89 research outputs found

    Constant-size threshold attribute based SignCryption for cloud applications

    Get PDF
    In this paper, we propose a novel constant-size threshold attribute-based signcryption scheme for securely sharing data through public clouds. Our proposal has several advantages. First, it provides flexible cryptographic access control, while preserving users’ privacy as the identifying information for satisfying the access control policy are not revealed. Second, the proposed scheme guarantees both data origin authentication and anonymity thanks to the novel use of attribute based signcryption mechanism, while ensuring the unlinkability between the different access sessions. Third, the proposed signcryption scheme has efficient computation cost and constant communication overhead whatever the number of involved attributes. Finally, our scheme satisfies strong security properties in the random oracle model, namely Indistinguishability against the Adaptive Chosen Ciphertext Attacks (IND-CCA2), Existential Unforgeability against Chosen Message Attacks (EUFCMA) and privacy preservation of the attributes involved in the signcryption process, based on the assumption that the augmented Multi-Sequence of Exponents Decisional Diffie-Hellman (aMSE-DDH) problem and the Computational Diffie Hellman Assumption (CDH) are hard

    PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT

    Get PDF
    Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly shared access policies, thus leading to possible users’ privacy leakage. In this paper, we introduce PHOABE, a Policy-Hidden Outsourced ABE scheme. Our construction presents several advantages. First, it is a multi-attribute authority ABE scheme. Second, the expensive computations for the ABE decryption process is partially delegated to a Semi Trusted Cloud Server. Third, users’ privacy is protected thanks to a hidden access policy. Fourth, PHOABE is proven to be selectively secure, verifiable and policy privacy preserving under the random oracle model. Five, estimation of the processing overhead proves its feasibility in IoT constrained environments

    PAbAC : a privacy preserving attribute based framework for fine grained access control in clouds

    Get PDF
    Several existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider. Moreover, to keep sensitive user data confidential against untrusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine-grained data access control is desired. In addition, access control policies as well as users’ access patterns are also considered as sensitive information that should be protected from the cloud. In this paper, we propose PAbAC, a novel privacy preserving Attribute-based framework, that combines attribute-based encryption and attribute-based signature mechanisms for securely sharing outsourced data via the public cloud. Our proposal is multifold. First, it ensures fine-grained cryptographic access control enforced at the data owner’s side, while providing the desired expressiveness of the access control policies. Second, PAbAC preserves users’ privacy, while hiding any identifying information used to satisfy the access control. Third, PAbAC is proven to be highly scalable and efficient for sharing outsourced data in remote servers, at both the client and the cloud provider side

    Nuclear Alpha-Particle Condensates

    Full text link
    The α\alpha-particle condensate in nuclei is a novel state described by a product state of α\alpha's, all with their c.o.m. in the lowest 0S orbit. We demonstrate that a typical α\alpha-particle condensate is the Hoyle state (Ex=7.65E_{x}=7.65 MeV, 02+0^+_2 state in 12^{12}C), which plays a crucial role for the synthesis of 12^{12}C in the universe. The influence of antisymmentrization in the Hoyle state on the bosonic character of the α\alpha particle is discussed in detail. It is shown to be weak. The bosonic aspects in the Hoyle state, therefore, are predominant. It is conjectured that α\alpha-particle condensate states also exist in heavier nαn\alpha nuclei, like 16^{16}O, 20^{20}Ne, etc. For instance the 06+0^+_6 state of 16^{16}O at Ex=15.1E_{x}=15.1 MeV is identified from a theoretical analysis as being a strong candidate of a 4α4\alpha condensate. The calculated small width (34 keV) of 06+0^+_6, consistent with data, lends credit to the existence of heavier Hoyle-analogue states. In non-self-conjugated nuclei such as 11^{11}B and 13^{13}C, we discuss candidates for the product states of clusters, composed of α\alpha's, triton's, and neutrons etc. The relationship of α\alpha-particle condensation in finite nuclei to quartetting in symmetric nuclear matter is investigated with the help of an in-medium modified four-nucleon equation. A nonlinear order parameter equation for quartet condensation is derived and solved for α\alpha particle condensation in infinite nuclear matter. The strong qualitative difference with the pairing case is pointed out.Comment: 71 pages, 41 figures, review article, to be published in "Cluster in Nuclei (Lecture Notes in Physics) - Vol.2 -", ed. by C. Beck, (Springer-Verlag, Berlin, 2011

    Effects of olive oil and its minor phenolic constituents on obesity-induced cardiac metabolic changes

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Olive oil and its minor constituents have been recommended as important dietary therapeutic interventions in preventive medicine. However, a question remains to be addressed: what are the effects of olive oil and its phenolic compounds on obesity-induced cardiac metabolic changes?</p> <p>Methods</p> <p>Male Wistar rats were divided into two groups (<it>n </it>= 24/group): (C) receiving standard-chow; (Ob) receiving hypercaloric-chow. After 21 days C and Ob groups were divided into four subgroups (<it>n </it>= 6/group):(C) standard-chow and saline; (C-Olive)standard-chow and olive-oil (3.0 g/kg.day); (C-Oleuropein)standard-chow and oleuropein (0.023 mg/kg/day); (C-Cafeic) standard-chow and cafeic-acid (2.66 mg/kg/day); (Ob)receiving hypercaloric-chow and saline;(Ob-Olive) hypercaloric-chow and olive-oil;(Ob-Oleuropein) hypercaloric-chow and oleuropein;(Ob-Cafeic) hypercaloric-chow and cafeic-acid. Treatments were given twice a week during 21 days.</p> <p>Results</p> <p>After 42 days, obesity was evidenced in Ob rats from enhanced body-weight, surface-area, and body-mass-index. Energy-expenditure, oxygen consumption(VO<sub>2</sub>) and fat-oxidation were lower in Ob-group than in C. Despite no morphometric changes, Ob-Olive, Ob-Oleuropein and Ob-Cafeic groups had higher VO<sub>2</sub>, fat-oxidation, myocardial beta-hydroxyacyl coenzyme-A dehydrogenase and lower respiratory-quotient than Ob. Citrate-synthase was highest in Ob-Olive group. Myocardial lipid-hydroperoxide(LH) and antioxidant enzymes were unaffected by olive-oil and its compounds in obesity condition, whereas LH was lower and total-antioxidant-substances were higher in C-Olive and C-Oleuropein than in C.</p> <p>Conclusions</p> <p>The present study demonstrated for the first time that olive-oil, oleuropein and cafeic-acid enhanced fat-oxidation and optimized cardiac energy metabolism in obesity conditions. Olive oil and its phenolic compounds improved myocardial oxidative stress in standard-fed conditions.</p

    An Inserted α/β Subdomain Shapes the Catalytic Pocket of Lactobacillus johnsonii Cinnamoyl Esterase

    Get PDF
    Microbial enzymes produced in the gastrointestinal tract are primarily responsible for the release and biochemical transformation of absorbable bioactive monophenols. In the present work we described the crystal structure of LJ0536, a serine cinnamoyl esterase produced by the probiotic bacterium Lactobacillus johnsonii N6.2.We crystallized LJ0536 in the apo form and in three substrate-bound complexes. The structure showed a canonical α/β fold characteristic of esterases, and the enzyme is dimeric. Two classical serine esterase motifs (GlyXSerXGly) can be recognized from the amino acid sequence, and the structure revealed that the catalytic triad of the enzyme is formed by Ser(106), His(225), and Asp(197), while the other motif is non-functional. In all substrate-bound complexes, the aromatic acyl group of the ester compound was bound in the deepest part of the catalytic pocket. The binding pocket also contained an unoccupied area that could accommodate larger ligands. The structure revealed a prominent inserted α/β subdomain of 54 amino acids, from which multiple contacts to the aromatic acyl groups of the substrates are made. Inserts of this size are seen in other esterases, but the secondary structure topology of this subdomain of LJ0536 is unique to this enzyme and its closest homolog (Est1E) in the Protein Databank.The binding mechanism characterized (involving the inserted α/β subdomain) clearly differentiates LJ0536 from enzymes with similar activity of a fungal origin. The structural features herein described together with the activity profile of LJ0536 suggest that this enzyme should be clustered in a new group of bacterial cinnamoyl esterases

    Dynamic inventory optimization for a serial supply chain with stochastic and lead-time sensitive demand

    No full text
    International audienceThis paper investigates the problem of inventory level optimization in a two-echelon supply chain over a multi-period planning horizon with stochastic and lead time-sensitive demand. The problem consists in quoting the best service time to end customers and locating inventories along the supply chain to satisfy this service time. The shorter the service time is, the greater the demand becomes. We model the problem and propose an analytical solving approach. We finally provide some illustrative examples

    Multi-echelon inventory optimization in closed-loop supply chain

    No full text
    International audienc
    • …
    corecore