BACKGROUND Paradoxically,patients with T4N0M0(stage II,no lymph node metastasis)colon cancer have a worse prognosis than those with T2N1-2M0(stage III).However,no previous report has addressed this issue.AIM To screen...BACKGROUND Paradoxically,patients with T4N0M0(stage II,no lymph node metastasis)colon cancer have a worse prognosis than those with T2N1-2M0(stage III).However,no previous report has addressed this issue.AIM To screen prognostic risk factors for T4N0M0 colon cancer and construct a prognostic nomogram model for these patients.METHODS Two hundred patients with T4N0M0 colon cancer were treated at Tianjin Medical University General Hospital between January 2017 and December 2021,of which 112 patients were assigned to the training cohort,and the remaining 88 patients were assigned to the validation cohort.Differences between the training and validation groups were analyzed.The training cohort was subjected to multi-variate analysis to select prognostic risk factors for T4N0M0 colon cancer,followed by the construction of a nomogram model.RESULTS The 3-year overall survival(OS)rates were 86.2%and 74.4%for the training and validation cohorts,respectively.Enterostomy(P=0.000),T stage(P=0.001),right hemicolon(P=0.025),irregular review(P=0.040),and carbohydrate antigen 199(CA199)(P=0.011)were independent risk factors of OS in patients with T4N0M0 colon cancer.A nomogram model with good concordance and accuracy was constructed.CONCLUSION Enterostomy,T stage,right hemicolon,irregular review,and CA199 were independent risk factors for OS in patients with T4N0M0 colon cancer.The nomogram model exhibited good agreement and accuracy.展开更多
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor...In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.展开更多
BACKGROUND At present,there is insufficient medical evidence to determine whether adjuvant chemotherapy is necessary for T2N0M0 gastric cancer.AIM To obtain a risk score to assess the need for adjuvant chemotherapy in...BACKGROUND At present,there is insufficient medical evidence to determine whether adjuvant chemotherapy is necessary for T2N0M0 gastric cancer.AIM To obtain a risk score to assess the need for adjuvant chemotherapy in patients with T2N0M0 gastric cancer.METHODS We identified 325 patients with pathological T2N0M0 stage primary gastric cancer at the National Cancer Center between 2011 and 2018.Univariate and multivariate Cox regression analyses were performed to predict factors affecting prognosis.Vascular invasion,tumor site,and body mass index were assessed,and a scoring system was established.We compared the survival outcomes and benefits of adjuvant chemotherapy between the different subgroups.RESULTS Five-year survival rates of the score 0,1,2,and 3 groups were 92%,95%,80%,and 50%,respectively(P<0.001).In the score 2-3 group,five-year survival rates for patients in the adjuvant chemotherapy group and postoperative observation group were 95%and 61%,respectively(P=0.021).CONCLUSION For patients with T2N0M0 stage gastric cancer and two or more risk factors,adjuvant chemotherapy after D2 gastrectomy may have a survival benefit.展开更多
Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quant...Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quantum information,quantum threshold signatures are gradually becoming more popular.Recently,a quantum(t,n)threshold group signature scheme was analyzed that uses techniques such as quantum-controlled-not operation and quantum teleportation.However,this scheme cannot resist forgery attack and does not conform to the design of a threshold signature in the signing phase.Based on the original scheme,we propose an improved quantum(t,n)threshold signature scheme using quantum(t,n)threshold secret sharing technology.The analysis proves that the improved scheme can resist forgery attack and collusion attack,and it is undeniable.At the same time,this scheme reduces the level of trust in the arbitrator during the signature phase.展开更多
Ad Hoc网络现在是非常有吸引力的研究方向,它是一种优秀的移动无线自组织网络,与传统有线网络和一般无线网络存在着很大区别,因而使得传统的基于可信任第三方的CA认证方案不再适用,而基于门限加密的分布方案有其固有的假设条件,在具体...Ad Hoc网络现在是非常有吸引力的研究方向,它是一种优秀的移动无线自组织网络,与传统有线网络和一般无线网络存在着很大区别,因而使得传统的基于可信任第三方的CA认证方案不再适用,而基于门限加密的分布方案有其固有的假设条件,在具体实施时也有很大的困难。有别于以上方案,利用了无证书签名的思想,对无认证中心的基于自认证的门限签名方案在移动Ad Hoc网络环境中的应用进行了研究,并给出了它的实现方案。展开更多
基金Supported by Health Science and Technology Project of Tianjin Health Commission,No.ZC20190Tianjin Key Medical Discipline(Specialty)Construction Project,No.TJYXZDXK-005ATianjin Medical University Clinical Research Fund,No.22ZYYLCCG04.
