Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system ...Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system that has been widely used in cyberspace security in recent years.The most classic public key cryptography algorithm is RSA and its difficulty is based on the large integer decomposition problem.In 2017,ISRSAC was proposed by M.Thangaval.ISRSAC has made security improvements to the RSA algorithm by increasing the complexity in factoring the value of modulus‘n’.A digital signature algorithm based on ISRSAC algorithm was completed in this paper,and furthermore,a proxy signature algorithm based on ISRSAC and two kinds of multi-signature algorithms were presented,which include sequential multi-signature and broadcasting multi-signature.展开更多
In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improv...In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme.展开更多
With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become ...With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness.展开更多
Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signatu...Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal.展开更多
Objective:A highly aggressive and lethal malignancy,characterized by its heterogeneity,lung adenocarcinoma(LUAD)presents significant challenges in prognosis and treatment.Disulfidptosis,a newly identified form of regu...Objective:A highly aggressive and lethal malignancy,characterized by its heterogeneity,lung adenocarcinoma(LUAD)presents significant challenges in prognosis and treatment.Disulfidptosis,a newly identified form of regulated cell death,offers novel insights into cancer progression,yet its role in LUAD remains poorly understood.Methods:We identified disulfidptosis-related genes(DRGs)from prior studies and analyzed their interactions and functional enrichment.Molecular subtypes were identified through consensus clustering based on DRG expression,and a prognostic DRG signature was developed using multivariate Cox regression analysis.A nomogram integrating clinical variables was developed to predict survival.Comprehensive analyses,including single-cell RNA sequencing,immune infiltration,and drug sensitivity,were validated using clinical specimens,LUAD cell lines,Western blotting(WB)and immunohistochemistry(IHC).Results:A total of 16 DRGs were identified,classifying LUAD patients into three distinct subtypes with differential survival and immune profiles.A 4-gene signature(GYS1,NDUFA11,NDUFB10,SLC7A11)was used to build a risk score model,demonstrating robust prognostic accuracy.A nomogram combining this signature with clinical features reliably predicted 1-,3-,and 5-year survival.The signature correlated with immune cell infiltration,with single-cell analysis revealing DRG enrichment in myeloid cells.Notably,SLC7A11 and GYS1 were positively associated with chemotherapeutic drug sensitivity.Validation through reverse transcription quantitative polymerase chain reaction(RT-qPCR),WB and IHC confirmed upregulated DRG expression in LUAD tissues and cell lines.Conclusions:This research highlights the essential role of DRGs in modulating the tumor microenvironment,influencing therapeutic response,and determining the prognosis of LUAD.The risk model and nomogram,derived from DRG expression,offer robust tools for survival prediction and personalized treatment stratification,facilitating the development of disulfidptosis-targeted therapeutic strategies.展开更多
Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concern...Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes.展开更多
We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical feedback.Due to the inevitable noise durin...We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical feedback.Due to the inevitable noise during the photoelectric detection and analog-digital conversion,the varying of output optical power would change the signal to noise ratio,then impact time delay signature identification and the random bit generation.Our results show that,when the optical power is less than-14 dBm,with the decreasing of the optical power,the actual identified time delay signature degrades and the entropy of the chaotic signal increases.Moreover,the extracted random bit sequence with lower optical power is more easily pass through the randomness testing.展开更多
The hydrothermal signatures of mid-ocean ridge sediments are crucial geochemical data providing insights into investigating hydrothermal anomalies and locating seafloor massive sulfide deposits.This paper outlines the...The hydrothermal signatures of mid-ocean ridge sediments are crucial geochemical data providing insights into investigating hydrothermal anomalies and locating seafloor massive sulfide deposits.This paper outlines the geochemical features of 24 surface sediments and one sediment core(26 V-GC 01,294 cm)along the South Mid-Atlantic Ridge(SMAR)from 18°S to 22°S,an area where hydrothermal active fields have yet to be discovered.The surface sediments mainly consist of biogenic carbonates,aluminosilicates,and hydrothermal Fe-Mn(oxy)oxides.The core sediments primarily comprise organic matter,detrital materials,hydrothermal components,and substances scavenged from seawater.The rare Earth element(REE)patterns suggest the presence of hydrothermal contributions within the surface and core sediments.The enrichment factors for Fe,Mn,Cu,and Zn in surface sediments suggest these metals are concentrated at the 19°S,21°S,and 21.5°S segments,further indicating their potential as hydrothermal active fields.Downcore variations of Fe,Mn,P,Cu,Pb,V,and Co suggest at least six episodes of hydrothermal activity.The impact of hydrothermal processes on the sediments from SMAR 18°S to 22°S indicates that the study area has the potential to host a significant number of hydrothermal active fields.展开更多
Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained envi...Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained environments,and traditional monotonic access structures are inadequate for handling increasingly complex access policies.In this paper,we propose a novel smart contract-assisted ABS(SC-ABS)algorithm that supports nonmonotonic access structures,aiming to reduce client computing overhead while providingmore expressive and flexible access control.The SC-ABS scheme extends the monotonic access structure by introducing the concept of negative attributes,allowing for more complex and dynamic access policies.By utilizing smart contracts,the algorithmsupports distributed trusted assisted computation,and the computation code is transparent and auditable.Importantly,this design allows information about user attributes to be deployed on smart contracts for computation,both reducing the risk of privacy abuse by semi-honest servers and preventing malicious users from attribute concealment to forge signatures.We prove that SC-ABS satisfies unforgeability and anonymity under a random oracle model,and test the scheme’s cost.Comparedwith existing schemes,this scheme has higher efficiency in client signature and authentication.This scheme reduces the computing burden of users,and the design of smart contracts improves the security of aided computing further,solves the problem of attribute concealment,and expresses a more flexible access structure.The solution enables permission control applications in resource-constrained distributed scenarios,such as the Internet of Things(IoT)and distributed version control systems,where data security and flexible access control are critical.展开更多
Quantum digital signature(QDS)can guarantee the information-theoretical security of a signature with the fundamental laws of quantum physics.However,most current QDS protocols do not take source security into account,...Quantum digital signature(QDS)can guarantee the information-theoretical security of a signature with the fundamental laws of quantum physics.However,most current QDS protocols do not take source security into account,leading to an overestimation of the signature rate.In this paper,we propose to utilize Hong–Ou–Mandel interference to characterize the upper bound of the source imperfections,and further to quantify information leakage from potential side-channels.Additionally,we combine decoy-state methods and finite-size analysis in analyzing the signature rate.Simulation results demonstrate the performance and feasibility of our approach.Our current work can improve the practical security of QDS systems,thereby promoting their further networked applications.展开更多
Backgrounds:As cancer progresses through various stages of malignancy,metastasis,and drug resistance,the Wnt/-catenin signaling is frequently dysregulated.Despite advancements in medical technology and therapeutic str...Backgrounds:As cancer progresses through various stages of malignancy,metastasis,and drug resistance,the Wnt/-catenin signaling is frequently dysregulated.Despite advancements in medical technology and therapeutic strategies,the prognosis for numerous gastric cancer patients remains unfavorable.Methods:For the analysis of prognostic signature genes associated with Wnt signaling in GC,we used LASSO(least absolute shrinkage and selection operator)regression.To explore the function,cell specificity,and transcriptional regulation of the signature gene Carboxypeptidase Z(CPZ),we conducted co-expression analysis,single-cell RNA sequencing data analysis,transcription factor prediction,and dual luciferase reporter assay.The knockdown and overexpression experiments were also performed to observe the changes in the downstream gene expression,as well as the influence on the biological functions of GC cells.Results:We identified a five-gene signature,including CPZ,Collagen Triple Helix Repeat Containing-1(CTHRC1),Dickkopf-1(DKK1),Epidermal Growth Factor(EGF),and Glypican Proteoglycan-3(GPC3),with risk scores predictive of the prognosis of GC patients.We found that the adipocyte enhancer binding protein 1(AEBP1)and transcription factor 3(TCF3)could interact in the nucleus and synergistically enhance the expression of Wnt signaling-associated genes,including WNT2/FZD2(Wnt family member 2/frizzled class receptor 2)and VIM(vimentin),thus promoting the invasion,migration,and malignant metastasis of GC.Conclusions:Our study offers a precise gene-signature prediction method for the prognosis of GC.We discovered the synergistic effect of AEBP1 and TCF3 in the nucleus on GC metastasis.GC may benefit from the identification of this potential therapeutic target.展开更多
Local adaptation is critical for plant survivals and reproductions in the context of global environmental change.Heterogeneous environments impose various selection pressures that influence the fitness of organisms an...Local adaptation is critical for plant survivals and reproductions in the context of global environmental change.Heterogeneous environments impose various selection pressures that influence the fitness of organisms and leave genomic signatures during the process of adaptation to local environments.However,unveiling the genomic signatures of adaptation still poses a major challenge especially for perennials due to limited genomic resources.Here,we utilized Actinidia eriantha,a Chinese endemic liana,as a model case to detect drivers of local adaptation and adaptive signals through landscape genomics for 311 individuals collected from 25 populations.Our results demonstrated precipitation and solar radiation were two crucial factors influencing the patterns of genetic variations and driving adaptive processes.We further uncovered a set of genes involved in adaptation to heterogeneous environments.Among them,AeERF110 showed high genetic differentiation between populations and was confirmed to be involved in local adaptation via changes in allele frequency along with precipitation(Prec_03)and solar radiation(Srad_03)in native habitats separately,implying that adaptive loci frequently exhibited environmental and geographic signals.In addition,we assessed genetic offsets of populations under four future climate models and revealed that populations from middle and east clusters faced higher risks in adapting to future environments,which should address more attentions.Taken together,our study opens new perspectives for understanding the genetic underpinnings of local adaptation in plants to environmental changes in a more comprehensive fashion and offered the guides on applications in conservation efforts.展开更多
Local cattle breeds play a critical role in breeding programs due to their genetic adaptations to diverse environmental conditions.However,the genomic architecture of local cattle breeds in Kazakhstan remains largely ...Local cattle breeds play a critical role in breeding programs due to their genetic adaptations to diverse environmental conditions.However,the genomic architecture of local cattle breeds in Kazakhstan remains largely unexplored.This study utilized whole-genome sequencing data from Kazakh cattle to elucidate their genetic composition,uncovering three primary ancestral components:European,Eurasian,and East Asian taurine.The East Asian taurine lineage likely represents the earliest genetic contribution to Kazakh cattle but was largely replaced by subsequent waves of cattle migrations across Eurasia,leaving only a minor genetic signature in the current cattle population.In contrast,Eurasian taurine ancestry predominated in the Alatau and Kazakh local breeds,while the European taurine component was most prevalent in Kazakh white-headed cattle,consistent with their documented breeding history.Kazakh cattle exhibited higher genetic diversity and lower inbreeding coefficients compared to European commercial breeds,reflecting reduced exposure to intense artificial selection.A strong selection signal was identified on chromosome 6 at a locus encompassing PDGFRA,KIT,and KDR,which may be associated with the white-headed pigmentation characteristic of Kazakh white-headed cattle.Additional genes under selection were linked to lipid metabolism(IRS1,PRKG1,and ADCY8),meat production traits(KCNMA1,PDGFRA,HIF1A,and ANTXR1),and dairy production(ATP2B1,DHX15,FUK,NEGR1,CCDC91,COG4,and PTK2B).This study represents the first comprehensive analysis of nuclear genome data from local Kazakh cattle.It highlights the impact of historical cattle migrations across Eurasia on their genetic landscape and identifies key genomic regions under selection.These findings advance our understanding of the evolutionary history of cattle and offer valuable genetic resources for future breeding strategies.展开更多
Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-...Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem.展开更多
Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificate...Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its security. The new scheme is proved secure against the two representative types adversaries in certificateless aggregate signature under the assumption that computational Diffie-Hellman problem is hard. Furthermore, from the comparison of the computation cost of the new scheme with some existing certificateless aggregate signature schemes in group sum computation, scalar multiplication computation, Hash computation and abilinear pairings computation, it concludes that the new scheme reduces the computation cost in scalar multiplication computation in half and maintains the same in the other computation costs.展开更多
An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from gen...An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from generating the proxy blind signature, thus the profitsof the proxy signer are guaranteed. We introduce bilinear pairings to minimize computationaloverhead and to improve the related performance of our scheme. In addition, the proxy blindsignature presented is non-repudiable and it fulfills perfectly the security requirements of a proxyblind signature.展开更多
Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an i...Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an important role in security solutions. Several ID-based signature schemes have been put forward, many of which are based on bilinear pairings. In key management and moderate security demand scenarios, ID-based public key cryptosystem is more preferable than other public key infrastructure based systems. In this paper, an improved ID-based proxy ring signature scheme from bilinear pairings is proposed which combines the advantages of proxy signature and of ring signatures. Our scheme can guarantee the profits of the proxy signer via preventing the original signer form generating the proxy ring signature. Furthermore, bilinear pairings are introduced to minimize the computation overhead and to improve the related performance of our scheme. In contrast with Zhang's scheme, our scheme is a computational efficiency improvement for signature verification because the computational cost of bilinear pairings required is reduced from O(n) to O( 1 ). In addition, the proxy ring signature presented in this paper can perfectly satisfy all the security requirements of proxy ring signature, i. e. signer-ambiguity, non-forgeability, verification, non-deniability and distinguishability.展开更多
In ubiquitous computing,data should be able to be accessed from any location,and the correctness of data becomes vital during the communication.Suppose that many users sign different messages respectively,before forwa...In ubiquitous computing,data should be able to be accessed from any location,and the correctness of data becomes vital during the communication.Suppose that many users sign different messages respectively,before forwarding or sending these messages,then the verifier must spend a lot of computing time to verify their signatures.Consequently,the aggregate signature scheme is an effective method of improving efficiency in this kind of systems,which provides the convenience for the verifier.In this paper,we propose a new certificateless aggregate signature scheme which is efficient in generating a signature and verification.This scheme is provably secure under the extended computational Diffie-Hellman assumption.展开更多
基金This work has been performed in National Natural Science Foundation of China(No.61772047,61372069)the Fundamental Research Funds for the Central Universities(No.328201902)+2 种基金National Defense Pre-research Foundation,SRF for ROCS,SEM(JY0600090102)111 project(No.B08038)China Civil Aviation Information Technology Research Base Funded Project(CAAC-ITRB-201705).
文摘Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system that has been widely used in cyberspace security in recent years.The most classic public key cryptography algorithm is RSA and its difficulty is based on the large integer decomposition problem.In 2017,ISRSAC was proposed by M.Thangaval.ISRSAC has made security improvements to the RSA algorithm by increasing the complexity in factoring the value of modulus‘n’.A digital signature algorithm based on ISRSAC algorithm was completed in this paper,and furthermore,a proxy signature algorithm based on ISRSAC and two kinds of multi-signature algorithms were presented,which include sequential multi-signature and broadcasting multi-signature.
基金Supported by the National Natural Science Foundation of China (No.10671051)the Natural Science Foundation of Zhejiang Province (No.Y105067).
文摘In 2005, Bao, et al. [Appl. Math. and Comput., vol.169, No.2, 2005] showed that Tzeng, et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification was insecure, and proposed an improved scheme with no Share Distribution Center (SDC). This paper shows that Bao, et al.’s scheme suffers from the proxy relationship inversion attack and forgery attack, and pro- poses an improvement of Bao, et al.’s scheme.
基金supported by the National Natural Science Foundation of China(Grant No.62102449)the Central Plains Talent Program under Grant No.224200510003.
文摘With the increasing popularity of blockchain applications, the security of data sources on the blockchain is gradually receiving attention. Providing reliable data for the blockchain safely and efficiently has become a research hotspot, and the security of the oracle responsible for providing reliable data has attracted much attention. The most widely used centralized oracles in blockchain, such as Provable and Town Crier, all rely on a single oracle to obtain data, which suffers from a single point of failure and limits the large-scale development of blockchain. To this end, the distributed oracle scheme is put forward, but the existing distributed oracle schemes such as Chainlink and Augur generally have low execution efficiency and high communication overhead, which leads to their poor applicability. To solve the above problems, this paper proposes a trusted distributed oracle scheme based on a share recovery threshold signature. First, a data verification method of distributed oracles is designed based on threshold signature. By aggregating the signatures of oracles, data from different data sources can be mutually verified, leading to a more efficient data verification and aggregation process. Then, a credibility-based cluster head election algorithm is designed, which reduces the communication overhead by clarifying the function distribution and building a hierarchical structure. Considering the good performance of the BLS threshold signature in large-scale applications, this paper combines it with distributed oracle technology and proposes a BLS threshold signature algorithm that supports share recovery in distributed oracles. The share recovery mechanism enables the proposed scheme to solve the key loss issue, and the setting of the threshold value enables the proposed scheme to complete signature aggregation with only a threshold number of oracles, making the scheme more robust. Finally, experimental results indicate that, by using the threshold signature technology and the cluster head election algorithm, our scheme effectively improves the execution efficiency of oracles and solves the problem of a single point of failure, leading to higher scalability and robustness.
基金supported by the National Key R&D Program of China(2022YFB2701500)the National Natural Science Foundation of China(62272385,62311540156)+2 种基金Shaanxi Distinguished Youth Project(2022JC-47)the Key Research and Development Program of Shaanxi(2021ZDLGY06-04)Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Research(ZR2022ZD03).
文摘Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal.
基金funded by the Top Talent Support Program for Young and Middle-aged People of Wuxi Health Commission(No.BJ2023014)the General Program of Wuxi Medical Center of Nanjing Medical University(No.WMCG202406)the Quality Talent Program of Wuxi Medical Center of Nanjing Medical University(No.WMCQ202401)。
文摘Objective:A highly aggressive and lethal malignancy,characterized by its heterogeneity,lung adenocarcinoma(LUAD)presents significant challenges in prognosis and treatment.Disulfidptosis,a newly identified form of regulated cell death,offers novel insights into cancer progression,yet its role in LUAD remains poorly understood.Methods:We identified disulfidptosis-related genes(DRGs)from prior studies and analyzed their interactions and functional enrichment.Molecular subtypes were identified through consensus clustering based on DRG expression,and a prognostic DRG signature was developed using multivariate Cox regression analysis.A nomogram integrating clinical variables was developed to predict survival.Comprehensive analyses,including single-cell RNA sequencing,immune infiltration,and drug sensitivity,were validated using clinical specimens,LUAD cell lines,Western blotting(WB)and immunohistochemistry(IHC).Results:A total of 16 DRGs were identified,classifying LUAD patients into three distinct subtypes with differential survival and immune profiles.A 4-gene signature(GYS1,NDUFA11,NDUFB10,SLC7A11)was used to build a risk score model,demonstrating robust prognostic accuracy.A nomogram combining this signature with clinical features reliably predicted 1-,3-,and 5-year survival.The signature correlated with immune cell infiltration,with single-cell analysis revealing DRG enrichment in myeloid cells.Notably,SLC7A11 and GYS1 were positively associated with chemotherapeutic drug sensitivity.Validation through reverse transcription quantitative polymerase chain reaction(RT-qPCR),WB and IHC confirmed upregulated DRG expression in LUAD tissues and cell lines.Conclusions:This research highlights the essential role of DRGs in modulating the tumor microenvironment,influencing therapeutic response,and determining the prognosis of LUAD.The risk model and nomogram,derived from DRG expression,offer robust tools for survival prediction and personalized treatment stratification,facilitating the development of disulfidptosis-targeted therapeutic strategies.
基金funded by the Yunnan Key Laboratory of Blockchain Application Technology(202105AG070005,202305AG340008)&YNB202301,NSFC(Grant Nos.72293583,72293580,62476007,62176273,62271234)the Open Foundation of State Key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2024-1-06)+2 种基金the Project of Science and Technology Major Project of Yunnan Province(202302AF080006)Open Foundation of State Key Laboratory of Public Big Data(Guizhou University)under Grant No.PBD2022-16Double First-Class Project for Collaborative Innovation Achievements inDisciplines Construction in Heilongjiang Province under Grant No.GXCG2022-054.
文摘Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure, quantum-resistant blind signatures. In this paper, we introduce lattice-based forward-secure blind signature (LFSBS), a lattice-based forward-secure blind signature scheme for medical privacy preservation in BIoMT. LFSBS achieves forward security by constructing a key evolution mechanism using a binary tree structure. This mechanism ensures that even if future encryption keys are leaked, past data can still remain secure. Meanwhile, LFSBS realizes post-quantum security based on the hardness assumption of small integer solution (SIS), making it resistant to potential quantum computing attacks. In addition, we formally define and prove the security of LFSBS in a random oracle model, including blindness and forward-secure unforgeability. Comprehensive performance evaluation shows that LFSBS performs well in terms of computational overhead, with a reduction of 22%–73% compared to previous schemes.
基金Project supported in part by the National Natural Science Foundation of China(Grant Nos.62005129 and 62175116)。
文摘We experimentally analyze the effect of the optical power on the time delay signature identification and the random bit generation in chaotic semiconductor laser with optical feedback.Due to the inevitable noise during the photoelectric detection and analog-digital conversion,the varying of output optical power would change the signal to noise ratio,then impact time delay signature identification and the random bit generation.Our results show that,when the optical power is less than-14 dBm,with the decreasing of the optical power,the actual identified time delay signature degrades and the entropy of the chaotic signal increases.Moreover,the extracted random bit sequence with lower optical power is more easily pass through the randomness testing.
基金Supported by the China Ocean Mineral Resources R&D Association(No.DY135-S2-2)the Basic Scientific Fund for National Public Research Institutes of China(No.2021Q01)the National Natural Science Foundation of China(Nos.42106080,42006180,42276080)。
文摘The hydrothermal signatures of mid-ocean ridge sediments are crucial geochemical data providing insights into investigating hydrothermal anomalies and locating seafloor massive sulfide deposits.This paper outlines the geochemical features of 24 surface sediments and one sediment core(26 V-GC 01,294 cm)along the South Mid-Atlantic Ridge(SMAR)from 18°S to 22°S,an area where hydrothermal active fields have yet to be discovered.The surface sediments mainly consist of biogenic carbonates,aluminosilicates,and hydrothermal Fe-Mn(oxy)oxides.The core sediments primarily comprise organic matter,detrital materials,hydrothermal components,and substances scavenged from seawater.The rare Earth element(REE)patterns suggest the presence of hydrothermal contributions within the surface and core sediments.The enrichment factors for Fe,Mn,Cu,and Zn in surface sediments suggest these metals are concentrated at the 19°S,21°S,and 21.5°S segments,further indicating their potential as hydrothermal active fields.Downcore variations of Fe,Mn,P,Cu,Pb,V,and Co suggest at least six episodes of hydrothermal activity.The impact of hydrothermal processes on the sediments from SMAR 18°S to 22°S indicates that the study area has the potential to host a significant number of hydrothermal active fields.
基金supported by National Natural Science Foundation of China.
文摘Attribute-Based Signature(ABS)is a powerful cryptographic primitive that enables fine-grained access control in distributed systems.However,its high computational cost makes it unsuitable for resource-constrained environments,and traditional monotonic access structures are inadequate for handling increasingly complex access policies.In this paper,we propose a novel smart contract-assisted ABS(SC-ABS)algorithm that supports nonmonotonic access structures,aiming to reduce client computing overhead while providingmore expressive and flexible access control.The SC-ABS scheme extends the monotonic access structure by introducing the concept of negative attributes,allowing for more complex and dynamic access policies.By utilizing smart contracts,the algorithmsupports distributed trusted assisted computation,and the computation code is transparent and auditable.Importantly,this design allows information about user attributes to be deployed on smart contracts for computation,both reducing the risk of privacy abuse by semi-honest servers and preventing malicious users from attribute concealment to forge signatures.We prove that SC-ABS satisfies unforgeability and anonymity under a random oracle model,and test the scheme’s cost.Comparedwith existing schemes,this scheme has higher efficiency in client signature and authentication.This scheme reduces the computing burden of users,and the design of smart contracts improves the security of aided computing further,solves the problem of attribute concealment,and expresses a more flexible access structure.The solution enables permission control applications in resource-constrained distributed scenarios,such as the Internet of Things(IoT)and distributed version control systems,where data security and flexible access control are critical.
基金the financial support from the Natural Science Foundation of Jiangsu Province(Grant Nos.BE2022071 and BK20192001)the National Natural Science Foundation of China(Grant Nos.12074194,62471248,12104240,and 62101285)the Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX220954)。
文摘Quantum digital signature(QDS)can guarantee the information-theoretical security of a signature with the fundamental laws of quantum physics.However,most current QDS protocols do not take source security into account,leading to an overestimation of the signature rate.In this paper,we propose to utilize Hong–Ou–Mandel interference to characterize the upper bound of the source imperfections,and further to quantify information leakage from potential side-channels.Additionally,we combine decoy-state methods and finite-size analysis in analyzing the signature rate.Simulation results demonstrate the performance and feasibility of our approach.Our current work can improve the practical security of QDS systems,thereby promoting their further networked applications.
基金funded by the Natural Science Research Project of Anhui Educational Committee(2023AH050650)the Research Fund Program of Anhui Medical University(2023xkj176).
文摘Backgrounds:As cancer progresses through various stages of malignancy,metastasis,and drug resistance,the Wnt/-catenin signaling is frequently dysregulated.Despite advancements in medical technology and therapeutic strategies,the prognosis for numerous gastric cancer patients remains unfavorable.Methods:For the analysis of prognostic signature genes associated with Wnt signaling in GC,we used LASSO(least absolute shrinkage and selection operator)regression.To explore the function,cell specificity,and transcriptional regulation of the signature gene Carboxypeptidase Z(CPZ),we conducted co-expression analysis,single-cell RNA sequencing data analysis,transcription factor prediction,and dual luciferase reporter assay.The knockdown and overexpression experiments were also performed to observe the changes in the downstream gene expression,as well as the influence on the biological functions of GC cells.Results:We identified a five-gene signature,including CPZ,Collagen Triple Helix Repeat Containing-1(CTHRC1),Dickkopf-1(DKK1),Epidermal Growth Factor(EGF),and Glypican Proteoglycan-3(GPC3),with risk scores predictive of the prognosis of GC patients.We found that the adipocyte enhancer binding protein 1(AEBP1)and transcription factor 3(TCF3)could interact in the nucleus and synergistically enhance the expression of Wnt signaling-associated genes,including WNT2/FZD2(Wnt family member 2/frizzled class receptor 2)and VIM(vimentin),thus promoting the invasion,migration,and malignant metastasis of GC.Conclusions:Our study offers a precise gene-signature prediction method for the prognosis of GC.We discovered the synergistic effect of AEBP1 and TCF3 in the nucleus on GC metastasis.GC may benefit from the identification of this potential therapeutic target.
基金funded by the National Natural Science Foundation of China(grants number 32070377 and 31770374)Science Fund for Creative Research Groups of the Natural Science Foundation of Hubei Province(2024AFA035).
文摘Local adaptation is critical for plant survivals and reproductions in the context of global environmental change.Heterogeneous environments impose various selection pressures that influence the fitness of organisms and leave genomic signatures during the process of adaptation to local environments.However,unveiling the genomic signatures of adaptation still poses a major challenge especially for perennials due to limited genomic resources.Here,we utilized Actinidia eriantha,a Chinese endemic liana,as a model case to detect drivers of local adaptation and adaptive signals through landscape genomics for 311 individuals collected from 25 populations.Our results demonstrated precipitation and solar radiation were two crucial factors influencing the patterns of genetic variations and driving adaptive processes.We further uncovered a set of genes involved in adaptation to heterogeneous environments.Among them,AeERF110 showed high genetic differentiation between populations and was confirmed to be involved in local adaptation via changes in allele frequency along with precipitation(Prec_03)and solar radiation(Srad_03)in native habitats separately,implying that adaptive loci frequently exhibited environmental and geographic signals.In addition,we assessed genetic offsets of populations under four future climate models and revealed that populations from middle and east clusters faced higher risks in adapting to future environments,which should address more attentions.Taken together,our study opens new perspectives for understanding the genetic underpinnings of local adaptation in plants to environmental changes in a more comprehensive fashion and offered the guides on applications in conservation efforts.
基金supported by the National Key R&D Program of China(2022YFF1000100)China Postdoctoral Science Foundation(2022M722615)。
文摘Local cattle breeds play a critical role in breeding programs due to their genetic adaptations to diverse environmental conditions.However,the genomic architecture of local cattle breeds in Kazakhstan remains largely unexplored.This study utilized whole-genome sequencing data from Kazakh cattle to elucidate their genetic composition,uncovering three primary ancestral components:European,Eurasian,and East Asian taurine.The East Asian taurine lineage likely represents the earliest genetic contribution to Kazakh cattle but was largely replaced by subsequent waves of cattle migrations across Eurasia,leaving only a minor genetic signature in the current cattle population.In contrast,Eurasian taurine ancestry predominated in the Alatau and Kazakh local breeds,while the European taurine component was most prevalent in Kazakh white-headed cattle,consistent with their documented breeding history.Kazakh cattle exhibited higher genetic diversity and lower inbreeding coefficients compared to European commercial breeds,reflecting reduced exposure to intense artificial selection.A strong selection signal was identified on chromosome 6 at a locus encompassing PDGFRA,KIT,and KDR,which may be associated with the white-headed pigmentation characteristic of Kazakh white-headed cattle.Additional genes under selection were linked to lipid metabolism(IRS1,PRKG1,and ADCY8),meat production traits(KCNMA1,PDGFRA,HIF1A,and ANTXR1),and dairy production(ATP2B1,DHX15,FUK,NEGR1,CCDC91,COG4,and PTK2B).This study represents the first comprehensive analysis of nuclear genome data from local Kazakh cattle.It highlights the impact of historical cattle migrations across Eurasia on their genetic landscape and identifies key genomic regions under selection.These findings advance our understanding of the evolutionary history of cattle and offer valuable genetic resources for future breeding strategies.
基金the National Natural Science Foundation of China (No.60673070)the Natural Science Foundation of Jiangsu Province (No.BK2006217)the Open Project of the Key Lab. on Computer Networks and Information Security (Xidian University) of Ministry of Education of China(No.20040105)
文摘Certificateless public key cryptography is a new paradigm introduced by Al-Riyami and Paterson.It eliminates the need of the certificates in traditional public key cryptosystems and the key escrow problem in IDentity-based Public Key Cryptography(ID-PKC).Due to the advantages of the certificateless public key cryptography,a new efficient certificateless pairing-based signature scheme is presented,which has some advantages over previous constructions in computational cost.Based on this new signature scheme,a certificateless blind signature scheme is proposed.The security of our schemes is proven based on the hardness of computational Diffie-Hellman problem.
基金Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin(15JCYBJC15900)
文摘Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and aggregate signatures, we propose an efficient certificateless aggregate signature scheme and prove its security. The new scheme is proved secure against the two representative types adversaries in certificateless aggregate signature under the assumption that computational Diffie-Hellman problem is hard. Furthermore, from the comparison of the computation cost of the new scheme with some existing certificateless aggregate signature schemes in group sum computation, scalar multiplication computation, Hash computation and abilinear pairings computation, it concludes that the new scheme reduces the computation cost in scalar multiplication computation in half and maintains the same in the other computation costs.
文摘An identity-based proxy blind signature scheme from bilinear pairings isintroduced, which combines the advantages of proxy signature and blind signature. Furthermore, ourscheme can prevent the original signer from generating the proxy blind signature, thus the profitsof the proxy signer are guaranteed. We introduce bilinear pairings to minimize computationaloverhead and to improve the related performance of our scheme. In addition, the proxy blindsignature presented is non-repudiable and it fulfills perfectly the security requirements of a proxyblind signature.
基金Sponsored by the National Natural Science Foundation of China(Grant No.90104033).
文摘Ring signature and proxy signature are of vital importance to secure electronic commerce. Recently, the bilinear pairing such as Well pairing or Tate pairing on elliptic curves and hyperelliptic curves is playing an important role in security solutions. Several ID-based signature schemes have been put forward, many of which are based on bilinear pairings. In key management and moderate security demand scenarios, ID-based public key cryptosystem is more preferable than other public key infrastructure based systems. In this paper, an improved ID-based proxy ring signature scheme from bilinear pairings is proposed which combines the advantages of proxy signature and of ring signatures. Our scheme can guarantee the profits of the proxy signer via preventing the original signer form generating the proxy ring signature. Furthermore, bilinear pairings are introduced to minimize the computation overhead and to improve the related performance of our scheme. In contrast with Zhang's scheme, our scheme is a computational efficiency improvement for signature verification because the computational cost of bilinear pairings required is reduced from O(n) to O( 1 ). In addition, the proxy ring signature presented in this paper can perfectly satisfy all the security requirements of proxy ring signature, i. e. signer-ambiguity, non-forgeability, verification, non-deniability and distinguishability.
基金supported by the National Science Council under Grant No.NSC100-2221-E-005-062 and NSC 100-2221-E-468-014
文摘In ubiquitous computing,data should be able to be accessed from any location,and the correctness of data becomes vital during the communication.Suppose that many users sign different messages respectively,before forwarding or sending these messages,then the verifier must spend a lot of computing time to verify their signatures.Consequently,the aggregate signature scheme is an effective method of improving efficiency in this kind of systems,which provides the convenience for the verifier.In this paper,we propose a new certificateless aggregate signature scheme which is efficient in generating a signature and verification.This scheme is provably secure under the extended computational Diffie-Hellman assumption.