Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in ...Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in quantum computing technology,the security of conventional key-based SSL/TLS protocols faces vulnerabilities.In this paper,we propose a scheme by integrating the quantum key into the SSL/TLS framework.Furthermore,the application of post-quantum algorithms is used to enhance and complement the existing encryption suites.Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput.Moreover,the proposed system showcases good resilience against quantum attacks.展开更多
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p...By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members.展开更多
An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman probl...An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure.展开更多
Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to ...Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to be avoided.This paper presents a novel,robust,and computationally efficient three-dimensional(3D)modelling and simulation strategy of gravity dams,using a series of adjacent cantilever beam elements to represent individual monoliths.These monoliths are interconnected in the longitudinal direction by 3D no-tension link elements representing the lumped shear key stiffness contributions at a particular elevation.The objective is to assess the shear key internal force demands,including the axial force,shear,and moment demands.Shear key demand-capacity ratios can then be assessed with related multi-axial failure envelopes.The 3D link element stiffness coefficients were derived from a series of 3D finite element(FE)solid models with a detailed representation of geometrical features of multiple shear keys.The results from the proposed method based on advanced grillage analysis show strong agreement with reference solutions from 3D FE solid models,demonstrating high accuracy and performance of the proposed method.The application of the proposed advanced grillage method to a dam model with two monoliths clearly shows the advantage of the proposed method,in comparison to the classical approach used in practise.展开更多
Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seism...Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seismic responses more accurately, proper analytical models of bearings and shear keys should be developed. Based on a series of cyclic loading experiments and analyses, rational analytical models of laminated elastomeric bearings and shear keys, which can consider mechanical degradation, were developed. The effect of the mechanical degradation was investigated by examining the seismic response of a small-to-medium-span bridge in the transverse direction under a wide range of peak ground accelerations(PGA). The damage mechanism for small-to-medium-span highway bridges was determined, which can explain the seismic damage investigation during earthquakes in recent years. The experimental results show that the mechanical properties of laminated elastomeric bearings will degrade due to friction sliding, but the degree of decrease is dependent upon the influencing parameters. It can be concluded that the mechanical degradation of laminated elastomeric bearings and shear keys play an important role in the seismic response of bridges. The degradation of mechanical properties of laminated elastomeric bearings and shear keys should be included to evaluate more precise bridge seismic performance.展开更多
Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It...Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It has continued approximately every five years with展开更多
Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a...Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a periodically stressful environment. To examine these responses, we sought to answer two primary research questions: a) how is variation in B. simaruba’s stomatal traits partitioned across hierarchical levels, i.e., site, tree, and leaf;and b) is variation in stomatal traits an integrated response to physiological stress expressed across the habitat gradient of Florida Keys forests? At eight sites distributed throughout the Keys, five leaves were collected from three mature trees for stomatal analysis. Leaf carbon stable isotope ratio (δ13C) was determined to infer the changes in water use efficiency caused by physiological stress experienced by each tree. The results showed that substantial proportions of the total variance in three traits (stomatal density, stomatal size, and δ13C) were observed at all levels, suggesting that processes operating at each scale are important in determining trait values. A significant negative correlation between stomatal density and size across scales was observed. Path model analysis showed that environmental variables, distance to ground water and ground water salinity, affect leaf δ13C indirectly, via its effects on stomatal traits, not directly to leaf δ13C. Therefore, the combination of small and densely distributed stomata seems to represent a strategy that allows B. simaruba to conserve water under conditions of physiological drought induced by either higher ground water salinity or flooding stress at very low elevation.展开更多
Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence tha...Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence that past physical activity(PA)interventions have had only a small effect on children’s and youth’s overall activity levels,~2it is important to clarify whether school-based PA interventions warrant resource allocation.Schools represent an accessible and cost-effective展开更多
