In March 2024,European Union(EU)lawmakers passed the world’s first comprehensive set of regulations governing the use of artificial intelligence(AI)[1].The EU’s AI Act,two and a half years in the making,was initiall...In March 2024,European Union(EU)lawmakers passed the world’s first comprehensive set of regulations governing the use of artificial intelligence(AI)[1].The EU’s AI Act,two and a half years in the making,was initially drawn up as a landmark bill to reduce harm in areas in which AI was thought to pose the biggest risks to people,such as in health care,education,and security,as well as banning uses that pose“unacceptable risks,”including manipulation of human behavior and evaluation of individuals’trustworthiness based on personal characteristics.According to the regulations,which will go into effect in stages over the next two years,“high-risk”AI systems will require risk-mitigation strategies,high-quality data sets,transparency,better documentation,and human supervision.The most common current AI uses,such as augmenting recommendation engines and email spam filters,will see far less oversight.展开更多
Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectio...Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability andmulti-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones.展开更多
Due to technical errors,Ho-Ching T.Tsui and Malcolm E.Winkler,both collaborators who made substantial contributions to this work and were previously acknowledged,did not receive emails regarding authorship consent and...Due to technical errors,Ho-Ching T.Tsui and Malcolm E.Winkler,both collaborators who made substantial contributions to this work and were previously acknowledged,did not receive emails regarding authorship consent and were inadvertently omitted from the author list.We have now rectified this oversight and added them to the author list.展开更多
Instructions for Submissions All manuscripts should be submitted in a single file(including text,notes,references,figures,and tables)in MS-Word(doc)or Ado-be Acrobat(pdf)format only by email to asiaar@163.com.Authors ...Instructions for Submissions All manuscripts should be submitted in a single file(including text,notes,references,figures,and tables)in MS-Word(doc)or Ado-be Acrobat(pdf)format only by email to asiaar@163.com.Authors submitting papers by normal mail or courier will automatically be re-quested to provide an electronie of their paper,and the refereeing process will not commence until after the electronic version is received by the Editorial Office.Once a paper has been accepted for publication,authors who submitted their papers in Adobe Acrobat(pdf)for-mat will be required to provide the final publication version of their paper in MS-Word(doc).The preferred format for the final publica-tion version of graphs and charts is eps format,but Excel format is also acceptable.Excel format is acceptable for the final publication version of Tables.展开更多
On September 14,1987,the first email from China reached Germany with the text:"Across the Great Wall,we can reach every corner in the world."Nearly four decades later,compilations of the entirety of human kn...On September 14,1987,the first email from China reached Germany with the text:"Across the Great Wall,we can reach every corner in the world."Nearly four decades later,compilations of the entirety of human knowledge can be accessed in minutes with a ubiquitous device.As internet technology matures,the education sector has broken through the limitations of time and space to develop towards providing more equitable and higher quality education and allowing for lifelong learning opportunities.展开更多
文摘In March 2024,European Union(EU)lawmakers passed the world’s first comprehensive set of regulations governing the use of artificial intelligence(AI)[1].The EU’s AI Act,two and a half years in the making,was initially drawn up as a landmark bill to reduce harm in areas in which AI was thought to pose the biggest risks to people,such as in health care,education,and security,as well as banning uses that pose“unacceptable risks,”including manipulation of human behavior and evaluation of individuals’trustworthiness based on personal characteristics.According to the regulations,which will go into effect in stages over the next two years,“high-risk”AI systems will require risk-mitigation strategies,high-quality data sets,transparency,better documentation,and human supervision.The most common current AI uses,such as augmenting recommendation engines and email spam filters,will see far less oversight.
基金supported by the National Natural Science Foundation of China(Nos.62172337,62241207)Key Project of GansuNatural Science Foundation(No.23JRRA685).
文摘Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability andmulti-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones.
文摘Due to technical errors,Ho-Ching T.Tsui and Malcolm E.Winkler,both collaborators who made substantial contributions to this work and were previously acknowledged,did not receive emails regarding authorship consent and were inadvertently omitted from the author list.We have now rectified this oversight and added them to the author list.
文摘Instructions for Submissions All manuscripts should be submitted in a single file(including text,notes,references,figures,and tables)in MS-Word(doc)or Ado-be Acrobat(pdf)format only by email to asiaar@163.com.Authors submitting papers by normal mail or courier will automatically be re-quested to provide an electronie of their paper,and the refereeing process will not commence until after the electronic version is received by the Editorial Office.Once a paper has been accepted for publication,authors who submitted their papers in Adobe Acrobat(pdf)for-mat will be required to provide the final publication version of their paper in MS-Word(doc).The preferred format for the final publica-tion version of graphs and charts is eps format,but Excel format is also acceptable.Excel format is acceptable for the final publication version of Tables.
文摘On September 14,1987,the first email from China reached Germany with the text:"Across the Great Wall,we can reach every corner in the world."Nearly four decades later,compilations of the entirety of human knowledge can be accessed in minutes with a ubiquitous device.As internet technology matures,the education sector has broken through the limitations of time and space to develop towards providing more equitable and higher quality education and allowing for lifelong learning opportunities.