58 research outputs found

    Contributions to Identity-Based Broadcast Encryption and Its Anonymity

    Get PDF
    Broadcast encryption was introduced to improve the efficiency of encryption when a message should be sent to or shared with a group of users. Only the legitimate users chosen in the encryption phase are able to retrieve the message. The primary challenge in construction a broadcast encryption scheme is to achieve collusion resistance such that the unchosen users learn nothing about the content of the encrypted message even they collude

    Improved identity-based online/offline encryption

    Get PDF
    The notion of online/offline encryption was put forth by Guo, Mu and Chen (FC 2008), where they proposed an identity-based scheme called identity-based online/offline encryption (IBOOE). An online/ offline encryption separates an encryption into two stages: offline and online. The offline phase carries much more computational load than the online phase, where the offline phase does not require the information of the message to be encrypted and the identity of the receiver. Subsequently, many applications of IBOOE have been proposed in the literature. As an example, Hobenberger and Waters (PKC 2014) have recently applied it to attribute-based encryption. In this paper, we move one step further and explore a much more efficient variant.We propose an efficient semi-generic transformation to obtain an online/offline encryption from a tradition identity-based encryption (IBE). Our transformation provides a new method to separate the computation of receiver’s identity into offline and online phases. The IBOOE schemes using our transformation saves one group element in both offline and online phases compared to other IBOOE schemes in identity computing. The transformed scheme still maintains the same level of security as in the original IBE scheme

    Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption

    Get PDF
    Accountable authority identity-based encryption (A-IBE), as an attractive way to guarantee the user privacy security, enables a malicious private key generator (PKG) to be traced if it generates and re-distributes a user private key. Particularly, an A-IBE scheme achieves full black-box security if it can further trace a decoder box and is secure against a malicious PKG who can access the user decryption results. In PKC\u2711, Sahai and Seyalioglu presented a generic construction for full black-box A-IBE from a primitive called dummy identity-based encryption, which is a hybrid between IBE and attribute-based encryption (ABE). However, as the complexity of ABE, their construction is inefficient and the size of private keys and ciphertexts in their instantiation is linear in the length of user identity. In this paper, we present a new efficient generic construction for full black-box A-IBE from a new primitive called token-based identity-based encryption (TB-IBE), without using ABE. We first formalize the definition and security model for TB-IBE. Subsequently, we show that a TB-IBE scheme satisfying some properties can be converted to a full black-box A-IBE scheme, which is as efficient as the underlying TB-IBE scheme in terms of computational complexity and parameter sizes. Finally, we give an instantiation with the computational complexity as O(1) and the constant size master key pair, private keys, and ciphertexts

    Research Philosophy of Modern Cryptography

    Get PDF
    Proposing novel cryptography schemes (e.g., encryption, signatures, and protocols) is one of the main research goals in modern cryptography. In this paper, based on more than 800 research papers since 1976 that we have surveyed, we introduce the research philosophy of cryptography behind these papers. We use ``benefits and ``novelty as the keywords to introduce the research philosophy of proposing new schemes, assuming that there is already one scheme proposed for a cryptography notion. Next, we introduce how benefits were explored in the literature and we have categorized the methodology into 3 ways for benefits, 6 types of benefits, and 17 benefit areas. As examples, we introduce 40 research strategies within these benefit areas that were invented in the literature. The introduced research strategies have covered most cryptography schemes published in top-tier cryptography conferences

    Immune-modulation by polyclonal IgM treatment reduces atherosclerosis in hypercholesterolemic apoE−/− mice

    Get PDF
    AbstractObjectiveGamma-globulin treatment reduces experimental atherosclerosis by modulating immune function; however the effect of IgM on atherosclerosis is not known. We investigated the effect of serum-derived, non-immune polyclonal IgM (Poly-IgM) on atherosclerosis in mice with advanced disease and also assessed its immune-modulatory effects.Methods and resultsAortic atherosclerosis was assessed in apoE−/− mice fed atherogenic diet starting at 6 weeks of age. In addition, mice were also subjected to perivascular cuff injury to the carotid artery at 25 weeks of age to induce accelerated atherosclerosis. At the time of injury, the mice were treated weekly with a commercially available Poly-IgM (0.4mg/mouse) or PBS for 4 weeks and euthanized at 29 weeks of age. Poly-IgM reduced aortic atherosclerosis, and reduced lesion size in the aortic sinus and injured carotid artery, without significant changes in serum cholesterol levels. Poly-IgM treatment was associated with increased anti-oxLDL IgG titers and a reduction in the % splenic CD4+ T cells compared to controls. The splenic CD4+ T cell cultured from the Poly-IgM treated mice had reduced proliferation in vitro compared with controls.ConclusionPoly-IgM treatment reduced aortic and accelerated carotid atherosclerosis in apoE−/− mice in association with increased anti-oxLDL IgG titers, and reduced number and proliferative function of splenic CD4+ T cells. Our study identifies a novel athero-protective and immunomodulatory role for non-immune polyclonal IgM

    Enhanced self-renewal of hematopoietic stem/progenitor cells mediated by the stem cell gene Sall4

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Sall4 is a key factor for the maintenance of pluripotency and self-renewal of embryonic stem cells (ESCs). Our previous studies have shown that Sall4 is a robust stimulator for human hematopoietic stem and progenitor cell (HSC/HPC) expansion. The purpose of the current study is to further evaluate how Sall4 may affect HSC/HPC activities in a murine system.</p> <p>Methods</p> <p>Lentiviral vectors expressing Sall4A or Sall4B isoform were used to transduce mouse bone marrow Lin-/Sca1+/c-Kit+ (LSK) cells and HSC/HPC self-renewal and differentiation were evaluated.</p> <p>Results</p> <p>Forced expression of Sall4 isoforms led to sustained <it>ex vivo </it>proliferation of LSK cells. In addition, Sall4 expanded HSC/HPCs exhibited increased <it>in vivo </it>repopulating abilities after bone marrow transplantation. These activities were associated with dramatic upregulation of multiple HSC/HPC regulatory genes including HoxB4, Notch1, Bmi1, Runx1, Meis1 and Nf-ya. Consistently, downregulation of endogenous Sall4 expression led to reduced LSK cell proliferation and accelerated cell differentiation. Moreover, in myeloid progenitor cells (32D), overexpression of Sall4 isoforms inhibited granulocytic differentiation and permitted expansion of undifferentiated cells with defined cytokines, consistent with the known functions of Sall4 in the ES cell system.</p> <p>Conclusion</p> <p>Sall4 is a potent regulator for HSC/HPC self-renewal, likely by increasing self-renewal activity and inhibiting differentiation. Our work provides further support that Sall4 manipulation may be a new model for expanding clinically transplantable stem cells.</p

    CD8+ T Cells Mediate the Athero-Protective Effect of Immunization with an ApoB-100 Peptide

    Get PDF
    Immunization of hypercholesterolemic mice with selected apoB-100 peptide antigens reduces atherosclerosis but the precise immune mediators of athero-protection remain unclear. In this study we show that immunization of apoE (-/-) mice with p210, a 20 amino acid apoB-100 related peptide, reduced aortic atherosclerosis compared with PBS or adjuvant/carrier controls. Immunization with p210 activated CD8+ T cells, reduced dendritic cells (DC) at the site of immunization and within the plaque with an associated reduction in plaque macrophage immunoreactivity. Adoptive transfer of CD8+ T cells from p210 immunized mice recapitulated the athero-protective effect of p210 immunization in naïve, non-immunized mice. CD8+ T cells from p210 immunized mice developed a preferentially higher cytolytic response against p210-loaded dendritic cells in vitro. Although p210 immunization profoundly modulated DCs and cellular immune responses, it did not alter the efficacy of subsequent T cell dependent or independent immune response to other irrelevant antigens. Our data define, for the first time, a role for CD8+ T cells in mediating the athero-protective effects of apoB-100 related peptide immunization in apoE (-/-) mice

    Contributions to Identity-Based Broadcast Encryption and Its Anonymity

    Get PDF
    Broadcast encryption was introduced to improve the efficiency of encryption when a message should be sent to or shared with a group of users. Only the legitimate users chosen in the encryption phase are able to retrieve the message. The primary challenge in construction a broadcast encryption scheme is to achieve collusion resistance such that the unchosen users learn nothing about the content of the encrypted message even they collude

    Efficient k-out-of-n oblivious transfer scheme with the ideal communication cost

    Get PDF
    In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communication cost. In our proposed scheme, the messages sent by the receiver R to the sender S consist of only three elements, which is independent of n and k, while the messages from S to R are (n+1) elements when the sender holds n secrets. Our scheme features a nice property of universal parameter, where the system parameter can be used by all senders and receivers. The proposed k-out-of-n oblivious transfer scheme is the most efficient two-round scheme in terms of the number of messages transferred between two communicating parties in known constructions. The scheme preserves the privacy of receiver\u27s choice and sender\u27s security
    corecore