文摘BACKGROUND Paradoxically,patients with T4N0M0(stage II,no lymph node metastasis)colon cancer have a worse prognosis than those with T2N1-2M0(stage III).However,no previous report has addressed this issue.AIM To screen prognostic risk factors for T4N0M0 colon cancer and construct a prognostic nomogram model for these patients.METHODS Two hundred patients with T4N0M0 colon cancer were treated at Tianjin Medical University General Hospital between January 2017 and December 2021,of which 112 patients were assigned to the training cohort,and the remaining 88 patients were assigned to the validation cohort.Differences between the training and validation groups were analyzed.The training cohort was subjected to multi-variate analysis to select prognostic risk factors for T4N0M0 colon cancer,followed by the construction of a nomogram model.RESULTS The 3-year overall survival(OS)rates were 86.2%and 74.4%for the training and validation cohorts,respectively.Enterostomy(P=0.000),T stage(P=0.001),right hemicolon(P=0.025),irregular review(P=0.040),and carbohydrate antigen 199(CA199)(P=0.011)were independent risk factors of OS in patients with T4N0M0 colon cancer.A nomogram model with good concordance and accuracy was constructed.CONCLUSION Enterostomy,T stage,right hemicolon,irregular review,and CA199 were independent risk factors for OS in patients with T4N0M0 colon cancer.The nomogram model exhibited good agreement and accuracy.
文摘In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.
基金the National Natural Science Foundation of China,No.82072734.
文摘BACKGROUND At present,there is insufficient medical evidence to determine whether adjuvant chemotherapy is necessary for T2N0M0 gastric cancer.AIM To obtain a risk score to assess the need for adjuvant chemotherapy in patients with T2N0M0 gastric cancer.METHODS We identified 325 patients with pathological T2N0M0 stage primary gastric cancer at the National Cancer Center between 2011 and 2018.Univariate and multivariate Cox regression analyses were performed to predict factors affecting prognosis.Vascular invasion,tumor site,and body mass index were assessed,and a scoring system was established.We compared the survival outcomes and benefits of adjuvant chemotherapy between the different subgroups.RESULTS Five-year survival rates of the score 0,1,2,and 3 groups were 92%,95%,80%,and 50%,respectively(P<0.001).In the score 2-3 group,five-year survival rates for patients in the adjuvant chemotherapy group and postoperative observation group were 95%and 61%,respectively(P=0.021).CONCLUSION For patients with T2N0M0 stage gastric cancer and two or more risk factors,adjuvant chemotherapy after D2 gastrectomy may have a survival benefit.
基金the National Natural Science Foundation of China(Grant Nos.61771294 and 61972235)。
文摘Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quantum information,quantum threshold signatures are gradually becoming more popular.Recently,a quantum(t,n)threshold group signature scheme was analyzed that uses techniques such as quantum-controlled-not operation and quantum teleportation.However,this scheme cannot resist forgery attack and does not conform to the design of a threshold signature in the signing phase.Based on the original scheme,we propose an improved quantum(t,n)threshold signature scheme using quantum(t,n)threshold secret sharing technology.The analysis proves that the improved scheme can resist forgery attack and collusion attack,and it is undeniable.At the same time,this scheme reduces the level of trust in the arbitrator during the signature phase.