the influence of globalization, Christian communication has become more frequent. After different readers read different Bible translations, the problem of inconsistent understanding of the same word or paragraph will be gradually revealed. This article uses the Greek word “ψυχη” to explore the above issues. “ψυχη” is a vocabulary with special meaning in the New Testament and it is mostly discussed in the anthropology of Christian theology. This article compares three English Bible translations and six Chinese Bible translations on the Greek word “ψυχη” and then finds that the Greek word “ψυχη was translated into multiple different words in a single Bible translation and in different Bible translations. This situation shows that the difference in translation may make the readers of different Bible translations have different understandings after reading.
基金国家高技术研究发展计划(863计划),the National Natural Science Foundation of China
文摘Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single cheek is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refired cheeks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairmess is also an important issue in check systelns. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonylnity revocation is introduced to electronic check system for the fitst thne, and a model of fair electronic check system is proposed. An effieient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is elnployed to revoke the anonymity of unhonest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.
文摘The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side.