In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-respo...In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.展开更多
In the global competition for talents,the massive inflow of Chinese students into the UK has drawn great attention.However,only a few studies examine students’interactions with socioeconomic structures in their study...In the global competition for talents,the massive inflow of Chinese students into the UK has drawn great attention.However,only a few studies examine students’interactions with socioeconomic structures in their study-to-work transition.This study used Higher Education Statistics AgencyHESA,22data and interview data collected from Chinese postgraduate students,and it aims to:investigate structural factors that influence post-study migration patterns of Chinese students;and explore how Chinese students interact with wider social structures.This study found that different configurations between students"goals,""actions,"and"reflexivity"would lead to different employment outcomes.Three different study-to-work transition strategies were identified:"proceeding without a fixed plan";"reaching a compromise";and"knowing goals and approaching goals".Findings suggest that the transition between study and work is more complex than what is described in human capital and push-pull approaches.A better understanding of students’decision-making processes would help higher education institutions in preparing graduates for careers in the global labour market.展开更多
Identity-based signature has become an important technique for lightweight authentication as soon as it was proposed in 1984.Thereafter,identity-based signature schemes based on the integer factorization problem and d...Identity-based signature has become an important technique for lightweight authentication as soon as it was proposed in 1984.Thereafter,identity-based signature schemes based on the integer factorization problem and discrete logarithm problem were proposed one after another.Nevertheless,the rapid development of quantum computers makes them insecure.Recently,many efforts have been made to construct identity-based signatures over lattice assumptions against attacks in the quantum era.However,their efficiency is not very satisfactory.In this study,an efficient identity-based signature scheme is presented over the number theory research unit(NTRU) lattice assumption.The new scheme is more efficient than other lattice-and identity-based signature schemes.The new scheme proves to be unforgeable against the adaptively chosen message attack in the random oracle model under the hardness of the γ-shortest vector problem on the NTRU lattice.展开更多
基金Project (No. 60372076) supported by the National Natural ScienceFoundation of China
文摘In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.
基金This research is supported by the Wenzhou Social Science Fund(Grant No.21JD10).
文摘In the global competition for talents,the massive inflow of Chinese students into the UK has drawn great attention.However,only a few studies examine students’interactions with socioeconomic structures in their study-to-work transition.This study used Higher Education Statistics AgencyHESA,22data and interview data collected from Chinese postgraduate students,and it aims to:investigate structural factors that influence post-study migration patterns of Chinese students;and explore how Chinese students interact with wider social structures.This study found that different configurations between students"goals,""actions,"and"reflexivity"would lead to different employment outcomes.Three different study-to-work transition strategies were identified:"proceeding without a fixed plan";"reaching a compromise";and"knowing goals and approaching goals".Findings suggest that the transition between study and work is more complex than what is described in human capital and push-pull approaches.A better understanding of students’decision-making processes would help higher education institutions in preparing graduates for careers in the global labour market.
基金supported by the National Natural Science Foundation of China(Nos.61173151,61472309,and 61303217)the Fundamental Research Funds for the Central Universities,China(No.JB140115)the Natural Science Foundation of Shaanxi Province,China(Nos.2013JQ8002 and 2014JQ8313)
文摘Identity-based signature has become an important technique for lightweight authentication as soon as it was proposed in 1984.Thereafter,identity-based signature schemes based on the integer factorization problem and discrete logarithm problem were proposed one after another.Nevertheless,the rapid development of quantum computers makes them insecure.Recently,many efforts have been made to construct identity-based signatures over lattice assumptions against attacks in the quantum era.However,their efficiency is not very satisfactory.In this study,an efficient identity-based signature scheme is presented over the number theory research unit(NTRU) lattice assumption.The new scheme is more efficient than other lattice-and identity-based signature schemes.The new scheme proves to be unforgeable against the adaptively chosen message attack in the random oracle model under the hardness of the γ-shortest vector problem on the NTRU lattice.