With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
Interrater reliability (IRR) statistics, like Cohen’s kappa, measure agreement between raters beyond what is expected by chance when classifying items into categories. While Cohen’s kappa has been widely used, it ha...Interrater reliability (IRR) statistics, like Cohen’s kappa, measure agreement between raters beyond what is expected by chance when classifying items into categories. While Cohen’s kappa has been widely used, it has several limitations, prompting development of Gwet’s agreement statistic, an alternative “kappa”statistic which models chance agreement via an “occasional guessing” model. However, we show that Gwet’s formula for estimating the proportion of agreement due to chance is itself biased for intermediate levels of agreement, despite overcoming limitations of Cohen’s kappa at high and low agreement levels. We derive a maximum likelihood estimator for the occasional guessing model that yields an unbiased estimator of the IRR, which we call the maximum likelihood kappa (κML). The key result is that the chance agreement probability under the occasional guessing model is simply equal to the observed rate of disagreement between raters. The κMLstatistic provides a theoretically principled approach to quantifying IRR that addresses limitations of previous κcoefficients. Given the widespread use of IRR measures, having an unbiased estimator is important for reliable inference across domains where rater judgments are analyzed.展开更多
Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting sub...Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting subject-wise differences between raters against subject-wise averages. In order to scientifically assess agreement, Bartko recommended combining the graphical approach with the statistical analytic procedure suggested by Bradley and Blackwood. The advantage of using this approach is that it enables significance testing and sample size estimation. We noted that the direct use of the results of the regression is misleading and we provide a correction in this regard. Methods: Graphical and linear models are used to assess agreements for continuous scale measurements. We demonstrate that software linear regression results should not be readily used and we provided correct analytic procedures. The degrees of freedom of the F-statistics are incorrectly reported, and we propose methods to overcome this problem by introducing the correct analytic form of the F statistic. Methods for sample size estimation using R-functions are also given. Results: We believe that the tutorial and the R-codes are useful tools for testing and estimating agreement between two rating protocols for continuous scale measurements. The interested reader may use the codes and apply them to their available data when the issue of agreement between two raters is the subject of interest.展开更多
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between differe...Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature.展开更多
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ...With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency.展开更多
In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentica...In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks.展开更多
As more satellite-derived land cover products used in the study of global change, especially climate modeling, assessing their quality has become vitally important. In this study, we developed a distance metric based ...As more satellite-derived land cover products used in the study of global change, especially climate modeling, assessing their quality has become vitally important. In this study, we developed a distance metric based on the parameters used in weather research and forecasting (WRF) to characterize the degree of disagreement among land cover products and to identify the tolerance for misclassification within the International Geosphere Biosphere Programme (IGBP) classification scheme. We determined the spatial degree of disagreement and then created maps of misclassification of Moderate Resolution Imaging Spectoradiometer (MODIS) products, and we calculated overall and class-specific accuracy and fuzzy agreement in a WRF model. Our results show a high level of agreement and high tolerance of misclassification in the WRF model between large-scale homogeneous landscapes, while a low level of agreement and tolerance of misclassification appeared in heterogeneous landscapes. The degree of disagreement varied significantly among seven regions of China. The class-specific accuracy and fuzzy agreement in MODIS Collection 4 and 5 products varied significantly. High accuracy and fuzzy agreement occurred in the following classes: water, grassland, cropland, and barren or sparsely vegetated. Misclassification mainly occurred among specific classes with similar plant functional types and low discriminative spectro-temporal signals. Some classes need to be improved further; the quality of MODIS land cover products across China still does not meet the common requirements of climate modeling. Our findings may have important implications for improving land surface parameterization for simulating climate and for better understanding the influence of the land cover change on climate.展开更多
