157 research outputs found

    Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting

    Get PDF
    To simplify the certificate management procedures, Shamir introduced the concept of identity-based cryptography (IBC). However, the key escrow problem is inherent in IBC. To get rid of it, Al-Riyami and Paterson introduced in 2003 the notion of certificateless cryptography (CLC). However, if a cryptosystem is not perfectly implemented, adversaries would be able to obtain part of the system\u27s secret state via side-channel attacks, and thus may break the system. This is not considered in the security model of traditional cryptographic primitives. Leakage-resilient cryptography was then proposed to prevent adversaries from doing so. There are fruitful works on leakage-resilient encryption schemes, while there are not many on signature schemes in the leakage setting. In this work, we review the folklore generic constructions of identity-based signature and certificateless signature, and show that if the underlying primitives are leakage-resilient, so are the resulting identity-based signature scheme and certificateless signature scheme. The leakage rate follows the minimum one of the underlying primitives. We also show some instantiations of these generic constructions

    Leakage-Resilient Group Signature: Definitions and Constructions

    Get PDF
    Group signature scheme provides group members a way to sign messages without revealing their identities. Anonymity and traceability are two essential properties in a group signature system. However, these two security properties hold based on the assumption that all the signing keys are perfectly secret and leakage-free. On the another hand, on account of the physical imperfection of cryptosystems in practice, malicious attackers can learn fraction of secret state (including secret keys and intermediate randomness) of the cryptosystem via side-channel attacks, and thus breaking the security of whole system. To address this issue, Ono et al. introduced a new security model of group signature, which captures randomness exposure attacks. They proved that their proposed construction satisfies the security require-ments of group signature scheme. Nevertheless, their scheme is only provably secure against randomness exposure and supposes the secret keys remains leakage-free. In this work, we focus on the security model of leakage-resilient group signature based on bounded leakage setting and propose three new black-box constructions of leakage-resilient group signature secure under the proposed security models

    The impact of free-air CO_2 enrichment (FACE) and N supply on growth, yield and quality of rice crops with large panicle

    Get PDF
    Because CO_2 is needed for plant photosynthesis, the increase in atmospheric [CO_2] has the potential to enhance the growth and development of plant. However, the resultant effects on growth, yield and quality of field-grown rice remain unclear, especially under differing nitrogen (N) availability and/or using cultivars with large panicles. To investigate these, a Free-Air CO_2 Enrichment (FACE) experiment was performed at Wuxi, Jiangsu, China, in 2001-03. A japonica cultivar with large panicle was exposed to two [CO_2] (ambient, ambient+200μmol mol^) at three levels of N supply (15, 25, 35gNm^). FACE accelerates phenology significantly, with 3-5 days earlier in heading and 6-9 days earlier in maturity across 3 years. FACE significantly increased the grain yield by 12.8%, which was mainly due to substantially increased panicle number per square meter (+19%) as result of significant increases in tillering occurrence speed. However the spikelet number per panicle was greatly reduced (-8%), which was due mainly to the significant increase in degenerated spikelets per panicle (+52%) while differentiated spikelets per panicle showed no change. Overall DM accumulation at harvest was stimulated somewhat more (+16%) by FACE, compared to grain yield, by an average of 13% by FACE, thus resulting in 3% reduction in harvest index. FACE caused significant reduction in shoot N concentration (-7%) and significant increase in P concentration (+14%) at grain maturity, resulting in significant increase in N use efficiency and significant reduction in P use efficiency. Both shoot N uptake (+9%) and P uptake (+33%) showed significant increase at harvest, which was mainly due to significant enhanced N and P uptake during early growth stage. On a per plant basis, FACE significantly increased cumulative root volume, root dry weight, adventitious root length and adventitious root number at heading, which was mainly associated with significant increases in root growth rate during early growth period, while total surface area, active adsorption area and root oxidation activity per unit root dry weight showed significant reduction. As for grain quality, FACE cause deterioration of processing suitability and appearance quality drastically, the nutritive value of grain was also negatively influenced by FACE due to a reduction in grain protein and Cu concentration. By contrast, FACE resulted in better eating/cooking quality. For most cases, no [CO_2]×N interaction was detected for the growth, yield and quality parameters. Data from this study has important implications for fertilizer (e.g. N, P) management and variety selection in rice production systems under future elevated [CO_2] conditions.Special Revie

    Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification

    Get PDF
    Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data in the cloud. However, management of these encrypted data becomes a challenging problem, e.g. data classification. Besides, how to selectively share data with other users is also an important and interesting problem in cloud storage. In this paper, we focus on ciphertext-policy attribute based encryption with equality test (CP-ABEET). People can use CP-ABEET to implement not only flexible authorization for the access to encrypted data, but also efficient data label classification, i.e. test of whether two encrypted data contain the same message. We construct an efficient CP-ABEET scheme, and prove its security based on a reasonable number-theoretic assumption. Compared with the only existing CP-ABEET scheme, our construction is more efficient in key generation, and has shorter attribute-related secret keys and better security