A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is...A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is no central entity with the authority to administer the services and configurations of the network. How to secure a MANET is an active field of study for researchers. However, most of the research on the topic of securing the MANETs has focused on adapting security mechanisms that were meant for traditional wired networks. This adaptation has resulted in security solutions that do not work efficiently or that make assumptions that are not in line with the properties and characterizations of MANETs. In this paper, we propose the use of security mechanisms for MANETs that are designed based on the characteristics, functionalities, and goals of such networks. We aim to initiate a paradigm shift in securing MANETs, in which the focus should be on building security solutions specifically developed for MANETs, and not on adapting solutions that were meant for conventional wired networks. We revisit the basics and propose a simple encryption keys creation scheme that is based on the Diffie-Hellman key agreement protocol. The work presented in this paper should mark the initiation of a research agenda designed to build security primitives that are specifically for MANETs, along the lines of the new paradigm.展开更多
The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960,...The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960, 1965, and 1992. In this paper, we will present a brief parametric analysis of the hurricanes that have hit the Florida Keys in the last 100 years. This analysis will include the descriptive statistics, best fit probability distribution of the latitude of the catastrophic hurricanes and a confidence interval that detects the average latitude of hurricanes (category 3 or higher) which have hit the Florida Keys in the last 100 years.展开更多
Conaspidia qinlingia Wei sp. nov. and C. wangi Wei sp. nov. are described from China. Characters of Conaspidia bicuspis group are briefly discussed and a key to the species of the group is provided. Conaspidia murotai...Conaspidia qinlingia Wei sp. nov. and C. wangi Wei sp. nov. are described from China. Characters of Conaspidia bicuspis group are briefly discussed and a key to the species of the group is provided. Conaspidia murotai Togashi, 1984 and Conaspidia ishikawai Togashi, 2005 are new synonyms of Conaspidia guttata (Matsumura, 1912), the latter is briefly redescribed and illustrated. A key to Japanese species of Conaspidia is also provided.展开更多
Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection syste...Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection system of structures using Ultra High Performance Concrete (UHPC). However, this method requires the presence of segmental joints to transfer the loads between neighboring segments, which stresses the importance of securing structural safety and serviceability. Therefore, need is for research on the behavior of the segmental joint for the structures erected by the precast segmental construction method. To that goal, this paper presents an experimental study on the behavior of shear keys with respect to the curing time of UHPC in the segmental joint. Analysis is done on the load-displacement relation according to the curing time of the shear keys and on the failure modes of the shear keys according to the cracking pattern at failure.展开更多
RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complex...RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.展开更多
This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed mo...This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed monkeys based on depressive-like behavioral criteria and 16 normal control mon keys.All animals were video recorded for two weeks,with the duration and frequency of the core depressive behaviors and 58 other behaviors in 12 behavioral categories then evaluated via behavioral analysis.Fin ger len gths from the right and left forelimb hands of both groups were measured by X-ray imagi ng.Fin ger length and digit ratio comparisons between the two groups were con ducted using Stude nt's Mest.In terms of the durati on of each behavior,signifies nt differences emerged in“Huddling”and five other behavioral categories,including Ingestive,Amicable,Parental,Locomotive,and Resting.In addition to the above five behavioral categories,we found that depressed mon keys spent less time in parental and rubbing back and forth behaviors than the control group.Furthermore,the 4th fin gers were significantly Ion ger in the left and right hands in the control group relative to the depressed mon keys.The sec ond?to?fourth(2D:4D)digit ratio in the left and right forelimb hands was significantly lower in the control group tha n that in the depressed group.Our fin dings revealed significant differences in finger lengths and digit ratios between depressed mon keys and healthy controls,which concords with our view that relatively high fetal testosterone exposure may be a protective factor against developing depressive symptoms(or that low fetal testosterone exposure is a risk factor).展开更多
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerpr...Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerprint recognition and facial recognition are poor in randomness and can be forged easily.According to the characteristics of Electroencephalographic(EEG)signals such as the randomness,nonlinear and non-stationary etc.,it can significantly avoid these flaws.This paper proposes a novel method to generate keys based on EEG signals with end-edgecloud collaboration computing.Using sensors to measure motor imagery EEG data,the key is generated via pre-processing,feature extraction and classification.Experiments show the total time consumption of the key generation process is about 2.45s.Our scheme is practical and feasible,which provides a research route to generate biometric keys using EEG data.展开更多
The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by...The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).展开更多
To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation...To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation cost than previous schemes. Furthermore, the signatmeprocess of the proposed scheme is non-interactive.展开更多
In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data...In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided.展开更多
基金supported by ZTE IndustryUniversityInstitute Cooperation Funds under Grant No.HCCN20221029003.
文摘Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in quantum computing technology,the security of conventional key-based SSL/TLS protocols faces vulnerabilities.In this paper,we propose a scheme by integrating the quantum key into the SSL/TLS framework.Furthermore,the application of post-quantum algorithms is used to enhance and complement the existing encryption suites.Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput.Moreover,the proposed system showcases good resilience against quantum attacks.
文摘By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members.
文摘An efficient authenticated key agreement protocol is proposed, which makesuse of bilinear pairings and self-certificd public keys. Its security is based on the securityassumptions of the bilinear Diff ie-Hellman problem and the computational Diffie-Hellman problem.Users can choose their private keys independently. The public keys and identities of users can beverified implicitly when the session key being generating in a logically single step. A trusted KeyGeneration Center is no longer requiredas in the ID-based authenticated key agreement protocolsCompared with existing authenticated key agreement protocols from pairings, the. new proposedprotocol is more efficient and secure.
文摘Contraction joint shear keys are resilient features of gravity dams that can be considered to increase the sliding safety factors or minimise seismic residual sliding displacements,allowing costly remedial actions to be avoided.This paper presents a novel,robust,and computationally efficient three-dimensional(3D)modelling and simulation strategy of gravity dams,using a series of adjacent cantilever beam elements to represent individual monoliths.These monoliths are interconnected in the longitudinal direction by 3D no-tension link elements representing the lumped shear key stiffness contributions at a particular elevation.The objective is to assess the shear key internal force demands,including the axial force,shear,and moment demands.Shear key demand-capacity ratios can then be assessed with related multi-axial failure envelopes.The 3D link element stiffness coefficients were derived from a series of 3D finite element(FE)solid models with a detailed representation of geometrical features of multiple shear keys.The results from the proposed method based on advanced grillage analysis show strong agreement with reference solutions from 3D FE solid models,demonstrating high accuracy and performance of the proposed method.The application of the proposed advanced grillage method to a dam model with two monoliths clearly shows the advantage of the proposed method,in comparison to the classical approach used in practise.
基金Project of China International Science and Technology Cooperation under Grant No.2009DFA82480Science and Technology Project of Communications’ Construction in Western China,MOC under Grant No.2009318223094
文摘Laminated elastomeric bearings have been widely used for small-to-medium-span highway bridges in China, in which concrete shear keys are set transversely to prohibit large girder displacement. To evaluate bridge seismic responses more accurately, proper analytical models of bearings and shear keys should be developed. Based on a series of cyclic loading experiments and analyses, rational analytical models of laminated elastomeric bearings and shear keys, which can consider mechanical degradation, were developed. The effect of the mechanical degradation was investigated by examining the seismic response of a small-to-medium-span bridge in the transverse direction under a wide range of peak ground accelerations(PGA). The damage mechanism for small-to-medium-span highway bridges was determined, which can explain the seismic damage investigation during earthquakes in recent years. The experimental results show that the mechanical properties of laminated elastomeric bearings will degrade due to friction sliding, but the degree of decrease is dependent upon the influencing parameters. It can be concluded that the mechanical degradation of laminated elastomeric bearings and shear keys play an important role in the seismic response of bridges. The degradation of mechanical properties of laminated elastomeric bearings and shear keys should be included to evaluate more precise bridge seismic performance.
文摘Focusing on geological,geochemical and geophysical aspects of dykes and related units,the International Dyke Conference(IDC)series was launched in Toronto,Canada in 1985 by Prof.Henry C.Halls(University of Toronto).It has continued approximately every five years with
文摘Tree species in coastal forests may exhibit specialization or plasticity in coping with drought through changes in their stomatal morphology or activity, allowing for a balance between gas exchange and water loss in a periodically stressful environment. To examine these responses, we sought to answer two primary research questions: a) how is variation in B. simaruba’s stomatal traits partitioned across hierarchical levels, i.e., site, tree, and leaf;and b) is variation in stomatal traits an integrated response to physiological stress expressed across the habitat gradient of Florida Keys forests? At eight sites distributed throughout the Keys, five leaves were collected from three mature trees for stomatal analysis. Leaf carbon stable isotope ratio (δ13C) was determined to infer the changes in water use efficiency caused by physiological stress experienced by each tree. The results showed that substantial proportions of the total variance in three traits (stomatal density, stomatal size, and δ13C) were observed at all levels, suggesting that processes operating at each scale are important in determining trait values. A significant negative correlation between stomatal density and size across scales was observed. Path model analysis showed that environmental variables, distance to ground water and ground water salinity, affect leaf δ13C indirectly, via its effects on stomatal traits, not directly to leaf δ13C. Therefore, the combination of small and densely distributed stomata seems to represent a strategy that allows B. simaruba to conserve water under conditions of physiological drought induced by either higher ground water salinity or flooding stress at very low elevation.
基金financially supported by the Emil Aaltonen Foundation(No.160029)
文摘Given the rising trend in obesity in children and youth and age-related decline in moderate-to-vigorous-intensity physical activity(MVPA)in several Western,African,and Asian-Pacific countries^1 and strong evidence that past physical activity(PA)interventions have had only a small effect on children’s and youth’s overall activity levels,~2it is important to clarify whether school-based PA interventions warrant resource allocation.Schools represent an accessible and cost-effective
文摘A mobile ad hoc network (MANET) is a collection of mobile nodes that temporarily integrate with each other to form a network. Such a network does not require the existence of a typical network infrastructure. There is no central entity with the authority to administer the services and configurations of the network. How to secure a MANET is an active field of study for researchers. However, most of the research on the topic of securing the MANETs has focused on adapting security mechanisms that were meant for traditional wired networks. This adaptation has resulted in security solutions that do not work efficiently or that make assumptions that are not in line with the properties and characterizations of MANETs. In this paper, we propose the use of security mechanisms for MANETs that are designed based on the characteristics, functionalities, and goals of such networks. We aim to initiate a paradigm shift in securing MANETs, in which the focus should be on building security solutions specifically developed for MANETs, and not on adapting solutions that were meant for conventional wired networks. We revisit the basics and propose a simple encryption keys creation scheme that is based on the Diffie-Hellman key agreement protocol. The work presented in this paper should mark the initiation of a research agenda designed to build security primitives that are specifically for MANETs, along the lines of the new paradigm.
文摘The most intense and catastrophic hurricanes on record to hit the Florida Keys during 1900 to 1950 were in 1919, and 1935. From 1950 to 2000, the most intense hurricanes to hit or affect the Florida Keys were in 1960, 1965, and 1992. In this paper, we will present a brief parametric analysis of the hurricanes that have hit the Florida Keys in the last 100 years. This analysis will include the descriptive statistics, best fit probability distribution of the latitude of the catastrophic hurricanes and a confidence interval that detects the average latitude of hurricanes (category 3 or higher) which have hit the Florida Keys in the last 100 years.
基金supported by the National Natural Science Foundation of China(31172142)
文摘Conaspidia qinlingia Wei sp. nov. and C. wangi Wei sp. nov. are described from China. Characters of Conaspidia bicuspis group are briefly discussed and a key to the species of the group is provided. Conaspidia murotai Togashi, 1984 and Conaspidia ishikawai Togashi, 2005 are new synonyms of Conaspidia guttata (Matsumura, 1912), the latter is briefly redescribed and illustrated. A key to Japanese species of Conaspidia is also provided.
文摘Precast segmental construction has been recently developed to reduce the construction cost and shorten the construction term as compared to the cast-in-place method in a will to establish the design and erection system of structures using Ultra High Performance Concrete (UHPC). However, this method requires the presence of segmental joints to transfer the loads between neighboring segments, which stresses the importance of securing structural safety and serviceability. Therefore, need is for research on the behavior of the segmental joint for the structures erected by the precast segmental construction method. To that goal, this paper presents an experimental study on the behavior of shear keys with respect to the curing time of UHPC in the segmental joint. Analysis is done on the load-displacement relation according to the curing time of the shear keys and on the failure modes of the shear keys according to the cracking pattern at failure.
基金Supported by National Laboratory for Modern Communications Foundation (No. 5143 6010404DZ0235)
文摘RSA public key cryptosystem is extensively used in information security systems. However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.
基金supported by the National Natural Science Foundation of China(816 01207)National Basic Research Program of China(973 Program)(2017YFA 0505700)
文摘This research aimed to provide evidenee of a relationship between digit ratio and depression status in the cynomolgus monkey(Macaca fascicularis).In stable cyno molgus mon key social groups,we selected 15 depressed monkeys based on depressive-like behavioral criteria and 16 normal control mon keys.All animals were video recorded for two weeks,with the duration and frequency of the core depressive behaviors and 58 other behaviors in 12 behavioral categories then evaluated via behavioral analysis.Fin ger len gths from the right and left forelimb hands of both groups were measured by X-ray imagi ng.Fin ger length and digit ratio comparisons between the two groups were con ducted using Stude nt's Mest.In terms of the durati on of each behavior,signifies nt differences emerged in“Huddling”and five other behavioral categories,including Ingestive,Amicable,Parental,Locomotive,and Resting.In addition to the above five behavioral categories,we found that depressed mon keys spent less time in parental and rubbing back and forth behaviors than the control group.Furthermore,the 4th fin gers were significantly Ion ger in the left and right hands in the control group relative to the depressed mon keys.The sec ond?to?fourth(2D:4D)digit ratio in the left and right forelimb hands was significantly lower in the control group tha n that in the depressed group.Our fin dings revealed significant differences in finger lengths and digit ratios between depressed mon keys and healthy controls,which concords with our view that relatively high fetal testosterone exposure may be a protective factor against developing depressive symptoms(or that low fetal testosterone exposure is a risk factor).
基金supported by the National Natural Science Founds of China (62072368, U20B2050)Key Research and Development Program of Shaanxi Province (2020GY-039, 2021ZDLGY05-09, 2022GY040)
文摘Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in cryptography.However,the current prevailing biometric key generation techniques such as fingerprint recognition and facial recognition are poor in randomness and can be forged easily.According to the characteristics of Electroencephalographic(EEG)signals such as the randomness,nonlinear and non-stationary etc.,it can significantly avoid these flaws.This paper proposes a novel method to generate keys based on EEG signals with end-edgecloud collaboration computing.Using sensors to measure motor imagery EEG data,the key is generated via pre-processing,feature extraction and classification.Experiments show the total time consumption of the key generation process is about 2.45s.Our scheme is practical and feasible,which provides a research route to generate biometric keys using EEG data.
基金Supported by the National Natural Science Foun-dation of China (60473029)
文摘The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).
文摘To prevent active attack, we propose a new threshold signature scheme usingself-certified public keys, which makes use of hash function and discrete logarithm problem. Thescheme has less commutnication and computation cost than previous schemes. Furthermore, the signatmeprocess of the proposed scheme is non-interactive.
基金Supported by the National Natural Science Foundation of China (No. 60475012)
文摘In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided.