In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by th...In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.展开更多
A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the cons...A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys.展开更多
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP)...A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.展开更多
In this paper,I examine the Twitter accounts of right-wing extremist groups(RWEGs)in India,arguing that the abjectification of Muslim masculinities is central to the narratives of Hindu supremacist groups.The abjectif...In this paper,I examine the Twitter accounts of right-wing extremist groups(RWEGs)in India,arguing that the abjectification of Muslim masculinities is central to the narratives of Hindu supremacist groups.The abjectification process on Twitter serves as a rhetorical device to:a)criticize and problematize Muslim masculinities;b)idealize and glorify Hindu and white masculinities;c)promote Hindu and white masculine nationalist projects;and d)unify Hindu supremacists against Muslim others.By analyzing the gender ideologies expressed implicitly or explicitly on the Twitter accounts of RWEGs,and using the“Love Jihad”conspiracy case as a focal point,I demonstrate how the abjectification of Muslim masculinities is constructed in opposition to the idealized Hindu masculinities.This study highlights the intersection of gender and nationalism in the digital discourse of Hindu supremacist groups,offering insights into the mechanisms through which social media platforms are used to reinforce and propagate Islamophobic ideologies.展开更多
A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the thr...A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf(LRSW) and Diffie-Hellman(DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on.展开更多
Conspiracy theories are widespread in the modern information era.Being exposed to conspiracy theories may affect behaviour,for example,by spreading mistrust among people and within organisations,even if it does not ne...Conspiracy theories are widespread in the modern information era.Being exposed to conspiracy theories may affect behaviour,for example,by spreading mistrust among people and within organisations,even if it does not necessarily generate widespread beliefs in the conspiracy narrative.Our paper investigates the effect of exposure to conspiracy theories on strategic sophistication.We present evidence from a laboratory experiment,in which we prime half of our participants with exposure to a conspiracy theory.We find that such exposure leads to increased strategic sophistication.Using a causal mediation analysis we confirm that the effect on sophistication arises independently of whether people believe in the content or not.展开更多
The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a sec...The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack.展开更多
DeLillo's treatments of Lee Harvey Oswald in Libra take place this rhetoric of image, and the place of image within historical, imagistic, and textual context. DeLillo's fiction is very much concerned with the...DeLillo's treatments of Lee Harvey Oswald in Libra take place this rhetoric of image, and the place of image within historical, imagistic, and textual context. DeLillo's fiction is very much concerned with the ideological subtext of history that has exploited the resources of intertextuality. It has a long finding of meta-fiction to reveal there is no history without a full-blown meta-history to make plain Hayden White's contention. The general field of intertextuality was presented by Gerard Genette. Miami was a city of open wounds of explosive politics and feelings. Of all the cities, attempt made the conspiracy on the Cuban head. This city was very inflammable. Cuban heat and light were made him determined to keep the plan a secret from anti-Castro leaders. Four months earlier Kennedy had been accepted the brigade flag from survivors of the invasion, and many just have ransomed from Cuban prisons.展开更多
文摘In this study, the author has designed new verifiable (t, n) threshold untraceable signature schemes. The proposed schemes have the following properties: ( 1 ) Verification: The shadows of the secret distributed by the trusted center can be verified by all of the participants; (2) Security: Even if the number of the dishonest member is over the value of the threshold, they cannot get the system secret parameters , such as the group secret key, and forge other member's individual signature; (3) Efficient verification: The verifier can verify the group signature easily and the verification time of the group signature is equivalent to that of an individual signature; (4) Untraceability: The signers of the group signature cannot be traced.
文摘A ccmspiracy attack is proposed to show that Wang-Li's scheme is instcure,because any t or more group members can impersonate other t member to sign any message withoutholding the responsibility. To avoid the conspiracy attack, this paper prestentsa new (t,n)threshold signature scheme with traceablt signers. A (t. n) threshold signature scheme allows t ormore group members of the group lo generate a signature on behalf of the group, Any less than tmembers cannot generate a valid signature, andany set of the group cannot impersonate another set ofmembers to sign any message without holding the responsibility. In case of disputes., the thresholdsignature can be opened, so that the original signers ean be traced without repealing the secretkeys.
基金Supported by the National Natural Science Founda-tion of China (90304008) the Graduate Innovation Fund of XidianUniversity (05019 , 05017)the College and University Sbject ofDoctors Specific Sientific Research Foundation of China(20040701001)
文摘A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.
文摘In this paper,I examine the Twitter accounts of right-wing extremist groups(RWEGs)in India,arguing that the abjectification of Muslim masculinities is central to the narratives of Hindu supremacist groups.The abjectification process on Twitter serves as a rhetorical device to:a)criticize and problematize Muslim masculinities;b)idealize and glorify Hindu and white masculinities;c)promote Hindu and white masculine nationalist projects;and d)unify Hindu supremacists against Muslim others.By analyzing the gender ideologies expressed implicitly or explicitly on the Twitter accounts of RWEGs,and using the“Love Jihad”conspiracy case as a focal point,I demonstrate how the abjectification of Muslim masculinities is constructed in opposition to the idealized Hindu masculinities.This study highlights the intersection of gender and nationalism in the digital discourse of Hindu supremacist groups,offering insights into the mechanisms through which social media platforms are used to reinforce and propagate Islamophobic ideologies.
基金Supported by the National Natural Science Foundation of China(61503112)the Key Projects of Support Program for Outstanding Youth Talent of Universities in Anhui Province(gxyq ZD2016231)
文摘A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf(LRSW) and Diffie-Hellman(DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on.
文摘Conspiracy theories are widespread in the modern information era.Being exposed to conspiracy theories may affect behaviour,for example,by spreading mistrust among people and within organisations,even if it does not necessarily generate widespread beliefs in the conspiracy narrative.Our paper investigates the effect of exposure to conspiracy theories on strategic sophistication.We present evidence from a laboratory experiment,in which we prime half of our participants with exposure to a conspiracy theory.We find that such exposure leads to increased strategic sophistication.Using a causal mediation analysis we confirm that the effect on sophistication arises independently of whether people believe in the content or not.
基金Supported in part by the National Natural Science Foundation of China under the Grant 60172060
文摘The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack.
文摘DeLillo's treatments of Lee Harvey Oswald in Libra take place this rhetoric of image, and the place of image within historical, imagistic, and textual context. DeLillo's fiction is very much concerned with the ideological subtext of history that has exploited the resources of intertextuality. It has a long finding of meta-fiction to reveal there is no history without a full-blown meta-history to make plain Hayden White's contention. The general field of intertextuality was presented by Gerard Genette. Miami was a city of open wounds of explosive politics and feelings. Of all the cities, attempt made the conspiracy on the Cuban head. This city was very inflammable. Cuban heat and light were made him determined to keep the plan a secret from anti-Castro leaders. Four months earlier Kennedy had been accepted the brigade flag from survivors of the invasion, and many just have ransomed from Cuban prisons.