Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can...Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can sign a message with any predicate that is satisfied by his attributes set. Unfortunately, there does not exist an attributebased signature which is resistance to the quantum attacks. This means we do not have secure attribute-based signature schemes in a post-quantum world. Based on this consideration, an attribute-based signature on lattices,which could resist quantum attacks, is proposed. This scheme employs "bonsai tree" techniques, and could be proved secure under the hardness assumption of small integer solution problem.展开更多
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-end...In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-endorsement mechanism.In this mechanism a single user,whose attributes satisfy the predicate,endorses the message.This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer.The security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.展开更多
Inspired by the framework of Boyen, in this paper, an attribute-based signature(ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity's attributes set corresponds to t...Inspired by the framework of Boyen, in this paper, an attribute-based signature(ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity's attributes set corresponds to the concatenation of a lattice matrix with the sum of some random matrices, and the signature vector is generated by using the Preimage Sampling algorithm. Compared with current attribute-based signature schemes, this scheme can resist quantum attacks and enjoy shorter public-key, smaller signature size and higher efficiency.展开更多
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma...Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellman assumption in the random oracle model. Unfortunately, by carefully revisiting the design and security proof of Wang et alfs scheme, we show that their scheme cannot provide unforgeability, namely, a forger, whose attributes do not satisfy a given signing predicate, can also generate valid signatures. We also point out the flaws in Wang et al.'s proof.展开更多
High-precision and real-time diagnosis of sucker rod pumping system(SRPS)is important for quickly mastering oil well operations.Deep learning-based method for classifying the dynamometer card(DC)of oil wells is an eff...High-precision and real-time diagnosis of sucker rod pumping system(SRPS)is important for quickly mastering oil well operations.Deep learning-based method for classifying the dynamometer card(DC)of oil wells is an efficient diagnosis method.However,the input of the DC as a two-dimensional image into the deep learning framework suffers from low feature utilization and high computational effort.Additionally,different SRPSs in an oil field have various system parameters,and the same SRPS generates different DCs at different moments.Thus,there is heterogeneity in field data,which can dramatically impair the diagnostic accuracy.To solve the above problems,a working condition recognition method based on 4-segment time-frequency signature matrix(4S-TFSM)and deep learning is presented in this paper.First,the 4-segment time-frequency signature(4S-TFS)method that can reduce the computing power requirements is proposed for feature extraction of DC data.Subsequently,the 4S-TFSM is constructed by relative normalization and matrix calculation to synthesize the features of multiple data and solve the problem of data heterogeneity.Finally,a convolutional neural network(CNN),one of the deep learning frameworks,is used to determine the functioning conditions based on the 4S-TFSM.Experiments on field data verify that the proposed diagnostic method based on 4S-TFSM and CNN(4S-TFSM-CNN)can significantly improve the accuracy of working condition recognition with lower computational cost.To the best of our knowledge,this is the first work to discuss the effect of data heterogeneity on the working condition recognition performance of SRPS.展开更多
The discovery of high-temperature superconductivity near 80K in bilayer nickelate La_(3)Ni_(2)O_(7)under high pressures has renewed the exploration of superconducting nickelate in bulk materials.The extension of super...The discovery of high-temperature superconductivity near 80K in bilayer nickelate La_(3)Ni_(2)O_(7)under high pressures has renewed the exploration of superconducting nickelate in bulk materials.The extension of superconductivity in other nickelates in a broader family is also essential.Here,we report the experimental observation of superconducting signature in trilayer nickelate La_(4)Ni_(3)O_(10)under high pressures.By using a modified solgel method and post-annealing treatment under high oxygen pressure,we successfully obtained polycrystalline La_(4)Ni_(3)O_(10)samples with different transport behaviors at ambient pressure.Then we performed high-pressure electrical resistance measurements on these samples in a diamond-anvil-cell apparatus.Surprisingly,the signature of possible superconducting transition with a maximum transition temperature(T_(c))of about 20K under high pressures is observed,as evidenced by a clear drop of resistance and the suppression of resistance drops under magnetic fields.Although the resistance drop is sample-dependent and relatively small,it appears in all of our measured samples.We argue that the observed superconducting signal is most likely to originate from the main phase of La_(4)Ni_(3)O_(10).Our findings will motivate the exploration of superconductivity in a broader family of nickelates and shed light on the understanding of the underlying mechanisms of high-T_(c) superconductivity in nickelates.展开更多