    Learning to Select Cuts for Efficient Mixed-Integer Programming

    Get PDF
    Cutting plane methods play a significant role in modern solvers for tackling mixed-integer programming (MIP) problems. Proper selection of cuts would remove infeasible solutions in the early stage, thus largely reducing the computational burden without hurting the solution accuracy. However, the major cut selection approaches heavily rely on heuristics, which strongly depend on the specific problem at hand and thus limit their generalization capability. In this paper, we propose a data-driven and generalizable cut selection approach, named Cut Ranking, in the settings of multiple instance learning. To measure the quality of the candidate cuts, a scoring function, which takes the instance-specific cut features as inputs, is trained and applied in cut ranking and selection. In order to evaluate our method, we conduct extensive experiments on both synthetic datasets and real-world datasets. Compared with commonly used heuristics for cut selection, the learning-based policy has shown to be more effective, and is capable of generalizing over multiple problems with different properties. Cut Ranking has been deployed in an industrial solver for large-scale MIPs. In the online A/B testing of the product planning problems with more than 10710^7 variables and constraints daily, Cut Ranking has achieved the average speedup ratio of 12.42% over the production solver without any accuracy loss of solution.Comment: Paper accepted at Pattern Recognition journa

    Elevated atmospheric CO2 concentration triggers redistribution of nitrogen to promote tillering in rice

    Get PDF
    Elevated atmospheric CO2 concentration (eCO2) often reduces nitrogen (N) content in rice plants and stimulates tillering. However, there is a general consensus that reduced N would constrain rice tillering. To resolve this contradiction, we investigated N distribution and transcriptomic changes in different rice plant organs after subjecting them to eCO2 and different N application rates. Our results showed that eCO2 significantly promoted rice tillers (by 0.6, 1.1, 1.7, and 2.1 tillers/plant at 0, 75, 150, and 225 kg N ha−1 N application rates, respectively) and more tillers were produced under higher N application rates, confirming that N availability constrained tillering in the early stages of growth. Although N content declined in the leaves (−11.0 to −20.7 mg g−1) and sheaths (−9.8 to −28.8 mg g−1) of rice plants exposed to eCO2, the N content of newly emerged tillers on plants exposed to eCO2 equaled or exceeded the N content of tillers produced under ambient CO2 conditions. Apparently, the redistribution of N within the plant per se was a critical adaptation strategy to the eCO2 condition. Transcriptomic analysis revealed that eCO2 induced less extensive alteration of gene expression than did N application. Most importantly, the expression levels of multiple N-related transporters and receptors such as nitrate transporter NRT2.3a/b and NRT1.1a/b were differentially regulated in leaf and shoot apical meristem, suggesting that multiple genes were involved in sensing the N signal and transporting N metabolites to adapt to eCO2. The redistribution of N in different organs could be a universal adaptation strategy of terrestrial plants to eCO2

    Aberrant neural activity in patients with bipolar depressive disorder distinguishing to the unipolar depressive disorder: a resting-state functional magnetic resonance imaging study

    Full text link
    This study aims to explore the intrinsic patterns of spontaneous activity of bipolar depression (BD) patients by analyzing the fractional amplitude of low frequency fluctuation (fALFF) that help differentiate BD from unipolar depressive disorder(UD). Twenty eight patients with BD, 47 patients with UD and 29 healthy controls were enrolled to receive the resting-state functional magnetic resonance imaging (rs-fMRI) scans. The group differences of fALFF values were calculated among three groups. In addition, the correlations between the clinical variables and mfALFF values were estimated. The brain regions with activation discrepancies among three groups are located in precuneus, the left middle temporal gyrus (MTG) and left inferior parietal lobe (IPL) and lingual gyrus. Compared with HC group, BD group shows decreased fALFF in precuneus, the left IPL and increased fALFF in lingual gyrus remarkably; UD group shows significantly decreased fALFF in precuneus, the left MTG and the left IPL. On the contrast of patients with UD, patients with BD have significantly increased fALFF value in the left precuneus, the left MGT and lingual gyrus. Furthermore, a negative correlation is found between the mfALFF values in precuneus and the scores of cognitive impairment factor in the UD group. The similar pattern of intrinsic activity in PCC suggests depressive state-dependent change. The aberrant patterns of intrinsic activity in precuneus, the IPL and lingual gyrus might be provide quantitative nodes that help to conduct further study for better distinguishing between BD and UD
    corecore