Group Key Agreement(GKA)is a cryptographic primitive allowing two or more entities to negotiate a shared session key over public networks.In existing GKA models,it is an open problem to construct a one-round multi-par...Group Key Agreement(GKA)is a cryptographic primitive allowing two or more entities to negotiate a shared session key over public networks.In existing GKA models,it is an open problem to construct a one-round multi-party GKA protocol.Wu et al.recently proposed the concept of asymmetric group key agreement(ASGKA)and realized a one-round ASGKA protocol,which affirmatively answers the above open problem in a relaxed way.However,the ASGKA protocol only applies to static groups.To fill this gap,this paper proposes an extended ASGKA protocol based on the Wu et al.protocol.The extension allows any member to join and leave at any point,provided that the resulting group size is not greater than n.To validate the proposal,extensive experiments are performed and the experimental results show that our protocol is more effective than a plain realization of the Wu et al.protocol for dynamic groups.The extended protocol is also more efficient than the up-to-date dynamic GKA protocol in terms of communication and computation.展开更多
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a con...Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.展开更多
Negotiations for the Trans-Pacific Partnership (TPP) Agreement have concluded, but the TPP still must be ratified by each of the 12 member countries. China is the world's second largest economy and yet it has not j...Negotiations for the Trans-Pacific Partnership (TPP) Agreement have concluded, but the TPP still must be ratified by each of the 12 member countries. China is the world's second largest economy and yet it has not joined the TPP. This has provoked much debate in China as to the best strategic approach to the TPP This paper analyzes China's possible strategy for the TPP agreement. We make three key points. First, the security of market access should be China's main concern in any free-trade agreement negotiations, regrettably, it is not included in TPP. The second point is that the present TPP agreement is somewhat diminished from its ambitious original claims. We suggest four strategies for China. The first is to promote the development of China's remaining regional and bilateral free trade agreements (FTAs). The second is to negotiate a bilateral FTA with the United States. The third is to promote deep domestic reforms via enlarged TPP coverage. The last is negotiating entrance to the entering do not worsen. TPP as soon as possible so that terms of展开更多
The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model ...The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided.展开更多
As representatives of emerging economies,BRICS countries are increasingly prominent in global governance.The rapid economic development of BRICS countries is accompanied by a significant increase in greenhouse gas(GHG...As representatives of emerging economies,BRICS countries are increasingly prominent in global governance.The rapid economic development of BRICS countries is accompanied by a significant increase in greenhouse gas(GHG)emissions,and BRICS countries are paying increasing attention to climate change issues and actively participating in the construction of the international climate regime.The Paris Agreement was a historic breakthrough in international climate negotiations,and since then BRICS countries have strengthened multilateral and bilateral cooperation in energy efficiency,agricultural emission reduction and climate governance financing.Due to the constraints of technology,cooperation mechanism construction,financing,and other objective conditions,BRICS countries still face some challenges to further advance the global climate governance agenda with their group power in the short term.Whether BRICS countries can further advance the global climate governance agenda as a group in the post-Paris Agreement era depends on whether they can improve energy efficiency and optimize their energy mix,and whether they can deepen cooperation in agricultural emission reduction and climate finance.BRICS countries need to continue to promote clean energy development and low-carbon economic transformation,deepen the potential of climate cooperation in agricultural emission reduction,and give full play to the climate financing role of the New Development Bank,so as to further enhance the level of climate cooperation.At the same time,BRICS countries can widely involve developing countries in climate governance cooperation and strengthen dialogue and exchanges with other countries,so as to promote global climate governance in the post-Paris Agreement era.展开更多
At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provid...At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provide enterprises with professional management concepts and even help growing enterprises to go public in advance.However,high returns must be accompanied by high risks.For example,private equity financing has information asymmetry risks,principal-agent risks,etc.,and these risks make it impossible to maximize the advantages of private equity financing.Therefore,in order to reduce the risks brought by financing,investment and financing parties should choose to sign gambling contracts to reduce the risk.In recent years,the use of VAM agreements has become more in China.However,according to incomplete statistics,less than 30%of VAM agreements are successful,and this result is mainly due to the insufficient depth and breadth of research on VAM agreements.Therefore,this article will comprehensively analyze the problems that need to be paid attention to when signing a gambling agreement by introducing the case of Anda Technology,and the issue of targeted risk prevention will also be discussed in this paper.展开更多
In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/ser...In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols.展开更多
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. M...Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. Many certificateless public key encryption and signature schemes have been proposed. However, the key agreement in CL-PKE is seldom discussed. In this paper, we present a new certificateless two party authentication key agreement protocol and prove its security attributes. Compared with the existing protocol, our protocol is more efficient.展开更多
An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl...An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure.展开更多
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their...The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.展开更多
The global community has prepared for the withdrawal of the U.S. from the Paris Agreement since Donald Trump was elected as the president of the U.S. However, Trump's formal declaration of withdrawal still caused ...The global community has prepared for the withdrawal of the U.S. from the Paris Agreement since Donald Trump was elected as the president of the U.S. However, Trump's formal declaration of withdrawal still caused worldwide reaction. Trump will use the withdrawal to build his political reputation and to renegotiate the Paris Agreement despite its negative effects on the political credibility, international relationships, and potential long-term economic growth of the U.S. In general, the withdrawal of the U.S. from the Paris Agreement will not change the development of low-carbon technologies and the transformation trend of the global climate governance regime. However, the long-term goals and international cooperation on climate change will be affected by budget cuts in American climate change research and the cancelation of donations from the multilateral environmental fund of the U.S. If the Paris Agreement is renegotiated, the common but differentiated principle of responsibility of the United Nations Framework Convention on Climate Change will be challenged again. Nevertheless, climate change governance remains a main theme of future sustainable development. Instead of national governments, local governments and non-governmental organizations will develop strategies for technical innovation and emphasize pragmatic cooperation, thus expanding their roles in climate change governance. The capacity building on climate change research and public awareness should be enhanced as a long-term objective of global climate change governance.展开更多
AIM: To evaluate the repeatability of central corneal thickness (CCT) measurement by entacam, and agreement of CCT measured by Pentacam and ultrasound pachymetry (USP) in Chinese myopia. Thereby investigate the possib...AIM: To evaluate the repeatability of central corneal thickness (CCT) measurement by entacam, and agreement of CCT measured by Pentacam and ultrasound pachymetry (USP) in Chinese myopia. Thereby investigate the possibility of Pentacam as a substitute for USP in CCT measurement before refractive surgery. The effects of corneal curvature measured by Pentacam on CCT were also evaluated. METHODS: One hundred and forty-eight right eyes of 148 individual with myopia were included in this study. Three successive Pentacam CCT measurements followed by 10 successive ultrasound pachymetry were carried out in the 148 eyes. Mean of CCT taken by each device was calculated for comparison. According to the CCT measured by USP, all the 148 eyes were divided into 3 groups: <520 mu m, 520-560 mu m, >560 mu m. For all eyes and each group the CCT obtained by Pentacam and USP were compared. Anterior corneal curvature of the 148 eyes was also adopted for correlation analysis with CCT obtained by ultrasound pachymetry. In addition, CCT measurement using 60 random selected Scheimpflug images was performed by 3 skilled investigators at different time, and this was repeated for 3 times by a forth investigator to assess repeatability of Pentacam CCT measurement using Scheimpflug images. RESULTS: Intraclass correlation coefficient (ICC) analysis revealed high intraobserver repeatability (ICC=0.994, F=158.60, P<0.001) for CCT measurement by Pentacam. The interobserver (ICC=0.998, F =494.73, P <0.001) and intraobserver (ICC=0.997, F=383.98, P<0.001) repeatability for Pentacam CCT measurements using Scheimpflug images were also excellent. There was high positive correlation between the CCT values measured by Pentacam and ultrasound pachymetry (r=0.963, P<0.001). Bland-altman plots showed that the Pentacam underestimate the CCT by 8.02 mu m compared with ultrasouond pachymetry.The differences between Pentacam and USP increased as the CCT readings by USP increased (Pentacam vs USP: slope=-0.04, P< 0.05). The 95% upper and lower limits of agreement between CCT values obtained from the two devices were +9. 33 mu m and -25.37 mu m. No significant association could be found between CCT and anterior corneal curvature. CONCLUSION: Inter- and intraobserver variability for CCT measurements by Pentacam was considerably below clinically significant levels. CCT of myopia obtained by Scheimpflug camera, Pentacam, were highly correlated to that by ultrasound pachymetry. However, the values obtained are not directly interchangeable between Pentacam and ultrasound pachymetry as the 95% limits of agreement are relatively wide. Pentacam can be a useful instrument for measuring CCT in candidates to refractive surgery in clinic.展开更多
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con...Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme.展开更多
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
文摘Interrater reliability (IRR) statistics, like Cohen’s kappa, measure agreement between raters beyond what is expected by chance when classifying items into categories. While Cohen’s kappa has been widely used, it has several limitations, prompting development of Gwet’s agreement statistic, an alternative “kappa”statistic which models chance agreement via an “occasional guessing” model. However, we show that Gwet’s formula for estimating the proportion of agreement due to chance is itself biased for intermediate levels of agreement, despite overcoming limitations of Cohen’s kappa at high and low agreement levels. We derive a maximum likelihood estimator for the occasional guessing model that yields an unbiased estimator of the IRR, which we call the maximum likelihood kappa (κML). The key result is that the chance agreement probability under the occasional guessing model is simply equal to the observed rate of disagreement between raters. The κMLstatistic provides a theoretically principled approach to quantifying IRR that addresses limitations of previous κcoefficients. Given the widespread use of IRR measures, having an unbiased estimator is important for reliable inference across domains where rater judgments are analyzed.
文摘Background: When continuous scale measurements are available, agreements between two measuring devices are assessed both graphically and analytically. In clinical investigations, Bland and Altman proposed plotting subject-wise differences between raters against subject-wise averages. In order to scientifically assess agreement, Bartko recommended combining the graphical approach with the statistical analytic procedure suggested by Bradley and Blackwood. The advantage of using this approach is that it enables significance testing and sample size estimation. We noted that the direct use of the results of the regression is misleading and we provide a correction in this regard. Methods: Graphical and linear models are used to assess agreements for continuous scale measurements. We demonstrate that software linear regression results should not be readily used and we provided correct analytic procedures. The degrees of freedom of the F-statistics are incorrectly reported, and we propose methods to overcome this problem by introducing the correct analytic form of the F statistic. Methods for sample size estimation using R-functions are also given. Results: We believe that the tutorial and the R-codes are useful tools for testing and estimating agreement between two rating protocols for continuous scale measurements. The interested reader may use the codes and apply them to their available data when the issue of agreement between two raters is the subject of interest.
基金supported by the National Natural Science Foundation of China under Grant 92046001,61962009,the JSPS KAKENHI Grant Numbers JP19K20250,JP20H04174,JP22K11989Leading Initiative for Excellent Young Researchers (LEADER),MEXT,Japan,and JST,PRESTO Grant Number JPMJPR21P3+1 种基金Japan.Mianxiong Dong is the corresponding author,the Doctor Scientific Research Fund of Zhengzhou University of Light Industry under Grant 2021BSJJ033Key Scientific Research Project of Colleges and Universities in Henan Province (CN)under Grant No.22A413010.
文摘Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical data.In recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data.However,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy disclosure.This paper first designs a cross-device key agreement model for blockchain-enabled IoMT.This model can establish a key agreement mechanism for secure medical data sharing.Meanwhile,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement model.The proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution efficiency.Then,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange entities.The blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow problem.Moreover,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature.
基金supported by the National Key Research and Development Program of China,“Joint Research of IoT Security System and Key Technologies Based on Quantum Key,”under project number 2020YFE0200600.
文摘With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency.
基金the National Science Foundation of Sichuan Province, China (Grant No. 2022NSFSC0534)Major Science, and Techonolgy Application Demonstration Project in Chengdu (Grant No. 2021-YF09-0116-GX)。
文摘In order to make the quantum key agreement process immune to participant attacks, it is necessary to introduce the authentication in the communication process. A quantum key agreement protocol with identity authentication that exploits the measurement correlation of six-particle entangled states is proposed. In contrast to some recently proposed quantum key agreement protocols with authentication, this protocol requires neither a semi-trusted third party nor additional private keys in the authentication process. The entire process of authentication and key agreement can be achieved using only n six-particle entangled states, which saves communication costs and reduces the complexity of the authentication process.Finally, security analysis shows that this scheme is resistant to some important attacks.
基金supported by the National Basic Research Program of China (Grant Nos.2009CB723904 and 2012CB956202)the Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA05090201)
文摘As more satellite-derived land cover products used in the study of global change, especially climate modeling, assessing their quality has become vitally important. In this study, we developed a distance metric based on the parameters used in weather research and forecasting (WRF) to characterize the degree of disagreement among land cover products and to identify the tolerance for misclassification within the International Geosphere Biosphere Programme (IGBP) classification scheme. We determined the spatial degree of disagreement and then created maps of misclassification of Moderate Resolution Imaging Spectoradiometer (MODIS) products, and we calculated overall and class-specific accuracy and fuzzy agreement in a WRF model. Our results show a high level of agreement and high tolerance of misclassification in the WRF model between large-scale homogeneous landscapes, while a low level of agreement and tolerance of misclassification appeared in heterogeneous landscapes. The degree of disagreement varied significantly among seven regions of China. The class-specific accuracy and fuzzy agreement in MODIS Collection 4 and 5 products varied significantly. High accuracy and fuzzy agreement occurred in the following classes: water, grassland, cropland, and barren or sparsely vegetated. Misclassification mainly occurred among specific classes with similar plant functional types and low discriminative spectro-temporal signals. Some classes need to be improved further; the quality of MODIS land cover products across China still does not meet the common requirements of climate modeling. Our findings may have important implications for improving land surface parameterization for simulating climate and for better understanding the influence of the land cover change on climate.
基金National Natural Science Foundation of China under Grant No. 60970116,60970115 and 90718006
文摘Group Key Agreement(GKA)is a cryptographic primitive allowing two or more entities to negotiate a shared session key over public networks.In existing GKA models,it is an open problem to construct a one-round multi-party GKA protocol.Wu et al.recently proposed the concept of asymmetric group key agreement(ASGKA)and realized a one-round ASGKA protocol,which affirmatively answers the above open problem in a relaxed way.However,the ASGKA protocol only applies to static groups.To fill this gap,this paper proposes an extended ASGKA protocol based on the Wu et al.protocol.The extension allows any member to join and leave at any point,provided that the resulting group size is not greater than n.To validate the proposal,extensive experiments are performed and the experimental results show that our protocol is more effective than a plain realization of the Wu et al.protocol for dynamic groups.The extended protocol is also more efficient than the up-to-date dynamic GKA protocol in terms of communication and computation.
基金Supported by the National Natural Science Foun-dation of China(60373059) the National Research Foundationfor theDoctoral Programof Higher Education of China(20040013007) the Major Research Plan of the National Natural Science Foundation ofChina(90604023)
文摘Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.
文摘Negotiations for the Trans-Pacific Partnership (TPP) Agreement have concluded, but the TPP still must be ratified by each of the 12 member countries. China is the world's second largest economy and yet it has not joined the TPP. This has provoked much debate in China as to the best strategic approach to the TPP This paper analyzes China's possible strategy for the TPP agreement. We make three key points. First, the security of market access should be China's main concern in any free-trade agreement negotiations, regrettably, it is not included in TPP. The second point is that the present TPP agreement is somewhat diminished from its ambitious original claims. We suggest four strategies for China. The first is to promote the development of China's remaining regional and bilateral free trade agreements (FTAs). The second is to negotiate a bilateral FTA with the United States. The third is to promote deep domestic reforms via enlarged TPP coverage. The last is negotiating entrance to the entering do not worsen. TPP as soon as possible so that terms of
文摘The differences among the extended Canetti & Krawezyk 2007 model (ECK2007) and other four models, i.e., the Bellare & Rogaway (1993, 1995)models (BR93,BR95), the Bellare, Pointcheval & Rogaway (2000) model (BPR2000) and the Canetti & Krawczyk (2001) model (CK2001) are given. The relative strength of security among these models is analyzed. To support the implication or non-implication relation among these models, the formal proof or the counter-example is provided.
文摘As representatives of emerging economies,BRICS countries are increasingly prominent in global governance.The rapid economic development of BRICS countries is accompanied by a significant increase in greenhouse gas(GHG)emissions,and BRICS countries are paying increasing attention to climate change issues and actively participating in the construction of the international climate regime.The Paris Agreement was a historic breakthrough in international climate negotiations,and since then BRICS countries have strengthened multilateral and bilateral cooperation in energy efficiency,agricultural emission reduction and climate governance financing.Due to the constraints of technology,cooperation mechanism construction,financing,and other objective conditions,BRICS countries still face some challenges to further advance the global climate governance agenda with their group power in the short term.Whether BRICS countries can further advance the global climate governance agenda as a group in the post-Paris Agreement era depends on whether they can improve energy efficiency and optimize their energy mix,and whether they can deepen cooperation in agricultural emission reduction and climate finance.BRICS countries need to continue to promote clean energy development and low-carbon economic transformation,deepen the potential of climate cooperation in agricultural emission reduction,and give full play to the climate financing role of the New Development Bank,so as to further enhance the level of climate cooperation.At the same time,BRICS countries can widely involve developing countries in climate governance cooperation and strengthen dialogue and exchanges with other countries,so as to promote global climate governance in the post-Paris Agreement era.
文摘At present,the biggest obstacle that growing enterprises may encounter in their development process is insufficient funds.Private equity financing does not only solve the capital problem of enterprises,but also provide enterprises with professional management concepts and even help growing enterprises to go public in advance.However,high returns must be accompanied by high risks.For example,private equity financing has information asymmetry risks,principal-agent risks,etc.,and these risks make it impossible to maximize the advantages of private equity financing.Therefore,in order to reduce the risks brought by financing,investment and financing parties should choose to sign gambling contracts to reduce the risk.In recent years,the use of VAM agreements has become more in China.However,according to incomplete statistics,less than 30%of VAM agreements are successful,and this result is mainly due to the insufficient depth and breadth of research on VAM agreements.Therefore,this article will comprehensively analyze the problems that need to be paid attention to when signing a gambling agreement by introducing the case of Anda Technology,and the issue of targeted risk prevention will also be discussed in this paper.
基金Supported bythe National Natural Science Foundationof China (60225007 ,60572155) the Science and Technology ResearchProject of Shanghai (04DZ07067)
文摘In the area of secure Web information system, mutual authentication and key agreement are essential between Web clients and servers. An efficient certificateless authenticated key agreement protocol for Web client/server setting is proposed, which uses pairings on certain elliptic curves. We show that the newly proposed key agreement protocol is practical and of great efficiency, meanwhile, it satisfies every desired security require ments for key agreement protocols.
基金Supported by the National Natural Science Foundation of China (19501032)
文摘Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. Many certificateless public key encryption and signature schemes have been proposed. However, the key agreement in CL-PKE is seldom discussed. In this paper, we present a new certificateless two party authentication key agreement protocol and prove its security attributes. Compared with the existing protocol, our protocol is more efficient.
文摘An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure.
基金the National Natural Science Foundation of China (60773086)
文摘The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.
文摘The global community has prepared for the withdrawal of the U.S. from the Paris Agreement since Donald Trump was elected as the president of the U.S. However, Trump's formal declaration of withdrawal still caused worldwide reaction. Trump will use the withdrawal to build his political reputation and to renegotiate the Paris Agreement despite its negative effects on the political credibility, international relationships, and potential long-term economic growth of the U.S. In general, the withdrawal of the U.S. from the Paris Agreement will not change the development of low-carbon technologies and the transformation trend of the global climate governance regime. However, the long-term goals and international cooperation on climate change will be affected by budget cuts in American climate change research and the cancelation of donations from the multilateral environmental fund of the U.S. If the Paris Agreement is renegotiated, the common but differentiated principle of responsibility of the United Nations Framework Convention on Climate Change will be challenged again. Nevertheless, climate change governance remains a main theme of future sustainable development. Instead of national governments, local governments and non-governmental organizations will develop strategies for technical innovation and emphasize pragmatic cooperation, thus expanding their roles in climate change governance. The capacity building on climate change research and public awareness should be enhanced as a long-term objective of global climate change governance.
文摘AIM: To evaluate the repeatability of central corneal thickness (CCT) measurement by entacam, and agreement of CCT measured by Pentacam and ultrasound pachymetry (USP) in Chinese myopia. Thereby investigate the possibility of Pentacam as a substitute for USP in CCT measurement before refractive surgery. The effects of corneal curvature measured by Pentacam on CCT were also evaluated. METHODS: One hundred and forty-eight right eyes of 148 individual with myopia were included in this study. Three successive Pentacam CCT measurements followed by 10 successive ultrasound pachymetry were carried out in the 148 eyes. Mean of CCT taken by each device was calculated for comparison. According to the CCT measured by USP, all the 148 eyes were divided into 3 groups: <520 mu m, 520-560 mu m, >560 mu m. For all eyes and each group the CCT obtained by Pentacam and USP were compared. Anterior corneal curvature of the 148 eyes was also adopted for correlation analysis with CCT obtained by ultrasound pachymetry. In addition, CCT measurement using 60 random selected Scheimpflug images was performed by 3 skilled investigators at different time, and this was repeated for 3 times by a forth investigator to assess repeatability of Pentacam CCT measurement using Scheimpflug images. RESULTS: Intraclass correlation coefficient (ICC) analysis revealed high intraobserver repeatability (ICC=0.994, F=158.60, P<0.001) for CCT measurement by Pentacam. The interobserver (ICC=0.998, F =494.73, P <0.001) and intraobserver (ICC=0.997, F=383.98, P<0.001) repeatability for Pentacam CCT measurements using Scheimpflug images were also excellent. There was high positive correlation between the CCT values measured by Pentacam and ultrasound pachymetry (r=0.963, P<0.001). Bland-altman plots showed that the Pentacam underestimate the CCT by 8.02 mu m compared with ultrasouond pachymetry.The differences between Pentacam and USP increased as the CCT readings by USP increased (Pentacam vs USP: slope=-0.04, P< 0.05). The 95% upper and lower limits of agreement between CCT values obtained from the two devices were +9. 33 mu m and -25.37 mu m. No significant association could be found between CCT and anterior corneal curvature. CONCLUSION: Inter- and intraobserver variability for CCT measurements by Pentacam was considerably below clinically significant levels. CCT of myopia obtained by Scheimpflug camera, Pentacam, were highly correlated to that by ultrasound pachymetry. However, the values obtained are not directly interchangeable between Pentacam and ultrasound pachymetry as the 95% limits of agreement are relatively wide. Pentacam can be a useful instrument for measuring CCT in candidates to refractive surgery in clinic.
基金This work was supported in part by the National Natural Science Foundation of China under Grant No.61170217,61272469,61303212,61332019,and Grant No.U1135004,and by the Fundamental Research Founds for National University,China University of Geosciences
文摘Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme.