19 research outputs found

    Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification

    Get PDF
    Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data in the cloud. However, management of these encrypted data becomes a challenging problem, e.g. data classification. Besides, how to selectively share data with other users is also an important and interesting problem in cloud storage. In this paper, we focus on ciphertext-policy attribute based encryption with equality test (CP-ABEET). People can use CP-ABEET to implement not only flexible authorization for the access to encrypted data, but also efficient data label classification, i.e. test of whether two encrypted data contain the same message. We construct an efficient CP-ABEET scheme, and prove its security based on a reasonable number-theoretic assumption. Compared with the only existing CP-ABEET scheme, our construction is more efficient in key generation, and has shorter attribute-related secret keys and better security

    Characterization of binding profiles of heparanase with existing small-molecule inhibitors using computational methods

    No full text
    Heparanase (HPSE) is an emerging therapeutic target involved in various diseases. The primary function of the glycosyl hydrolase is to cleave heparan sulfate (HS) side chains from heparan sulfate proteoglycans (HSPGs). This process regulates the homeostasis and the integrity of the extracellular matrix (ECM) and the bioavailability of growth factors and cytokines. Overexpression of heparanase has been observed under various pathological conditions, such as cancer, angiogenesis, and inflammation, suggesting HPSE a promising therapeutic target. However, despite decades of research on HPSE inhibitors, no small-molecule HSPE inhibitor has been approved by regulatory agencies. In this study, we used computational tools to provide insights into small-molecule HPSE inhibitors design. We performed a series of molecular dynamics (MD) simulations and binding profile analyses of 48 diverse small-molecule HPSE inhibitors reported by various research labs. Our results identified the key binding residues on HPSE that should be targeted in inhibitor design, considering both their importance in facilitating interactions with the inhibitor and their functional roles. We also performed energy analyses to create a binding energy map showing the energy breakdown on HPSE residues. To guide future HPSE small-molecule inhibitor discovery, we built a pharmacophore model based on key binding features identified in this study. We also selected and discussed good binding modes discovered through MD. Our findings provide insight into the design and development of small-molecule-based HPSE inhibitors

    Development of Smartphone app for reverberation time measurements in rooms with furniture

    No full text
    Room acoustics, as a branch of architectural acoustics, has got more and more attention nowadays. One of the aims of the room acoustics is to develop different method to evaluate the acoustic performance of the rooms and to address human acoustic comfort needs. Meanwhile, the process of reverberation plays an important role in room acoustics, and it is also an evaluation standard of evaluating room acoustics effects. Reverberation time: The time it takes for a signal (sound) to drop by 60dB, which is an essential parameter about the “echo” in measured room. The reverberation time in a room depends on its absorption value and volume. If the volume of the room is large and the absorption value is small, RT60 is long. On the contrary, with a small volume and large absorption value of a room, RT60 will be short. More importantly, the sound will be unnatural or ambiguous if RT60 is too short or too long. Reverberation time is one of important parameters in room acoustics. It is employed as a standardized method to evaluate the acoustic comfort of an enclosure, which is one of the reasons why we research on this project. Nowadays Android phones are very popular around the world. In the statistics of operating systems of worldwide smart-phone in 2017, Android operating system’s market share is 85.9% in the word, which means Android device has the biggest number of users in the world. From what have been discussed above, the direction of our thesis is designed. The goal of our project is to build a convenient and fast Android app. This app can measure the reverberation time of indoor environment using Android phone, then allows user to store the measured data in this phone for further use.Nowadays, room acoustics has received more and more attention. One aim of it is to develop different method to evaluate the acoustic performance of the rooms and to address human acoustic comfort needs. Meanwhile, reverberation time is one of the most important parameters in room acoustics. It is employed as a standardized method to evaluate the acoustic comfort of an enclosure

    Attribute-Based Equality Test over Encrypted Data without Random Oracles

    Get PDF
    © 2013 IEEE. Sensitive data would be encrypted before uploading to the cloud due to the privacy issue. However, how to compare the encrypted data efficiently becomes a problem. Public Key Encryption with Equality Test (PKEET) provides an efficient way to check whether two ciphertexts (of possibly different users) contain the same message without decryption. As an enhanced variant, Attribute-based Encryption with Equality Test (ABEET) provides a flexible mechanism of authorization on the equality test. Most of the existing ABEET schemes are only proved to be secure in the random oracle model. Their security, however, would not be guaranteed if random oracles are replaced with real-life hash functions. In this work, we propose a construction of CP-ABEET scheme and prove its security based on some reasonable assumptions in the standard model. We then show how to modify the scheme to outsource complex computations in decryption and equality test to a third-party server in order to support thin clients

    Atorvastatin Protects Myocardium Against Ischemia-Reperfusion Injury Through Inhibiting miR-199a-5p

    No full text
    Objective: This study aimed to evaluate the protective effects of atorvastatin against myocardial ischemia/reperfusion (I/R) injury in cardiomyocytes and its possible underlying mechanism. Method: Direct cytotoxic effect of OGD/R on cardiomyocytes with and without atorvastatin pretreatment was evaluated. Effects of atorvastatin on expression of GSK-3β and miR-199a-5p were determined using RT-PCR and Western blot. In addition, GSK-3β expression with miR-199a-5p upregulation and downregulation was detected using RT-PCR, Western blot, and immunohistochemistry. Results: Pretreatment with atorvastatin significantly improved the recovery of cells viability from OGD/R (pConclusion: These results suggested that atorvastatin provides the cardioprotective effects against I/R injury via increasing GSK-3β through inhibition of miR-199a-5p

    Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols

    No full text
    Privacy-preserving optimistic fair exchange (P2OFE) is a kind of protocols which aim to solve the fairness problem in the exchange of digital signatures between two parties and in the meanwhile protect their privacy. In P2OFE, no one else including the semi-trusted third party in charge of arbitration can confirm an exchange even after resolving a dispute. In this paper we present a black-box construction of P2OFE based on a tag-based public key encryption scheme and a standard digital signature scheme. Our construction follows the ‘sign-then-encrypt’ paradigm, and is secure in the standard model. Our construction is generic and admits more instantiations of P2OFE

    Outsourced ciphertext-policy attribute-based encryption with equality test

    No full text
    In the cloud era people get used to store their data to the cloud server, and would use encryption technique to protect their sensitive data from leakage. However, encrypted data management is a challenging problem, for example, encrypted data classification. Besides, how to effectively control the access to the encrypted data is also an important problem. Ciphertext-policy attribute-based encryption with equality test (CP-ABEET) is an efficient solution to the aforementioned problems, which enjoys the advantage of attribute-based encryption, and in the meanwhile supports the test of whether two different ciphertexts contain the same message without the need of decryption. However, the existing CP-ABEET schemes suffer from high computation costs. In this paper, we study how to outsource the heavy computation in CP-ABEET scheme to a third-party server. We introduce the notion of CP-ABEET supporting outsourced decryption (OCP-ABEET), which saves a lot of local computation loads of CP-ABEET. We propose a concrete construction of OCP-ABEET, and prove its security based on a reasonable number-theoretic assumption in the random oracle model. Compared with the existing CP-ABEET schemes, our scheme is more computationally efficient

    RESEARCH OF THE COLD-BEATING GEAR HARDNESS ON THE BASIS OF MICROSTRUCTURE

    No full text
    Hardness is the important factors to measure the quality of the gear. The gear processed by traditional technology has a lower tooth surface hardness because of the cut metal fibre. This article was based on copper,aluminum,steel Q235,for gear cold-beating. The gear organization change and its relationship with hardness distribution were researched on the basis of the material microstructure. In the experiment,the gear metal organization was not cut off after cold-beating,accompanying the crystal granular flow and the increasing dislocation density. Eventually,the gear organization was to be close strips fibrous tissue.It was found that the hardness and strength of the gear had a big enhancement after the two directions measurement of the tooth surface hardness distribution. This technology improved the processing surface organization and the overall quality of the gear

    Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification

    No full text
    © 2019 The British Computer Society 2019. All rights reserved. For permissions, please e-mail: [email protected]. Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data in the cloud. However, management of these encrypted data becomes a challenging problem, e.g. data classification. Besides, how to selectively share data with other users is also an important and interesting problem in cloud storage. In this paper, we focus on ciphertext-policy attribute based encryption with equality test (CP-ABEET). People can use CP-ABEET to implement not only flexible authorization for the access to encrypted data, but also efficient data label classification, i.e. test of whether two encrypted data contain the same message. We construct an efficient CP-ABEET scheme, and prove its security based on a reasonable number-theoretic assumption. Compared with the only existing CP-ABEET scheme, our construction is more efficient in key generation, and has shorter attribute-related secret keys and better security
    corecore