期刊文献+
共找到10,553篇文章
< 1 2 250 >
每页显示 20 50 100
Attribute-Based Signature on Lattices 被引量:3
1
作者 毛贤平 陈克非 +1 位作者 龙宇 王亮亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期406-411,共6页
Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can... Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can sign a message with any predicate that is satisfied by his attributes set. Unfortunately, there does not exist an attributebased signature which is resistance to the quantum attacks. This means we do not have secure attribute-based signature schemes in a post-quantum world. Based on this consideration, an attribute-based signature on lattices,which could resist quantum attacks, is proposed. This scheme employs "bonsai tree" techniques, and could be proved secure under the hardness assumption of small integer solution problem. 展开更多
关键词 attribute-based signature LATTICE small integer solution problem
原文传递
Attribute-Based Signature with Policy-and-Endorsement Mechanism 被引量:1
2
作者 王怀习 朱岩 +1 位作者 冯荣权 Stephen S.Yau 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1293-1304,共12页
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-end... In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based Encryption.This signature provides a policy-and-endorsement mechanism.In this mechanism a single user,whose attributes satisfy the predicate,endorses the message.This signature allows the signer to announce his endorsement using an access policy without having to reveal the identity of the signer.The security of this signature,selfless anonymity and existential unforgeability,is based on the Strong Diffie-Hellman assumption and the Decision Linear assumption in bilinear map groups. 展开更多
关键词 cryptography fine-grained access control attribute-based signature policy-and-endorsement selfless anonymity existential unforgeability
原文传递
An Attribute-Based Signature Scheme from Lattice Assumption 被引量:4
3
作者 ZHANG Yanhua HU Yupu JIANG Mingming 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第3期207-213,共7页
Inspired by the framework of Boyen, in this paper, an attribute-based signature(ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity's attributes set corresponds to t... Inspired by the framework of Boyen, in this paper, an attribute-based signature(ABS) scheme from lattice assumption is proposed. In this attribute-based signature scheme, an entity's attributes set corresponds to the concatenation of a lattice matrix with the sum of some random matrices, and the signature vector is generated by using the Preimage Sampling algorithm. Compared with current attribute-based signature schemes, this scheme can resist quantum attacks and enjoy shorter public-key, smaller signature size and higher efficiency. 展开更多
关键词 attribute-based signature lattice assumption small integer solution post-quantum cryptography high efficiency
原文传递
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
4
作者 葛爱军 黄欣沂 +2 位作者 陈成 马传贵 张锐 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第4期743-748,共6页
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellman assumption in the random oracle model. Unfortunately, by carefully revisiting the design and security proof of Wang et alfs scheme, we show that their scheme cannot provide unforgeability, namely, a forger, whose attributes do not satisfy a given signing predicate, can also generate valid signatures. We also point out the flaws in Wang et al.'s proof. 展开更多
关键词 attribute-based signature existential unforgeability policy-and-endorsement
原文传递
Working condition recognition of sucker rod pumping system based on 4-segment time-frequency signature matrix and deep learning
5
作者 Yun-Peng He Hai-Bo Cheng +4 位作者 Peng Zeng Chuan-Zhi Zang Qing-Wei Dong Guang-Xi Wan Xiao-Ting Dong 《Petroleum Science》 SCIE EI CAS CSCD 2024年第1期641-653,共13页
High-precision and real-time diagnosis of sucker rod pumping system(SRPS)is important for quickly mastering oil well operations.Deep learning-based method for classifying the dynamometer card(DC)of oil wells is an eff... High-precision and real-time diagnosis of sucker rod pumping system(SRPS)is important for quickly mastering oil well operations.Deep learning-based method for classifying the dynamometer card(DC)of oil wells is an efficient diagnosis method.However,the input of the DC as a two-dimensional image into the deep learning framework suffers from low feature utilization and high computational effort.Additionally,different SRPSs in an oil field have various system parameters,and the same SRPS generates different DCs at different moments.Thus,there is heterogeneity in field data,which can dramatically impair the diagnostic accuracy.To solve the above problems,a working condition recognition method based on 4-segment time-frequency signature matrix(4S-TFSM)and deep learning is presented in this paper.First,the 4-segment time-frequency signature(4S-TFS)method that can reduce the computing power requirements is proposed for feature extraction of DC data.Subsequently,the 4S-TFSM is constructed by relative normalization and matrix calculation to synthesize the features of multiple data and solve the problem of data heterogeneity.Finally,a convolutional neural network(CNN),one of the deep learning frameworks,is used to determine the functioning conditions based on the 4S-TFSM.Experiments on field data verify that the proposed diagnostic method based on 4S-TFSM and CNN(4S-TFSM-CNN)can significantly improve the accuracy of working condition recognition with lower computational cost.To the best of our knowledge,this is the first work to discuss the effect of data heterogeneity on the working condition recognition performance of SRPS. 展开更多
关键词 Sucker-rod pumping system Dynamometer card Working condition recognition Deep learning Time-frequency signature Time-frequency signature matrix
下载PDF
Signature of Superconductivity in Pressurized La_(4)Ni_(3)O_(10)
6
作者 李庆 张英杰 +3 位作者 项浙宁 张宇航 祝熙宇 闻海虎 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第1期77-84,共8页
The discovery of high-temperature superconductivity near 80K in bilayer nickelate La_(3)Ni_(2)O_(7)under high pressures has renewed the exploration of superconducting nickelate in bulk materials.The extension of super... The discovery of high-temperature superconductivity near 80K in bilayer nickelate La_(3)Ni_(2)O_(7)under high pressures has renewed the exploration of superconducting nickelate in bulk materials.The extension of superconductivity in other nickelates in a broader family is also essential.Here,we report the experimental observation of superconducting signature in trilayer nickelate La_(4)Ni_(3)O_(10)under high pressures.By using a modified solgel method and post-annealing treatment under high oxygen pressure,we successfully obtained polycrystalline La_(4)Ni_(3)O_(10)samples with different transport behaviors at ambient pressure.Then we performed high-pressure electrical resistance measurements on these samples in a diamond-anvil-cell apparatus.Surprisingly,the signature of possible superconducting transition with a maximum transition temperature(T_(c))of about 20K under high pressures is observed,as evidenced by a clear drop of resistance and the suppression of resistance drops under magnetic fields.Although the resistance drop is sample-dependent and relatively small,it appears in all of our measured samples.We argue that the observed superconducting signal is most likely to originate from the main phase of La_(4)Ni_(3)O_(10).Our findings will motivate the exploration of superconductivity in a broader family of nickelates and shed light on the understanding of the underlying mechanisms of high-T_(c) superconductivity in nickelates. 展开更多
关键词 MATERIALS SUPERCONDUCTIVITY signature
下载PDF
Stable Isotopic Signatures of NO3 in Waste Water Effluent and Los Angeles River
7
作者 Isaac Hall Mohammad Hassan Rezaie Boroon 《Journal of Water Resource and Protection》 CAS 2024年第1期102-122,共21页
A metropolitan city such as Los Angeles (LA) is an ideal study site with a very high population density, and it houses at least 3 treatment plants where sewage is treated preliminarily and then progressing to tertiary... A metropolitan city such as Los Angeles (LA) is an ideal study site with a very high population density, and it houses at least 3 treatment plants where sewage is treated preliminarily and then progressing to tertiary treatment before discharging into the LA River. We will gain a better understanding of the water quality in the LA River and the nitrate load in the watershed system by examining the influence of waste water treatment plants (WWTPs). The goal of this study is to pinpoint the exact source of nitrate in the LA River using the isotope signatures. We have selected sampling locations both upstream and downstream of the WWTP. This serves to monitor nitrate levels, aiding in the assessment of treatment plant effectiveness, pinpointing nitrate pollution sources, and ensuring compliance with environmental regulations. The research explores the isotopic composition of NO3 in relation to atmospheric nitrogen and Vienna Standard Mean Ocean Water, shedding light on the contributions from various sources such as manure, sewage, soil organic nitrogen, and nitrogen fertilizers. Specifically, there is a change in the δ15NAir value between the dry and wet seasons. The isotope values in the Tillman WWTP sample changed between dry and wet seasons. Notably, the presence of nitrate originating from manure and sewage is consistent across seasons, emphasizing the significant impact of anthropogenic and agricultural activities on water quality. This investigation contributes to the broader understanding of nitrogen cycling in urban water bodies, particularly in the context of wastewater effluent discharge. The findings hold implications for water quality management and highlight the need for targeted interventions to mitigate the impact of nitrogen-containing compounds on aquatic ecosystems. Overall, the study provides a valuable framework for future research and environmental stewardship efforts aimed at preserving the health and sustainability of urban water resources. This data informs decisions regarding additional treatment or mitigation actions to safeguard downstream water quality and ecosystem health. 展开更多
关键词 Metropolitan City Los Angeles Treatment Plants Sewage Treatment Nitrate Source Isotope signatures Water Quality
下载PDF
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
8
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
下载PDF
Dynamic Signature Verification Using Pattern Recognition
9
作者 Emmanuel Nwabueze Ekwonwune Duroha Austin Ekekwe +1 位作者 Chinyere Iheakachi Ubochi Henry Chinedu Oleribe 《Journal of Software Engineering and Applications》 2024年第5期214-227,共14页
Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key mot... Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key motivating factor for embarking on this study. This study was necessitated by the damages and dangers posed by signature forgery coupled with the intractable nature of the problem. The aim and objectives of this study is to design a proactive and responsive system that could compare two signature samples and detect the correct signature against the forged one. Dynamic Signature verification is an important biometric technique that aims to detect whether a given signature is genuine or forged. In this research work, Convolutional Neural Networks (CNNsor ConvNet) which is a class of deep, feed forward artificial neural networks that has successfully been applied to analysing visual imagery was used to train the model. The signature images are stored in a file directory structure which the Keras Python library can work with. Then the CNN was implemented in python using the Keras with the TensorFlow backend to learn the patterns associated with the signature. The result showed that for the same CNNs-based network experimental result of average accuracy, the larger the training dataset, the higher the test accuracy. However, when the training dataset are insufficient, better results can be obtained. The paper concluded that by training datasets using CNNs network, 98% accuracy in the result was recorded, in the experimental part, the model achieved a high degree of accuracy in the classification of the biometric parameters used. 展开更多
关键词 VERIFICATION SECURITY BIOMETRICS signature AUTHENTICATION Model Pattern Recognition Dynamic
下载PDF
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
10
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
下载PDF
Source localization based on field signatures:Laboratory ultrasonic validation
11
作者 Mahmoud Eissa Dmitry Sukhanov 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第3期47-56,共10页
Location awareness in wireless networks is essential for emergency services,navigation,gaming,and many other applications.This article presents a method for source localization based on measuring the amplitude-phase d... Location awareness in wireless networks is essential for emergency services,navigation,gaming,and many other applications.This article presents a method for source localization based on measuring the amplitude-phase distribution of the field at the base station.The existing scatterers in the target area create unique scattered field interference at each source location.The unique field interference at each source location results in a unique field signature at the base station which is used for source localization.In the proposed method,the target area is divided into a grid with a step of less than half the wavelength.Each grid node is characterized by its field signature at the base station.Field signatures corresponding to all nodes are normalized and stored in the base station as fingerprints for source localization.The normalization of the field signatures avoids the need for time synchronization between the base station and the source.When a source transmits signals,the generated field signature at the base station is normalized and then correlated with the stored fingerprints.The maximum correlation value is given by the node to which the source is the closest.Numerical simulations and results of experiments on ultrasonic waves in the air show that the ultrasonic source is correctly localized using broadband field signatures with one base station and without time synchronization.The proposed method is potentially applicable for indoor localization and navigation of mobile robots. 展开更多
关键词 Base station Field signature FINGERPRINTS Localization Ultrasonic frequencies
下载PDF
A quantum blind signature scheme based on dense coding for non-entangled states
12
作者 邢柯 殷爱菡 薛勇奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期220-228,共9页
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot... In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage. 展开更多
关键词 quantum blind signature dense coding non-entanglement Hadamard gate
下载PDF
A linkable signature scheme supporting batch verification for privacy protection in crowd-sensing
13
作者 Xu Li Gwanggil Jeon +1 位作者 Wenshuo Wang Jindong Zhao 《Digital Communications and Networks》 SCIE CSCD 2024年第3期645-654,共10页
The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more ... The maturity of 5G technology has enabled crowd-sensing services to collect multimedia data over wireless network,so it has promoted the applications of crowd-sensing services in different fields,but also brings more privacy security challenges,the most commom which is privacy leakage.As a privacy protection technology combining data integrity check and identity anonymity,ring signature is widely used in the field of privacy protection.However,introducing signature technology leads to additional signature verification overhead.In the scenario of crowd-sensing,the existing signature schemes have low efficiency in multi-signature verification.Therefore,it is necessary to design an efficient multi-signature verification scheme while ensuring security.In this paper,a batch-verifiable signature scheme is proposed based on the crowd-sensing background,which supports the sensing platform to verify the uploaded multiple signature data efficiently,so as to overcoming the defects of the traditional signature scheme in multi-signature verification.In our proposal,a method for linking homologous data was presented,which was valuable for incentive mechanism and data analysis.Simulation results showed that the proposed scheme has good performance in terms of security and efficiency in crowd-sensing applications with a large number of users and data. 展开更多
关键词 5G network Crowd-sensing Privacy protection Ring signature Batch verification
下载PDF
Adulteration detection of plant protein beverages by UPLC-MS/MS based on signature peptide of allergen
14
作者 Yawei Ning Zhuo Liu +3 位作者 Zheng Yang Junmei Ma Yan Zhang Qiang Li 《Food Science and Human Wellness》 SCIE CAS CSCD 2024年第6期3371-3380,共10页
Plant protein beverage adulteration occurs frequently,which may cause health problems for consumers due to the hidden allergens.Hence,a novel method was developed for authentication by ultra-performance liquid chromat... Plant protein beverage adulteration occurs frequently,which may cause health problems for consumers due to the hidden allergens.Hence,a novel method was developed for authentication by ultra-performance liquid chromatography-tandem mass spectrometry(UPLC-MS/MS).Almond,peanut,walnut and soybean were hydrolyzed,followed by separation by NanoLC-Triple TOF MS.The obtained fingerprints were identified by ProteinPilotTM combined with Uniprot,and 16 signature peptides were selected.Afterwards,plant protein beverages treated by trypsin hydrolysis were analyzed with UPLC-MS/MS.This method showed a good linear relationship with R2>0.99403.The limit of quantification(LOQ)were 0.015,0.01,0.5 and 0.05 g/L for almond,peanut,walnut and soybean,respectively.Mean recoveries ranged from 84.77%to 110.44%with RSDs<15%.The developed method was successfully applied to the adulteration detection of 31 plant protein beverages to reveal adulteration and false labeling.Conclusively,this method could provide technical support for authentication of plant protein beverages to protect the rights and health of consumers. 展开更多
关键词 ALLERGEN Adulteration detection Plant protein beverage signature peptide UPLC-MS/MS
下载PDF
Identification and validation of novel prognostic fatty acid metabolic gene signatures in colon adenocarcinoma through systematic approaches
15
作者 HENG ZHANG WENJING CHENG +3 位作者 HAIBO ZHAO WEIDONG CHEN QIUJIE ZHANG QING-QING YU 《Oncology Research》 SCIE 2024年第2期297-308,共12页
Colorectal cancer(CRC)belongs to the class of significantly malignant tumors found in humans.Recently,dysregulated fatty acid metabolism(FAM)has been a topic of attention due to its modulation in cancer,specifically C... Colorectal cancer(CRC)belongs to the class of significantly malignant tumors found in humans.Recently,dysregulated fatty acid metabolism(FAM)has been a topic of attention due to its modulation in cancer,specifically CRC.However,the regulatory FAM pathways in CRC require comprehensive elucidation.Methods:The clinical and gene expression data of 175 fatty acid metabolic genes(FAMGs)linked with colon adenocarcinoma(COAD)and normal cornerstone genes were gathered through The Cancer Genome Atlas(TCGA)-COAD corroborating with the Molecular Signature Database v7.2(MSigDB).Initially,crucial prognostic genes were selected by uni-and multi-variate Cox proportional regression analyses;then,depending upon these identified signature genes and clinical variables,a nomogram was generated.Lastly,to assess tumor immune characteristics,concomitant evaluation of tumor immune evasion/risk scoring were elucidated.Results:A 8-gene signature,including ACBD4,ACOX1,CD36,CPT2,ELOVL3,ELOVL6,ENO3,and SUCLG2,was generated,and depending upon this,CRC patients were categorized within high-risk(H-R)and low-risk(L-R)cohorts.Furthermore,risk and age-based nomograms indicated moderate discrimination and good calibration.The data confirmed that the 8-gene model efficiently predicted CRC patients’prognosis.Moreover,according to the conjoint analysis of tumor immune evasion and the risk scorings,the H-R cohort had an immunosuppressive tumor microenvironment,which caused a substandard prognosis.Conclusion:This investigation established a FAMGs-based prognostic model with substantially high predictive value,providing the possibility for improved individualized treatment for CRC individuals. 展开更多
关键词 Fatty acid metabolism Colorectal cancer Gene signatures Machine learning
下载PDF
Identification of a novel inflammatory-related gene signature to evaluate the prognosis of gastric cancer patients
16
作者 Jia-Li Hu Mei-Jin Huang +5 位作者 Halike Halina Kun Qiao Zhi-Yuan Wang Jia-Jie Lu Cheng-Liang Yin Feng Gao 《World Journal of Gastrointestinal Oncology》 SCIE 2024年第3期945-967,共23页
BACKGROUND Gastric cancer(GC)is a highly aggressive malignancy with a heterogeneous nature,which makes prognosis prediction and treatment determination difficult.Inflammation is now recognized as one of the hallmarks ... BACKGROUND Gastric cancer(GC)is a highly aggressive malignancy with a heterogeneous nature,which makes prognosis prediction and treatment determination difficult.Inflammation is now recognized as one of the hallmarks of cancer and plays an important role in the aetiology and continued growth of tumours.Inflammation also affects the prognosis of GC patients.Recent reports suggest that a number of inflammatory-related biomarkers are useful for predicting tumour prognosis.However,the importance of inflammatory-related biomarkers in predicting the prognosis of GC patients is still unclear.AIM To investigate inflammatory-related biomarkers in predicting the prognosis of GC patients.was constructed using the least absolute shrinkage and selection operator Cox regression model based on the GEO database.GC patients from the GSE26253 cohort were used for validation.Univariate and multivariate Cox analyses were used to determine the independent prognostic factors,and a prognostic nomogram was established.The calibration curve and the area under the curve based on receiver operating characteristic analysis were utilized to evaluate the predictive value of the nomogram.The decision curve analysis results were plotted to quantify and assess the clinical value of the nomogram.Gene set enrichment analysis was performed to explore the potential regulatory pathways involved.The relationship between tumour immune infiltration status and risk score was analysed via Tumour Immune Estimation Resource and CIBERSORT.Finally,we analysed the association between risk score and patient sensitivity to commonly used chemotherapy and targeted therapy agents.RESULTS A prognostic model consisting of three inflammatory-related genes(MRPS17,GUF1,and PDK4)was constructed.Independent prognostic analysis revealed that the risk score was a separate prognostic factor in GC patients.According to the risk score,GC patients were stratified into high-and low-risk groups,and patients in the high-risk group had significantly worse prognoses according to age,sex,TNM stage and Lauren type.Consensus clustering identified three subtypes of inflammation that could predict GC prognosis more accurately than traditional grading and staging.Finally,the study revealed that patients in the low-risk group were more sensitive to certain drugs than were those in the high-risk group,indicating a link between inflammation-related genes and drug sensitivity.CONCLUSION In conclusion,we established a novel three-gene prognostic signature that may be useful for predicting the prognosis and personalizing treatment decisions of GC patients. 展开更多
关键词 Gastric cancer Inflammation Immune infiltration Prognosis signature Subt
下载PDF
Quantum circuit-based proxy blind signatures:A novel approach and experimental evaluation on the IBM quantum cloud platform
17
作者 娄小平 昝慧茹 徐雪娇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期247-253,共7页
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a... This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution. 展开更多
关键词 proxy blind signature quantum circuits quantum computation IBM quantum cloud platform
下载PDF
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
18
作者 Ang Liu Qing Zhang +3 位作者 Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu 《Computers, Materials & Continua》 SCIE EI 2024年第7期1727-1751,共25页
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functio... The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security. 展开更多
关键词 IOT quantum blockchain public-key quantum signature quantum hash function
下载PDF
Electricity Carbon Quota Trading Scheme based on Certificateless Signature and Blockchain
19
作者 Xiaodong Yang Runze Diao +2 位作者 Tao Liu Haoqi Wen Caifen Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1695-1712,共18页
The carbon tradingmarket can promote“carbon peaking”and“carbon neutrality”at low cost,but carbon emission quotas face attacks such as data forgery,tampering,counterfeiting,and replay in the electricity trading mar... The carbon tradingmarket can promote“carbon peaking”and“carbon neutrality”at low cost,but carbon emission quotas face attacks such as data forgery,tampering,counterfeiting,and replay in the electricity trading market.Certificateless signatures are a new cryptographic technology that can address traditional cryptography’s general essential certificate requirements and avoid the problem of crucial escrowbased on identity cryptography.However,most certificateless signatures still suffer fromvarious security flaws.We present a secure and efficient certificateless signing scheme by examining the security of existing certificateless signature schemes.To ensure the integrity and verifiability of electricity carbon quota trading,we propose an electricity carbon quota trading scheme based on a certificateless signature and blockchain.Our scheme utilizes certificateless signatures to ensure the validity and nonrepudiation of transactions and adopts blockchain technology to achieve immutability and traceability in electricity carbon quota transactions.In addition,validating electricity carbon quota transactions does not require time-consuming bilinear pairing operations.The results of the analysis indicate that our scheme meets existential unforgeability under adaptive selective message attacks,offers conditional identity privacy protection,resists replay attacks,and demonstrates high computing and communication performance. 展开更多
关键词 Electricity carbon trading certificateless signature blockchain forgery attack carbon quota
下载PDF
Identification of an immune-related gene signature for predicting prognosis and immunotherapy efficacy in liver cancer via cell-cell communication
20
作者 Jun-Tao Li Hong-Mei Zhang +1 位作者 Wei Wang Dong-Qing Wei 《World Journal of Gastroenterology》 SCIE CAS 2024年第11期1609-1620,共12页
BACKGROUND Liver cancer is one of the deadliest malignant tumors worldwide.Immunotherapy has provided hope to patients with advanced liver cancer,but only a small fraction of patients benefit from this treatment due t... BACKGROUND Liver cancer is one of the deadliest malignant tumors worldwide.Immunotherapy has provided hope to patients with advanced liver cancer,but only a small fraction of patients benefit from this treatment due to individual differences.Identifying immune-related gene signatures in liver cancer patients not only aids physicians in cancer diagnosis but also offers personalized treatment strategies,thereby improving patient survival rates.Although several methods have been developed to predict the prognosis and immunotherapeutic efficacy in patients with liver cancer,the impact of cell-cell interactions in the tumor microenvir-onment has not been adequately considered.AIM To identify immune-related gene signals for predicting liver cancer prognosis and immunotherapy efficacy.METHODS Cell grouping and cell-cell communication analysis were performed on single-cell RNA-sequencing data to identify highly active cell groups in immune-related pathways.Highly active immune cells were identified by intersecting the highly active cell groups with B cells and T cells.The significantly differentially expressed genes between highly active immune cells and other cells were subsequently selected as features,and a least absolute shrinkage and selection operator(LASSO)regression model was constructed to screen for diagnostic-related features.Fourteen genes that were selected more than 5 times in 10 LASSO regression experiments were included in a multivariable Cox regression model.Finally,3 genes(stathmin 1,cofilin 1,and C-C chemokine ligand 5)significantly associated with survival were identified and used to construct an immune-related gene signature.RESULTS The immune-related gene signature composed of stathmin 1,cofilin 1,and C-C chemokine ligand 5 was identified through cell-cell communication.The effectiveness of the identified gene signature was validated based on experi-mental results of predictive immunotherapy response,tumor mutation burden analysis,immune cell infiltration analysis,survival analysis,and expression analysis.CONCLUSION The findings suggest that the identified gene signature may contribute to a deeper understanding of the activity patterns of immune cells in the liver tumor microenvironment,providing insights for personalized treatment strategies. 展开更多
关键词 Liver cancer Cell-cell communication Gene signature PROGNOSIS IMMUNOTHERAPY Single-cell RNA sequencing
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部