A metropolitan city such as Los Angeles (LA) is an ideal study site with a very high population density, and it houses at least 3 treatment plants where sewage is treated preliminarily and then progressing to tertiary...A metropolitan city such as Los Angeles (LA) is an ideal study site with a very high population density, and it houses at least 3 treatment plants where sewage is treated preliminarily and then progressing to tertiary treatment before discharging into the LA River. We will gain a better understanding of the water quality in the LA River and the nitrate load in the watershed system by examining the influence of waste water treatment plants (WWTPs). The goal of this study is to pinpoint the exact source of nitrate in the LA River using the isotope signatures. We have selected sampling locations both upstream and downstream of the WWTP. This serves to monitor nitrate levels, aiding in the assessment of treatment plant effectiveness, pinpointing nitrate pollution sources, and ensuring compliance with environmental regulations. The research explores the isotopic composition of NO3 in relation to atmospheric nitrogen and Vienna Standard Mean Ocean Water, shedding light on the contributions from various sources such as manure, sewage, soil organic nitrogen, and nitrogen fertilizers. Specifically, there is a change in the δ15NAir value between the dry and wet seasons. The isotope values in the Tillman WWTP sample changed between dry and wet seasons. Notably, the presence of nitrate originating from manure and sewage is consistent across seasons, emphasizing the significant impact of anthropogenic and agricultural activities on water quality. This investigation contributes to the broader understanding of nitrogen cycling in urban water bodies, particularly in the context of wastewater effluent discharge. The findings hold implications for water quality management and highlight the need for targeted interventions to mitigate the impact of nitrogen-containing compounds on aquatic ecosystems. Overall, the study provides a valuable framework for future research and environmental stewardship efforts aimed at preserving the health and sustainability of urban water resources. This data informs decisions regarding additional treatment or mitigation actions to safeguard downstream water quality and ecosystem health.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key mot...Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key motivating factor for embarking on this study. This study was necessitated by the damages and dangers posed by signature forgery coupled with the intractable nature of the problem. The aim and objectives of this study is to design a proactive and responsive system that could compare two signature samples and detect the correct signature against the forged one. Dynamic Signature verification is an important biometric technique that aims to detect whether a given signature is genuine or forged. In this research work, Convolutional Neural Networks (CNNsor ConvNet) which is a class of deep, feed forward artificial neural networks that has successfully been applied to analysing visual imagery was used to train the model. The signature images are stored in a file directory structure which the Keras Python library can work with. Then the CNN was implemented in python using the Keras with the TensorFlow backend to learn the patterns associated with the signature. The result showed that for the same CNNs-based network experimental result of average accuracy, the larger the training dataset, the higher the test accuracy. However, when the training dataset are insufficient, better results can be obtained. The paper concluded that by training datasets using CNNs network, 98% accuracy in the result was recorded, in the experimental part, the model achieved a high degree of accuracy in the classification of the biometric parameters used.展开更多
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed...With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.展开更多
Location awareness in wireless networks is essential for emergency services,navigation,gaming,and many other applications.This article presents a method for source localization based on measuring the amplitude-phase d...Location awareness in wireless networks is essential for emergency services,navigation,gaming,and many other applications.This article presents a method for source localization based on measuring the amplitude-phase distribution of the field at the base station.The existing scatterers in the target area create unique scattered field interference at each source location.The unique field interference at each source location results in a unique field signature at the base station which is used for source localization.In the proposed method,the target area is divided into a grid with a step of less than half the wavelength.Each grid node is characterized by its field signature at the base station.Field signatures corresponding to all nodes are normalized and stored in the base station as fingerprints for source localization.The normalization of the field signatures avoids the need for time synchronization between the base station and the source.When a source transmits signals,the generated field signature at the base station is normalized and then correlated with the stored fingerprints.The maximum correlation value is given by the node to which the source is the closest.Numerical simulations and results of experiments on ultrasonic waves in the air show that the ultrasonic source is correctly localized using broadband field signatures with one base station and without time synchronization.The proposed method is potentially applicable for indoor localization and navigation of mobile robots.展开更多
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot...In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage.展开更多
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ...The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data.展开更多
Plant protein beverage adulteration occurs frequently,which may cause health problems for consumers due to the hidden allergens.Hence,a novel method was developed for authentication by ultra-performance liquid chromat...Plant protein beverage adulteration occurs frequently,which may cause health problems for consumers due to the hidden allergens.Hence,a novel method was developed for authentication by ultra-performance liquid chromatography-tandem mass spectrometry(UPLC-MS/MS).Almond,peanut,walnut and soybean were hydrolyzed,followed by separation by NanoLC-Triple TOF MS.The obtained fingerprints were identified by ProteinPilotTM combined with Uniprot,and 16 signature peptides were selected.Afterwards,plant protein beverages treated by trypsin hydrolysis were analyzed with UPLC-MS/MS.This method showed a good linear relationship with R2>0.99403.The limit of quantification(LOQ)were 0.015,0.01,0.5 and 0.05 g/L for almond,peanut,walnut and soybean,respectively.Mean recoveries ranged from 84.77%to 110.44%with RSDs<15%.The developed method was successfully applied to the adulteration detection of 31 plant protein beverages to reveal adulteration and false labeling.Conclusively,this method could provide technical support for authentication of plant protein beverages to protect the rights and health of consumers.展开更多
Colorectal cancer(CRC)belongs to the class of significantly malignant tumors found in humans.Recently,dysregulated fatty acid metabolism(FAM)has been a topic of attention due to its modulation in cancer,specifically C...Colorectal cancer(CRC)belongs to the class of significantly malignant tumors found in humans.Recently,dysregulated fatty acid metabolism(FAM)has been a topic of attention due to its modulation in cancer,specifically CRC.However,the regulatory FAM pathways in CRC require comprehensive elucidation.Methods:The clinical and gene expression data of 175 fatty acid metabolic genes(FAMGs)linked with colon adenocarcinoma(COAD)and normal cornerstone genes were gathered through The Cancer Genome Atlas(TCGA)-COAD corroborating with the Molecular Signature Database v7.2(MSigDB).Initially,crucial prognostic genes were selected by uni-and multi-variate Cox proportional regression analyses;then,depending upon these identified signature genes and clinical variables,a nomogram was generated.Lastly,to assess tumor immune characteristics,concomitant evaluation of tumor immune evasion/risk scoring were elucidated.Results:A 8-gene signature,including ACBD4,ACOX1,CD36,CPT2,ELOVL3,ELOVL6,ENO3,and SUCLG2,was generated,and depending upon this,CRC patients were categorized within high-risk(H-R)and low-risk(L-R)cohorts.Furthermore,risk and age-based nomograms indicated moderate discrimination and good calibration.The data confirmed that the 8-gene model efficiently predicted CRC patients’prognosis.Moreover,according to the conjoint analysis of tumor immune evasion and the risk scorings,the H-R cohort had an immunosuppressive tumor microenvironment,which caused a substandard prognosis.Conclusion:This investigation established a FAMGs-based prognostic model with substantially high predictive value,providing the possibility for improved individualized treatment for CRC individuals.展开更多
BACKGROUND Gastric cancer(GC)is a highly aggressive malignancy with a heterogeneous nature,which makes prognosis prediction and treatment determination difficult.Inflammation is now recognized as one of the hallmarks ...BACKGROUND Gastric cancer(GC)is a highly aggressive malignancy with a heterogeneous nature,which makes prognosis prediction and treatment determination difficult.Inflammation is now recognized as one of the hallmarks of cancer and plays an important role in the aetiology and continued growth of tumours.Inflammation also affects the prognosis of GC patients.Recent reports suggest that a number of inflammatory-related biomarkers are useful for predicting tumour prognosis.However,the importance of inflammatory-related biomarkers in predicting the prognosis of GC patients is still unclear.AIM To investigate inflammatory-related biomarkers in predicting the prognosis of GC patients.was constructed using the least absolute shrinkage and selection operator Cox regression model based on the GEO database.GC patients from the GSE26253 cohort were used for validation.Univariate and multivariate Cox analyses were used to determine the independent prognostic factors,and a prognostic nomogram was established.The calibration curve and the area under the curve based on receiver operating characteristic analysis were utilized to evaluate the predictive value of the nomogram.The decision curve analysis results were plotted to quantify and assess the clinical value of the nomogram.Gene set enrichment analysis was performed to explore the potential regulatory pathways involved.The relationship between tumour immune infiltration status and risk score was analysed via Tumour Immune Estimation Resource and CIBERSORT.Finally,we analysed the association between risk score and patient sensitivity to commonly used chemotherapy and targeted therapy agents.RESULTS A prognostic model consisting of three inflammatory-related genes(MRPS17,GUF1,and PDK4)was constructed.Independent prognostic analysis revealed that the risk score was a separate prognostic factor in GC patients.According to the risk score,GC patients were stratified into high-and low-risk groups,and patients in the high-risk group had significantly worse prognoses according to age,sex,TNM stage and Lauren type.Consensus clustering identified three subtypes of inflammation that could predict GC prognosis more accurately than traditional grading and staging.Finally,the study revealed that patients in the low-risk group were more sensitive to certain drugs than were those in the high-risk group,indicating a link between inflammation-related genes and drug sensitivity.CONCLUSION In conclusion,we established a novel three-gene prognostic signature that may be useful for predicting the prognosis and personalizing treatment decisions of GC patients.展开更多
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a...This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution.展开更多
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functio...The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.展开更多
The carbon tradingmarket can promote“carbon peaking”and“carbon neutrality”at low cost,but carbon emission quotas face attacks such as data forgery,tampering,counterfeiting,and replay in the electricity trading mar...The carbon tradingmarket can promote“carbon peaking”and“carbon neutrality”at low cost,but carbon emission quotas face attacks such as data forgery,tampering,counterfeiting,and replay in the electricity trading market.Certificateless signatures are a new cryptographic technology that can address traditional cryptography’s general essential certificate requirements and avoid the problem of crucial escrowbased on identity cryptography.However,most certificateless signatures still suffer fromvarious security flaws.We present a secure and efficient certificateless signing scheme by examining the security of existing certificateless signature schemes.To ensure the integrity and verifiability of electricity carbon quota trading,we propose an electricity carbon quota trading scheme based on a certificateless signature and blockchain.Our scheme utilizes certificateless signatures to ensure the validity and nonrepudiation of transactions and adopts blockchain technology to achieve immutability and traceability in electricity carbon quota transactions.In addition,validating electricity carbon quota transactions does not require time-consuming bilinear pairing operations.The results of the analysis indicate that our scheme meets existential unforgeability under adaptive selective message attacks,offers conditional identity privacy protection,resists replay attacks,and demonstrates high computing and communication performance.展开更多
BACKGROUND Liver cancer is one of the deadliest malignant tumors worldwide.Immunotherapy has provided hope to patients with advanced liver cancer,but only a small fraction of patients benefit from this treatment due t...BACKGROUND Liver cancer is one of the deadliest malignant tumors worldwide.Immunotherapy has provided hope to patients with advanced liver cancer,but only a small fraction of patients benefit from this treatment due to individual differences.Identifying immune-related gene signatures in liver cancer patients not only aids physicians in cancer diagnosis but also offers personalized treatment strategies,thereby improving patient survival rates.Although several methods have been developed to predict the prognosis and immunotherapeutic efficacy in patients with liver cancer,the impact of cell-cell interactions in the tumor microenvir-onment has not been adequately considered.AIM To identify immune-related gene signals for predicting liver cancer prognosis and immunotherapy efficacy.METHODS Cell grouping and cell-cell communication analysis were performed on single-cell RNA-sequencing data to identify highly active cell groups in immune-related pathways.Highly active immune cells were identified by intersecting the highly active cell groups with B cells and T cells.The significantly differentially expressed genes between highly active immune cells and other cells were subsequently selected as features,and a least absolute shrinkage and selection operator(LASSO)regression model was constructed to screen for diagnostic-related features.Fourteen genes that were selected more than 5 times in 10 LASSO regression experiments were included in a multivariable Cox regression model.Finally,3 genes(stathmin 1,cofilin 1,and C-C chemokine ligand 5)significantly associated with survival were identified and used to construct an immune-related gene signature.RESULTS The immune-related gene signature composed of stathmin 1,cofilin 1,and C-C chemokine ligand 5 was identified through cell-cell communication.The effectiveness of the identified gene signature was validated based on experi-mental results of predictive immunotherapy response,tumor mutation burden analysis,immune cell infiltration analysis,survival analysis,and expression analysis.CONCLUSION The findings suggest that the identified gene signature may contribute to a deeper understanding of the activity patterns of immune cells in the liver tumor microenvironment,providing insights for personalized treatment strategies.展开更多
基金the National Natural Science Foundation of China(Nos.61133014 and 60903189)
文摘Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can sign a message with any predicate that is satisfied by his attributes set. Unfortunately, there does not exist an attributebased signature which is resistance to the quantum attacks. This means we do not have secure attribute-based signature schemes in a post-quantum world. Based on this consideration, an attribute-based signature on lattices,which could resist quantum attacks, is proposed. This scheme employs "bonsai tree" techniques, and could be proved secure under the hardness assumption of small integer solution problem.
基金supported by the National Nature Science Foundation of China under Grant No.10990011the National Science Foundation of US under Grant No.CCF-0725340+1 种基金the National Development and Reform Commission under the project of "A Monitoring Platform for Web Safe Browsing"China Next Generation Internet CNGI Project under Grant No.CNGI-09-01-12
文摘In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-endorsement mechanism.In this mechanism a single user,whose attributes satisfy the predicate,endorses the message.This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer.The security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups.
基金Supported by the National Natural Science Foundation of China(61173151,61472309)
文摘Inspired by the framework of Boyen, in this paper, an attribute-based signature(ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity's attributes set corresponds to the concatenation of a lattice matrix with the sum of some random matrices, and the signature vector is generated by using the Preimage Sampling algorithm. Compared with current attribute-based signature schemes, this scheme can resist quantum attacks and enjoy shorter public-key, smaller signature size and higher efficiency.
基金partially supported by the National High Technology Research and Development 863 Program of China underGrant No.2011AA010803the National Natural Science Foundation of China under Grant Nos.61100225, 61202450+1 种基金the funding of Science and Technology on Information Assurance Laboratory (KJ-13-02)the Key Scientific and Technological Project of Henan Province of China under Grant No. 122102210126
文摘Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellman assumption in the random oracle model. Unfortunately, by carefully revisiting the design and security proof of Wang et alfs scheme, we show that their scheme cannot provide unforgeability, namely, a forger, whose attributes do not satisfy a given signing predicate, can also generate valid signatures. We also point out the flaws in Wang et al.'s proof.
基金We would like to thank the associate editor and the reviewers for their constructive comments.This work was supported in part by the National Natural Science Foundation of China under Grant 62203234in part by the State Key Laboratory of Robotics of China under Grant 2023-Z03+1 种基金in part by the Natural Science Foundation of Liaoning Province under Grant 2023-BS-025in part by the Research Program of Liaoning Liaohe Laboratory under Grant LLL23ZZ-02-02.
文摘High-precision and real-time diagnosis of sucker rod pumping system(SRPS)is important for quickly mastering oil well operations.Deep learning-based method for classifying the dynamometer card(DC)of oil wells is an efficient diagnosis method.However,the input of the DC as a two-dimensional image into the deep learning framework suffers from low feature utilization and high computational effort.Additionally,different SRPSs in an oil field have various system parameters,and the same SRPS generates different DCs at different moments.Thus,there is heterogeneity in field data,which can dramatically impair the diagnostic accuracy.To solve the above problems,a working condition recognition method based on 4-segment time-frequency signature matrix(4S-TFSM)and deep learning is presented in this paper.First,the 4-segment time-frequency signature(4S-TFS)method that can reduce the computing power requirements is proposed for feature extraction of DC data.Subsequently,the 4S-TFSM is constructed by relative normalization and matrix calculation to synthesize the features of multiple data and solve the problem of data heterogeneity.Finally,a convolutional neural network(CNN),one of the deep learning frameworks,is used to determine the functioning conditions based on the 4S-TFSM.Experiments on field data verify that the proposed diagnostic method based on 4S-TFSM and CNN(4S-TFSM-CNN)can significantly improve the accuracy of working condition recognition with lower computational cost.To the best of our knowledge,this is the first work to discuss the effect of data heterogeneity on the working condition recognition performance of SRPS.
基金supported by the National Key R&D Program of China(Grant No.2022YFA1403201)the National Natural Science Foundation of China(Grant Nos.12204231,12061131001,52072170,and 11927809)the Strategic Priority Research Program(B)of Chinese Academy of Sciences(Grant No.XDB25000000).
文摘The discovery of high-temperature superconductivity near 80K in bilayer nickelate La_(3)Ni_(2)O_(7)under high pressures has renewed the exploration of superconducting nickelate in bulk materials.The extension of superconductivity in other nickelates in a broader family is also essential.Here,we report the experimental observation of superconducting signature in trilayer nickelate La_(4)Ni_(3)O_(10)under high pressures.By using a modified solgel method and post-annealing treatment under high oxygen pressure,we successfully obtained polycrystalline La_(4)Ni_(3)O_(10)samples with different transport behaviors at ambient pressure.Then we performed high-pressure electrical resistance measurements on these samples in a diamond-anvil-cell apparatus.Surprisingly,the signature of possible superconducting transition with a maximum transition temperature(T_(c))of about 20K under high pressures is observed,as evidenced by a clear drop of resistance and the suppression of resistance drops under magnetic fields.Although the resistance drop is sample-dependent and relatively small,it appears in all of our measured samples.We argue that the observed superconducting signal is most likely to originate from the main phase of La_(4)Ni_(3)O_(10).Our findings will motivate the exploration of superconductivity in a broader family of nickelates and shed light on the understanding of the underlying mechanisms of high-T_(c) superconductivity in nickelates.
文摘A metropolitan city such as Los Angeles (LA) is an ideal study site with a very high population density, and it houses at least 3 treatment plants where sewage is treated preliminarily and then progressing to tertiary treatment before discharging into the LA River. We will gain a better understanding of the water quality in the LA River and the nitrate load in the watershed system by examining the influence of waste water treatment plants (WWTPs). The goal of this study is to pinpoint the exact source of nitrate in the LA River using the isotope signatures. We have selected sampling locations both upstream and downstream of the WWTP. This serves to monitor nitrate levels, aiding in the assessment of treatment plant effectiveness, pinpointing nitrate pollution sources, and ensuring compliance with environmental regulations. The research explores the isotopic composition of NO3 in relation to atmospheric nitrogen and Vienna Standard Mean Ocean Water, shedding light on the contributions from various sources such as manure, sewage, soil organic nitrogen, and nitrogen fertilizers. Specifically, there is a change in the δ15NAir value between the dry and wet seasons. The isotope values in the Tillman WWTP sample changed between dry and wet seasons. Notably, the presence of nitrate originating from manure and sewage is consistent across seasons, emphasizing the significant impact of anthropogenic and agricultural activities on water quality. This investigation contributes to the broader understanding of nitrogen cycling in urban water bodies, particularly in the context of wastewater effluent discharge. The findings hold implications for water quality management and highlight the need for targeted interventions to mitigate the impact of nitrogen-containing compounds on aquatic ecosystems. Overall, the study provides a valuable framework for future research and environmental stewardship efforts aimed at preserving the health and sustainability of urban water resources. This data informs decisions regarding additional treatment or mitigation actions to safeguard downstream water quality and ecosystem health.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
文摘Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key motivating factor for embarking on this study. This study was necessitated by the damages and dangers posed by signature forgery coupled with the intractable nature of the problem. The aim and objectives of this study is to design a proactive and responsive system that could compare two signature samples and detect the correct signature against the forged one. Dynamic Signature verification is an important biometric technique that aims to detect whether a given signature is genuine or forged. In this research work, Convolutional Neural Networks (CNNsor ConvNet) which is a class of deep, feed forward artificial neural networks that has successfully been applied to analysing visual imagery was used to train the model. The signature images are stored in a file directory structure which the Keras Python library can work with. Then the CNN was implemented in python using the Keras with the TensorFlow backend to learn the patterns associated with the signature. The result showed that for the same CNNs-based network experimental result of average accuracy, the larger the training dataset, the higher the test accuracy. However, when the training dataset are insufficient, better results can be obtained. The paper concluded that by training datasets using CNNs network, 98% accuracy in the result was recorded, in the experimental part, the model achieved a high degree of accuracy in the classification of the biometric parameters used.
基金the National Natural Science Foundation of China(Grant Numbers 622724786210245062102451).
文摘With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data.
基金supported by the Tomsk State University Competitiveness Improvement Program under Grant No.2.4.2.23 IG.
文摘Location awareness in wireless networks is essential for emergency services,navigation,gaming,and many other applications.This article presents a method for source localization based on measuring the amplitude-phase distribution of the field at the base station.The existing scatterers in the target area create unique scattered field interference at each source location.The unique field interference at each source location results in a unique field signature at the base station which is used for source localization.In the proposed method,the target area is divided into a grid with a step of less than half the wavelength.Each grid node is characterized by its field signature at the base station.Field signatures corresponding to all nodes are normalized and stored in the base station as fingerprints for source localization.The normalization of the field signatures avoids the need for time synchronization between the base station and the source.When a source transmits signals,the generated field signature at the base station is normalized and then correlated with the stored fingerprints.The maximum correlation value is given by the node to which the source is the closest.Numerical simulations and results of experiments on ultrasonic waves in the air show that the ultrasonic source is correctly localized using broadband field signatures with one base station and without time synchronization.The proposed method is potentially applicable for indoor localization and navigation of mobile robots.
基金Project supported by the National Natural Science Foundation of China (Grant No. 61762039)。
文摘In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage.
基金supported by National Natural Science Foundation of China under Grant No.61972360Shandong Provincial Natural Science Foundation of China under Grant Nos.ZR2020MF148,ZR2020QF108.
文摘The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data.
基金supported by the High-level Talent Funding Project of Hebei Province(A202005015)Youth Top Talent Support Plan of Hebei Province.
文摘Plant protein beverage adulteration occurs frequently,which may cause health problems for consumers due to the hidden allergens.Hence,a novel method was developed for authentication by ultra-performance liquid chromatography-tandem mass spectrometry(UPLC-MS/MS).Almond,peanut,walnut and soybean were hydrolyzed,followed by separation by NanoLC-Triple TOF MS.The obtained fingerprints were identified by ProteinPilotTM combined with Uniprot,and 16 signature peptides were selected.Afterwards,plant protein beverages treated by trypsin hydrolysis were analyzed with UPLC-MS/MS.This method showed a good linear relationship with R2>0.99403.The limit of quantification(LOQ)were 0.015,0.01,0.5 and 0.05 g/L for almond,peanut,walnut and soybean,respectively.Mean recoveries ranged from 84.77%to 110.44%with RSDs<15%.The developed method was successfully applied to the adulteration detection of 31 plant protein beverages to reveal adulteration and false labeling.Conclusively,this method could provide technical support for authentication of plant protein beverages to protect the rights and health of consumers.
基金supported by the Doctoral Fund of Jining No.1 People’s Hospital(2021-BS-002).
文摘Colorectal cancer(CRC)belongs to the class of significantly malignant tumors found in humans.Recently,dysregulated fatty acid metabolism(FAM)has been a topic of attention due to its modulation in cancer,specifically CRC.However,the regulatory FAM pathways in CRC require comprehensive elucidation.Methods:The clinical and gene expression data of 175 fatty acid metabolic genes(FAMGs)linked with colon adenocarcinoma(COAD)and normal cornerstone genes were gathered through The Cancer Genome Atlas(TCGA)-COAD corroborating with the Molecular Signature Database v7.2(MSigDB).Initially,crucial prognostic genes were selected by uni-and multi-variate Cox proportional regression analyses;then,depending upon these identified signature genes and clinical variables,a nomogram was generated.Lastly,to assess tumor immune characteristics,concomitant evaluation of tumor immune evasion/risk scoring were elucidated.Results:A 8-gene signature,including ACBD4,ACOX1,CD36,CPT2,ELOVL3,ELOVL6,ENO3,and SUCLG2,was generated,and depending upon this,CRC patients were categorized within high-risk(H-R)and low-risk(L-R)cohorts.Furthermore,risk and age-based nomograms indicated moderate discrimination and good calibration.The data confirmed that the 8-gene model efficiently predicted CRC patients’prognosis.Moreover,according to the conjoint analysis of tumor immune evasion and the risk scorings,the H-R cohort had an immunosuppressive tumor microenvironment,which caused a substandard prognosis.Conclusion:This investigation established a FAMGs-based prognostic model with substantially high predictive value,providing the possibility for improved individualized treatment for CRC individuals.
文摘BACKGROUND Gastric cancer(GC)is a highly aggressive malignancy with a heterogeneous nature,which makes prognosis prediction and treatment determination difficult.Inflammation is now recognized as one of the hallmarks of cancer and plays an important role in the aetiology and continued growth of tumours.Inflammation also affects the prognosis of GC patients.Recent reports suggest that a number of inflammatory-related biomarkers are useful for predicting tumour prognosis.However,the importance of inflammatory-related biomarkers in predicting the prognosis of GC patients is still unclear.AIM To investigate inflammatory-related biomarkers in predicting the prognosis of GC patients.was constructed using the least absolute shrinkage and selection operator Cox regression model based on the GEO database.GC patients from the GSE26253 cohort were used for validation.Univariate and multivariate Cox analyses were used to determine the independent prognostic factors,and a prognostic nomogram was established.The calibration curve and the area under the curve based on receiver operating characteristic analysis were utilized to evaluate the predictive value of the nomogram.The decision curve analysis results were plotted to quantify and assess the clinical value of the nomogram.Gene set enrichment analysis was performed to explore the potential regulatory pathways involved.The relationship between tumour immune infiltration status and risk score was analysed via Tumour Immune Estimation Resource and CIBERSORT.Finally,we analysed the association between risk score and patient sensitivity to commonly used chemotherapy and targeted therapy agents.RESULTS A prognostic model consisting of three inflammatory-related genes(MRPS17,GUF1,and PDK4)was constructed.Independent prognostic analysis revealed that the risk score was a separate prognostic factor in GC patients.According to the risk score,GC patients were stratified into high-and low-risk groups,and patients in the high-risk group had significantly worse prognoses according to age,sex,TNM stage and Lauren type.Consensus clustering identified three subtypes of inflammation that could predict GC prognosis more accurately than traditional grading and staging.Finally,the study revealed that patients in the low-risk group were more sensitive to certain drugs than were those in the high-risk group,indicating a link between inflammation-related genes and drug sensitivity.CONCLUSION In conclusion,we established a novel three-gene prognostic signature that may be useful for predicting the prognosis and personalizing treatment decisions of GC patients.
基金Project supported by the General Project of Natural Science Foundation of Hunan Province(Grant Nos.2024JJ5273 and 2023JJ50328)the Scientific Research Project of Education Department of Hunan Province(Grant Nos.22A0049 and 22B0699)。
文摘This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution.
基金supported by National Key RD Program of China(Grant No.2022YFB3104402,the Research on Digital Identity Trust System for Massive Heterogeneous Terminals in Road Traffic System)the Fundamental Research Funds for the Central Universities(Grant Nos.3282023015,3282023035,3282023051)National First-Class Discipline Construction Project of Beijing Electronic Science and Technology Institute(No.3201012).
文摘The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.
基金the National Fund Project No.62172337National Natural Science Foundation of China(No.61662069)China Postdoctoral Science Foundation(No.2017M610817).
文摘The carbon tradingmarket can promote“carbon peaking”and“carbon neutrality”at low cost,but carbon emission quotas face attacks such as data forgery,tampering,counterfeiting,and replay in the electricity trading market.Certificateless signatures are a new cryptographic technology that can address traditional cryptography’s general essential certificate requirements and avoid the problem of crucial escrowbased on identity cryptography.However,most certificateless signatures still suffer fromvarious security flaws.We present a secure and efficient certificateless signing scheme by examining the security of existing certificateless signature schemes.To ensure the integrity and verifiability of electricity carbon quota trading,we propose an electricity carbon quota trading scheme based on a certificateless signature and blockchain.Our scheme utilizes certificateless signatures to ensure the validity and nonrepudiation of transactions and adopts blockchain technology to achieve immutability and traceability in electricity carbon quota transactions.In addition,validating electricity carbon quota transactions does not require time-consuming bilinear pairing operations.The results of the analysis indicate that our scheme meets existential unforgeability under adaptive selective message attacks,offers conditional identity privacy protection,resists replay attacks,and demonstrates high computing and communication performance.
基金Supported by Scientific and Technological Project of Henan Province,No.212102210140.
文摘BACKGROUND Liver cancer is one of the deadliest malignant tumors worldwide.Immunotherapy has provided hope to patients with advanced liver cancer,but only a small fraction of patients benefit from this treatment due to individual differences.Identifying immune-related gene signatures in liver cancer patients not only aids physicians in cancer diagnosis but also offers personalized treatment strategies,thereby improving patient survival rates.Although several methods have been developed to predict the prognosis and immunotherapeutic efficacy in patients with liver cancer,the impact of cell-cell interactions in the tumor microenvir-onment has not been adequately considered.AIM To identify immune-related gene signals for predicting liver cancer prognosis and immunotherapy efficacy.METHODS Cell grouping and cell-cell communication analysis were performed on single-cell RNA-sequencing data to identify highly active cell groups in immune-related pathways.Highly active immune cells were identified by intersecting the highly active cell groups with B cells and T cells.The significantly differentially expressed genes between highly active immune cells and other cells were subsequently selected as features,and a least absolute shrinkage and selection operator(LASSO)regression model was constructed to screen for diagnostic-related features.Fourteen genes that were selected more than 5 times in 10 LASSO regression experiments were included in a multivariable Cox regression model.Finally,3 genes(stathmin 1,cofilin 1,and C-C chemokine ligand 5)significantly associated with survival were identified and used to construct an immune-related gene signature.RESULTS The immune-related gene signature composed of stathmin 1,cofilin 1,and C-C chemokine ligand 5 was identified through cell-cell communication.The effectiveness of the identified gene signature was validated based on experi-mental results of predictive immunotherapy response,tumor mutation burden analysis,immune cell infiltration analysis,survival analysis,and expression analysis.CONCLUSION The findings suggest that the identified gene signature may contribute to a deeper understanding of the activity patterns of immune cells in the liver tumor microenvironment,providing insights for personalized treatment strategies.