Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to...Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.展开更多
A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg e...A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO.展开更多
Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic ph...Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic phase before 1990’s, the majority of these projects planned before that period have not considered the effect of long term variation of water resources. In all of these numerous operational and under-construction projects, an intelligent selection of the best water transmission protocol, can help the governments to optimize their expenditures on these projects ,and also can help water resources managers to face climate change effects wisely. In this paper as a case study, Dez to Qomrood inter-basin water transfer project is considered to evaluate the efficiency of three different protocols in long term. The effect of climate change has been forecasted via a wide range of GCMs (Global Circulation Model) in order to calculate the change of flow in the basin's area with different climate scenarios. After these calculation, a water allocation model has been used to evaluate which of these three water transmission protocols (Proportional Allocation (PA), Fix Upstream allocation (FU), and Fix Downstream allocation (FD)) is the most efficient logic switch economically in a framework including both upstream and downstream stakeholders. As the final result, it can be inferred that Fix Downstream allocation (FD) protocol can supply more population especially with urban water for a fix expense and also is the most adapted protocol with future global change, at least in the first round of sustainability assessment.展开更多
This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtu...This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtual Filestore(VFS). Finally we introduce the implementation and the key technology of the FTS system.展开更多
Objective To compare the results of a novel regimen of human menopausal gonadotrophin (hMG) in combination with clomiphene citrate (CC) in mid-to-late follicular phase with those of a short protocol of GnRH agoni...Objective To compare the results of a novel regimen of human menopausal gonadotrophin (hMG) in combination with clomiphene citrate (CC) in mid-to-late follicular phase with those of a short protocol of GnRH agonist (GnRHa) and hMG used for IVF. Methods In the retrospective study, 842 patients undergoing IVF were collected and classified into two groups: hMG in combination with CC in mid-to-late follicular phase (group A, n=319) and short protocol of GnRHa-hMG (group B, n=523). The main outcome measures were ovarian responses in stimulation cycles and pregnancy outcomes in subsequent frozen-thawed embryo transfer (FET) cycles. Results In group A, the serum LH concentration on day 8 -10 was similar with that on the day of hCG administration (2.43 ± 1.92 IU vs 2.51 ±2.05 IU). The number of mature follicles and oocytes retrieved was significantly lower in group A than in group B while the fertilization rate and the cleavage rate were comparable. The clinical pregnancy rate (47. 79% vs 48.04%), the implantation rate (32.49% vs 33.11%) and the cumulative pregnancy rate (58.09% vs 60.22%) were respectively similar in group A and group B. Conclusion hMG in combination with CC in mid-to-late follicular phase results in the same pregnancy outcome as short protocol. The novel protocol may take the advantage of eliminating the occurrehce of a premature endogenous LH Surge.展开更多
The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direc...The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direction. The present paper is a brief report of the authors’ design methodologyand development of File Transfer Access and Management in reference to the ISO / OSI Moduleand implementation of its service protocol in a LAN,展开更多
With the goal of meeting one-to-many negotiation mechanism in the process of inter-basin water transfer, according to features of all interest subjects in analysis of inter-basin water transfer, a one-to-many synchron...With the goal of meeting one-to-many negotiation mechanism in the process of inter-basin water transfer, according to features of all interest subjects in analysis of inter-basin water transfer, a one-to-many synchronous bidding negotiation model based on bidding rules of game theory is structured, which analyzes and negotiates the functions, code of conduct and information expression of each subject. In order to optimize overall interests and individual interests, and a series of parameters in the negotiation, the paper propose various rules corresponding to the negotiation model so that the efficiency of each interest subject and fair distribution of negotiation proceeds can be safeguarded in the inter-basin water transfer system.展开更多
基金Supported by the National Natural Science Foundation of China(No.61501064)Sichuan Technology Support Program(No.2015GZ0088)
文摘Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.
基金supported by Opening Project of State Key Laboratory of Cryptology, Scientific Research and Postgraduate Training Cooperation Project-Scientific Research Base-New Theory of Block Cipher and Obfuscation and their Application Research, and Information Management and Professional Building of Information System
文摘A new secure oblivious transfer (OT) protocol from indistinguishability obfuscation (iO) is proposed in this paper. The candidate iO and a dual-mode cryptosystem are the main technical tools of this scheme. Garg et al. introduced a candidate construction of iO in 2013. Following their steps, a new k-out-of-1 OT protocol is presented here, and its realization from decisional Diffie-Hellman (DDH) is described in this paper, in which iO was combined with the dual-mode cryptosystem. The security of the scheme mainly relies on the indistinguishability of the obf-branches (corresponding to the two modes in dual-mode model). This paper explores a new way for the application of iO.
文摘Nowadays, there is a growing emphasis on Inter-basin water transfer projects as costly activities with ambiguous effects on environment, society and economy. Since the concept of climate change was in its embryonic phase before 1990’s, the majority of these projects planned before that period have not considered the effect of long term variation of water resources. In all of these numerous operational and under-construction projects, an intelligent selection of the best water transmission protocol, can help the governments to optimize their expenditures on these projects ,and also can help water resources managers to face climate change effects wisely. In this paper as a case study, Dez to Qomrood inter-basin water transfer project is considered to evaluate the efficiency of three different protocols in long term. The effect of climate change has been forecasted via a wide range of GCMs (Global Circulation Model) in order to calculate the change of flow in the basin's area with different climate scenarios. After these calculation, a water allocation model has been used to evaluate which of these three water transmission protocols (Proportional Allocation (PA), Fix Upstream allocation (FU), and Fix Downstream allocation (FD)) is the most efficient logic switch economically in a framework including both upstream and downstream stakeholders. As the final result, it can be inferred that Fix Downstream allocation (FD) protocol can supply more population especially with urban water for a fix expense and also is the most adapted protocol with future global change, at least in the first round of sustainability assessment.
文摘This paper deeply discusses the design method of the File Transfer System(FTS)which is based on the File Transfer, Access and Management(FTAM) protocol standard, and probes into the construction principle of the Virtual Filestore(VFS). Finally we introduce the implementation and the key technology of the FTS system.
基金supported by National Natural Science Foundation of China (No. 31071275, No. 81270749 and No. 31101070)
文摘Objective To compare the results of a novel regimen of human menopausal gonadotrophin (hMG) in combination with clomiphene citrate (CC) in mid-to-late follicular phase with those of a short protocol of GnRH agonist (GnRHa) and hMG used for IVF. Methods In the retrospective study, 842 patients undergoing IVF were collected and classified into two groups: hMG in combination with CC in mid-to-late follicular phase (group A, n=319) and short protocol of GnRHa-hMG (group B, n=523). The main outcome measures were ovarian responses in stimulation cycles and pregnancy outcomes in subsequent frozen-thawed embryo transfer (FET) cycles. Results In group A, the serum LH concentration on day 8 -10 was similar with that on the day of hCG administration (2.43 ± 1.92 IU vs 2.51 ±2.05 IU). The number of mature follicles and oocytes retrieved was significantly lower in group A than in group B while the fertilization rate and the cleavage rate were comparable. The clinical pregnancy rate (47. 79% vs 48.04%), the implantation rate (32.49% vs 33.11%) and the cumulative pregnancy rate (58.09% vs 60.22%) were respectively similar in group A and group B. Conclusion hMG in combination with CC in mid-to-late follicular phase results in the same pregnancy outcome as short protocol. The novel protocol may take the advantage of eliminating the occurrehce of a premature endogenous LH Surge.
文摘The authors, first of all, discuss the importance of implementing application layer protocol ofLAN. A study in this area is required in order to speed up its practical uses as well as further de-velopment in the direction. The present paper is a brief report of the authors’ design methodologyand development of File Transfer Access and Management in reference to the ISO / OSI Moduleand implementation of its service protocol in a LAN,
文摘With the goal of meeting one-to-many negotiation mechanism in the process of inter-basin water transfer, according to features of all interest subjects in analysis of inter-basin water transfer, a one-to-many synchronous bidding negotiation model based on bidding rules of game theory is structured, which analyzes and negotiates the functions, code of conduct and information expression of each subject. In order to optimize overall interests and individual interests, and a series of parameters in the negotiation, the paper propose various rules corresponding to the negotiation model so that the efficiency of each interest subject and fair distribution of negotiation proceeds can be safeguarded in the inter-basin water transfer system.