E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) ...E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.展开更多
Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an ...Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest participants, but also features high efficiency and practicability. The new protocol also avoids transaction from an ambiguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction protocol.展开更多
Recently,Hwang et al.proposed a (t,n) threshold-proxy (c,m) thresholdsignature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then onl...Recently,Hwang et al.proposed a (t,n) threshold-proxy (c,m) thresholdsignature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then only c or more proxy signers can cooperatively generate threshold-proxy threshold-signature.In this scheme,they claimed that original signers cannot forge the proxy signature and the proxy signers cannot forge signature on behalf of the original signers.However,in this paper,we will give a attack to show that their scheme can not resist impersonation attacks.展开更多
This study was conducted to analyze the phenotypic and genotypic similarity or diversity of rice (Oryza sativa L.) landraces in household and hypothermic genebank conservations in Hunan Province and identify the gen...This study was conducted to analyze the phenotypic and genotypic similarity or diversity of rice (Oryza sativa L.) landraces in household and hypothermic genebank conservations in Hunan Province and identify the genetic distance between the rice landraces with the same or similar names. A total of 92 accessions of rice landraces were divided into seven groups according to their local names, but the morphological traits showed large variations even within the same group as well as between household and genebank conservations. The SSR marker analysis showed that, in all the groups except Group E, the allelic variations within each subgroup of the household conservation were less than those of the genebank conservation, indicating the household-conserved rice landraces’ many-generation purifcation from natural and artifcial selections in the process of their cultivation year after year; and the similarity coeffcient among the household rice landraces was the highest except for Groups C and E. Thus, the study suggested that the same-name or similar-name rice resources retained by farmers would be valuable for collection and evaluation.展开更多
The redevelopment of historic cities is often challenged by intricate--and in many cases contradictory--missions. From one side, there is the urge to comprehensively preserve cultural resources. At the same time, oppo...The redevelopment of historic cities is often challenged by intricate--and in many cases contradictory--missions. From one side, there is the urge to comprehensively preserve cultural resources. At the same time, opportunities of economic growth should be made available and needs of contemporary living maintained and nourished. The main aim of this paper is to reconcile probable incompatibilities between such missions through promoting "sensitive" redevelopment approaches in historic cities. The paper focuses on the city of Luxor, Egypt with its immensely capturing yet quite undermined legend: the Avenue of Sphinxes. In Luxor, the injection of nonintrusive interventions presents itself as a highly potential candidate in protecting and enhancing the experience of the avenue while meeting contemporary needs of living. Adopting less sensitive development approaches can lead the quality of experiencing the whole city to be worsened for the increasing numbers of tourists and locals.展开更多
Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditio...Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node, The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery.展开更多
基金Supported by the National Natural Science Foundation of China(No.60073052)
文摘E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.
文摘Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest participants, but also features high efficiency and practicability. The new protocol also avoids transaction from an ambiguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction protocol.
基金Supported by the National Natural Science Foundation of China(10871205)
文摘Recently,Hwang et al.proposed a (t,n) threshold-proxy (c,m) thresholdsignature schemes,in which only any t or more original signers of n original signers can authorize a proxy group of m proxy signers and then only c or more proxy signers can cooperatively generate threshold-proxy threshold-signature.In this scheme,they claimed that original signers cannot forge the proxy signature and the proxy signers cannot forge signature on behalf of the original signers.However,in this paper,we will give a attack to show that their scheme can not resist impersonation attacks.
基金Supported by Protection Fund for Species Resources of Ministry of Agriculture(1120162130135252036)the Third Chinese Crop Germplasm Resources Census and CollectionSpecial Fund for National Modern Agro-Industrial Technology System Construction(nycytx-001)~~
文摘This study was conducted to analyze the phenotypic and genotypic similarity or diversity of rice (Oryza sativa L.) landraces in household and hypothermic genebank conservations in Hunan Province and identify the genetic distance between the rice landraces with the same or similar names. A total of 92 accessions of rice landraces were divided into seven groups according to their local names, but the morphological traits showed large variations even within the same group as well as between household and genebank conservations. The SSR marker analysis showed that, in all the groups except Group E, the allelic variations within each subgroup of the household conservation were less than those of the genebank conservation, indicating the household-conserved rice landraces’ many-generation purifcation from natural and artifcial selections in the process of their cultivation year after year; and the similarity coeffcient among the household rice landraces was the highest except for Groups C and E. Thus, the study suggested that the same-name or similar-name rice resources retained by farmers would be valuable for collection and evaluation.
文摘The redevelopment of historic cities is often challenged by intricate--and in many cases contradictory--missions. From one side, there is the urge to comprehensively preserve cultural resources. At the same time, opportunities of economic growth should be made available and needs of contemporary living maintained and nourished. The main aim of this paper is to reconcile probable incompatibilities between such missions through promoting "sensitive" redevelopment approaches in historic cities. The paper focuses on the city of Luxor, Egypt with its immensely capturing yet quite undermined legend: the Avenue of Sphinxes. In Luxor, the injection of nonintrusive interventions presents itself as a highly potential candidate in protecting and enhancing the experience of the avenue while meeting contemporary needs of living. Adopting less sensitive development approaches can lead the quality of experiencing the whole city to be worsened for the increasing numbers of tourists and locals.
基金Project supported by the National Natural Science Foundation of China (No. 61472100)
文摘Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node, The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery.